Skip to content

Commit 1a21cc6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into work-vms-edit
2 parents 80971b2 + 61b927b commit 1a21cc6

File tree

340 files changed

+3935
-2196
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

340 files changed

+3935
-2196
lines changed

.openpublishing.redirection.json

Lines changed: 39 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@
5555
"redirect_url": "/azure/virtual-machines/maintenance-and-updates?toc=/azure/virtual-machines/linux/toc.json&bc=/azure/virtual-machines/linux/breadcrumb/toc.json",
5656
"redirect_document_id": false
5757
},
58-
{
58+
{
5959
"source_path": "articles/virtual-machines/windows/maintenance-notifications.md",
6060
"redirect_url": "/azure/virtual-machines/maintenance-notifications?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json",
6161
"redirect_document_id": false
@@ -561,17 +561,17 @@
561561
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-postman.md",
562562
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
563563
"redirect_document_id": false
564-
},
564+
},
565565
{
566566
"source_path": "articles/cognitive-services/QnAMaker/Quickstarts/get-answer-from-kb-using-curl.md",
567567
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
568568
"redirect_document_id": false
569-
},
569+
},
570570
{
571571
"source_path": "articles/cognitive-services/LUIS/luis-how-to-add-example-utterances.md",
572572
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-entities",
573573
"redirect_document_id": false
574-
},
574+
},
575575
{
576576
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-prebuilt-intents-entities.md",
577577
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",
@@ -43801,6 +43801,41 @@
4380143801
"source_path": "articles/healthcare-apis/configure-cosmos-db.md",
4380243802
"redirect_url": "/azure/healthcare-apis/configure-database",
4380343803
"redirect_document_id": false
43804+
},
43805+
{
43806+
"source_path": "articles/media-services/previous/media-services-azure-media-clipper-portal.md",
43807+
"redirect_url": "/azure/media-services/latest",
43808+
"redirect_document_id": false
43809+
},
43810+
{
43811+
"source_path": "articles/media-services/previous/media-services-azure-media-clipper-getting-started.md",
43812+
"redirect_url": "/azure/media-services/latest",
43813+
"redirect_document_id": false
43814+
},
43815+
{
43816+
"source_path": "articles/media-services/previous/media-services-azure-media-clipper-load-assets.md",
43817+
"redirect_url": "/azure/media-services/latest",
43818+
"redirect_document_id": false
43819+
},
43820+
{
43821+
"source_path": "articles/media-services/previous/media-services-azure-media-clipper-keyboard-shortcuts.md",
43822+
"redirect_url": "/azure/media-services/latest",
43823+
"redirect_document_id": false
43824+
},
43825+
{
43826+
"source_path": "articles/media-services/previous/media-services-azure-media-clipper-localization.md",
43827+
"redirect_url": "/azure/media-services/latest",
43828+
"redirect_document_id": false
43829+
},
43830+
{
43831+
"source_path": "articles/media-services/previous/media-services-azure-media-clipper-submit-job.md",
43832+
"redirect_url": "/azure/media-services/latest",
43833+
"redirect_document_id": false
43834+
},
43835+
{
43836+
"source_path": "articles/media-services/previous/media-services-azure-media-clipper-overview.md",
43837+
"redirect_url": "/azure/media-services/latest",
43838+
"redirect_document_id": false
4380443839
}
4380543840
]
4380643841
}

articles/active-directory-b2c/active-directory-b2c-tutorials-desktop-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Record the **Application (client) ID** for use in a later step.
3939

4040
## Configure the sample
4141

42-
In this tutorial, you configure a sample that you can download from GitHub. The sample WPF desktop application demonstrates sign-up, sign-in, and can call a protected web API in Azure AD B2C. [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop/archive/master.zip), [browse the repo](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop), or clone the sample from GitHub.
42+
In this tutorial, you configure a sample that you can download from GitHub. The sample WPF desktop application demonstrates sign-up, sign-in, and can call a protected web API in Azure AD B2C. [Download a zip file](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop/archive/msalv3.zip), [browse the repo](https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop), or clone the sample from GitHub.
4343

4444
```
4545
git clone https://github.com/Azure-Samples/active-directory-b2c-dotnet-desktop.git

articles/active-directory-domain-services/create-gmsa.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,17 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/09/2019
13+
ms.date: 11/26/2019
1414
ms.author: iainfou
1515

1616
---
1717
# Create a group managed service account (gMSA) in Azure AD Domain Services
