Skip to content

Commit 19e8d27

Browse files
committed
Merge branch 'main' into mason/app_msi
2 parents f42a99d + 43d54f8 commit 19e8d27

File tree

350 files changed

+2934
-1031
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

350 files changed

+2934
-1031
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,6 @@
1010
"redirect_url": "/azure/azure-monitor/app/performance-counters",
1111
"redirect_document_id": true
1212
},
13-
{
14-
"source_path_from_root": "/articles/application-insights/cloudservices.md",
15-
"redirect_url": "/azure/azure-monitor/app/azure-web-apps-net",
16-
"redirect_document_id": false
17-
},
1813
{
1914
"source_path_from_root": "/articles/azure-monitor/insights/service-bus-insights.md",
2015
"redirect_url": "/azure/service-bus-messaging/service-bus-insights",

articles/active-directory-b2c/find-help-open-support-ticket.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,10 +75,13 @@ If you're unable to find answers by using self-help resources, you can open an o
7575

7676
1. Select a **[Severity](https://azure.microsoft.com/support/plans/response)**, and your preferred contact method.
7777

78+
> [!NOTE]
79+
> Under **Advanced diagnostic information**, it's highly recommended that you allow the collection of advanced information by selecting **Yes**. It enables Microsoft support team to investigate the issue faster.
7880
7981
:::image type="content" source="media/find-help-and-submit-support-ticket/find-help-and-submit-support-ticket-1.png" alt-text="Screenshot of how to find help and submit support ticket part 1.":::
8082

8183
:::image type="content" source="media/find-help-and-submit-support-ticket/find-help-and-submit-support-ticket-2.png" alt-text="Screenshot of how to find help and submit support ticket part 2.":::
84+
8285

8386
1. Select **Next**. Under **4. Review + create**, you'll see a summary of your support ticket.
8487

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ To configure your tenant application as a Relying Party in eID-Me the following
101101
| Name | Azure AD B2C/your desired application name |
102102
| Domain | name.onmicrosoft.com |
103103
| Redirect URIs | https://jwt.ms |
104-
| Redirect URLs | https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br> Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant. |
104+
| Redirect URLs | `https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp`<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br> Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant. |
105105
| URL for application home page | Will be displayed to the end user |
106106
| URL for application privacy policy | Will be displayed to the end user |
107107

@@ -300,7 +300,7 @@ There are additional identity claims that eID-Me supports and can be added.
300300

301301
1. Open the `TrustFrameworksExtension.xml`
302302

303-
2. Find the `BuildingBlocks` element. This is where additional identity claims that eID-Me supports can be added. Full lists of supported eID-Me identity claims with descriptions are mentioned at [http://www.oid-info.com/get/1.3.6.1.4.1.50715](http://www.oid-info.com/get/1.3.6.1.4.1.50715) with the OIDC identifiers used here [https://eid-me.bluink.ca/.well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
303+
2. Find the `BuildingBlocks` element. This is where additional identity claims that eID-Me supports can be added. Full lists of supported eID-Me identity claims with descriptions are mentioned at `http://www.oid-info.com/get/1.3.6.1.4.1.50715` with the OIDC identifiers used here [https://eid-me.bluink.ca/.well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
304304

305305
```xml
306306
<BuildingBlocks>

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@
9191
href: migrate-from-classic-vnet.md
9292
- name: Change SKU
9393
href: change-sku.md
94+
- name: Retrieve data
95+
href: how-to-data-retrieval.md
9496
- name: Secure Azure AD DS
9597
items:
9698
- name: Secure your managed domain
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: Instructions for data retrieval from Azure Active Directory Domain Services | Microsoft Docs
3+
description: Learn how to retrieve data from Azure Active Directory Domain Services (Azure AD DS).
4+
services: active-directory-ds
5+
author: justinha
6+
manager: karenhoran
7+
8+
ms.service: active-directory
9+
ms.subservice: domain-services
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 04/14/2022
13+
ms.author: justinha
14+
ms.reviewer: manthanm
15+
---
16+
17+
# Azure AD DS instructions for data retrieval
18+
19+
This document describes how to retrieve data from Azure Active Directory Domain Services (Azure AD DS).
20+
21+
[!INCLUDE [active-directory-app-provisioning.md](../../includes/gdpr-intro-sentence.md)]
22+
23+
## Use Azure Active Directory to create, read, update, and delete user objects
24+
25+
You can create a user in the Azure AD portal or by using Graph PowerShell or Graph API. You can also read, update, and delete users. The next sections show how to do these operations in the Azure AD portal.
26+
27+
### Create, read, or update a user
28+
29+
You can create a new user using the Azure Active Directory portal.
30+
To add a new user, follow these steps:
31+
32+
1. Sign in to the [Azure portal](https://portal.azure.com/) in the User Administrator role for the organization.
33+
34+
1. Search for and select *Azure Active Directory* from any page.
35+
36+
1. Select **Users**, and then select **New user**.
37+
38+
![Add a user through Users - All users in Azure AD](./media/tutorial-create-management-vm/add-user-in-users-all-users.png)
39+
40+
1. On the **User** page, enter information for this user:
41+
42+
- **Name**. Required. The first and last name of the new user. For example, *Mary Parker*.
43+
44+
- **User name**. Required. The user name of the new user. For example, `[email protected]`.
45+
46+
- **Groups**. Optionally, you can add the user to one or more existing groups.
47+
48+
- **Directory role**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role.
49+
50+
- **Job info**: You can add more information about the user here.
51+
52+
1. Copy the autogenerated password provided in the **Password** box. You'll need to give this password to the user to sign in for the first time.
53+
54+
1. Select **Create**.
55+
56+
The user is created and added to your Azure AD organization.
57+
58+
To read or update a user, search for and select the user such as, _Mary Parker_. Change any property and click **Save**.
59+
60+
### Delete a user
61+
62+
To delete a user, follow these steps:
63+
64+
1. Search for and select the user you want to delete from your Azure AD tenant. For example, _Mary Parker_.
65+
66+
1. Select **Delete user**.
67+
68+
![Users - All users page with Delete user highlighted](./media/tutorial-create-management-vm/delete-user-all-users-blade.png)
69+
70+
71+
The user is deleted and no longer appears on the **Users - All users** page. The user can be seen on the **Deleted users** page for the next 30 days and can be restored during that time.
72+
73+
When a user is deleted, any licenses consumed by the user are made available for other users.
74+
75+
## Use RSAT tools to connect to an Azure AD DS managed domain and view users
76+
77+
Sign in to an administrative workstation with a user account that's a member of the *AAD DC Administrators* group. The following steps require installation of [Remote Server Administration Tools (RSAT)](tutorial-create-management-vm.md#install-active-directory-administrative-tools).
78+
79+
1. From the **Start** menu, select **Windows Administrative Tools**. The Active Directory Administration Tools are listed.
80+
81+
![List of Administrative Tools installed on the server](./media/tutorial-create-management-vm/list-admin-tools.png)
82+
83+
1. Select **Active Directory Administrative Center**.
84+
1. To explore the managed domain, choose the domain name in the left pane, such as *aaddscontoso*. Two containers named *AADDC Computers* and *AADDC Users* are at the top of the list.
85+
86+
![List the available containers part of the managed domain](./media/tutorial-create-management-vm/active-directory-administrative-center.png)
87+
88+
1. To see the users and groups that belong to the managed domain, select the **AADDC Users** container. The user accounts and groups from your Azure AD tenant are listed in this container.
89+
90+
In the following example output, a user account named *Contoso Admin* and a group for *AAD DC Administrators* are shown in this container.
91+
92+
![View the list of Azure AD DS domain users in the Active Directory Administrative Center](./media/tutorial-create-management-vm/list-azure-ad-users.png)
93+
94+
1. To see the computers that are joined to the managed domain, select the **AADDC Computers** container. An entry for the current virtual machine, such as *myVM*, is listed. Computer accounts for all devices that are joined to the managed domain are stored in this *AADDC Computers* container.
95+
96+
You can also use the *Active Directory Module for Windows PowerShell*, installed as part of the administrative tools, to manage common actions in your managed domain.
97+
98+
## Next steps
99+
* [Azure AD DS Overview](overview.md)
66.6 KB
Loading
29 KB
Loading

articles/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Scoping filters are configured as part of the attribute mappings for each Azure
8484

8585
g. **REGEX MATCH**. Clause returns "true" if the evaluated attribute matches a regular expression pattern. For example: ([1-9][0-9]) matches any number between 10 and 99 (case sensitive).
8686

87-
h. **NOT REGEX MATCH**. Clause returns "true" if the evaluated attribute doesn't match a regular expression pattern.
87+
h. **NOT REGEX MATCH**. Clause returns "true" if the evaluated attribute doesn't match a regular expression pattern. It will return "false" if the attribute is null / empty.
8888

8989
i. **Greater_Than.** Clause returns "true" if the evaluated attribute is greater than the value. The value specified on the scoping filter must be an integer and the attribute on the user must be an integer [0,1,2,...].
9090

@@ -97,6 +97,7 @@ Scoping filters are configured as part of the attribute mappings for each Azure
9797
> - The IsMemberOf filter is not supported currently.
9898
> - The members attribute on a group is not supported currently.
9999
> - EQUALS and NOT EQUALS are not supported for multi-valued attributes
100+
> - Scoping filters will return "false" if the value is null / empty
100101
101102
9. Optionally, repeat steps 7-8 to add more scoping clauses.
102103

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 02/16/2022
10+
ms.date: 04/13/2022
1111
ms.author: kenwith
1212
ms.reviewer: arvinh
1313
---
@@ -1237,6 +1237,18 @@ Generate a user alias by taking first three letters of user's first name and fir
12371237
* **INPUT** (surname): "Doe"
12381238
* **OUTPUT**: "JohDoe"
12391239

1240+
### Add a comma between last name and first name.
1241+
Add a comma between last name and first name.
1242+
1243+
**Expression:**
1244+
`Join(", ", "", [surname], [givenName])`
1245+
1246+
**Sample input/output:**
1247+
1248+
* **INPUT** (givenName): "John"
1249+
* **INPUT** (surname): "Doe"
1250+
* **OUTPUT**: "Doe, John"
1251+
12401252

12411253
## Related Articles
12421254
* [Automate User Provisioning/Deprovisioning to SaaS Apps](../app-provisioning/user-provisioning.md)

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Azure AD on-premises application provisioning architecture (preview)
16+
# Azure AD on-premises application identity provisioning architecture (preview)
1717

1818
## Overview
1919

@@ -97,10 +97,6 @@ You can define one or more matching attribute(s) and prioritize them based on th
9797
## Provisioning agent questions
9898
Some common questions are answered here.
9999

100-
### What is the GA version of the provisioning agent?
101-
102-
For the latest GA version of the provisioning agent, see [Azure AD connect provisioning agent: Version release history](provisioning-agent-release-version-history.md).
103-
104100
### How do I know the version of my provisioning agent?
105101

106102
1. Sign in to the Windows server where the provisioning agent is installed.
@@ -138,19 +134,19 @@ You can also check whether all the required ports are open.
138134
- Microsoft Azure AD Connect Agent Updater
139135
- Microsoft Azure AD Connect Provisioning Agent Package
140136

141-
### Provisioning agent history
137+
## Provisioning agent history
142138
This article lists the versions and features of Azure Active Directory Connect Provisioning Agent that have been released. The Azure AD team regularly updates the Provisioning Agent with new features and functionality. Please ensure that you do not use the same agent for on-prem provisioning and Cloud Sync / HR-driven provisioning.
143139

144140
Microsoft provides direct support for the latest agent version and one version before.
145141

146-
## Download link
142+
### Download link
147143
You can download the latest version of the agent using [this link](https://aka.ms/onpremprovisioningagent).
148144

149-
## 1.1.846.0
145+
### 1.1.846.0
150146

151147
April 11th, 2022 - released for download
152148

153-
### Fixed issues
149+
#### Fixed issues
154150

155151
- We added support for ObjectGUID as an anchor for the generic LDAP connector when provisioning users into AD LDS.
156152

0 commit comments

Comments
 (0)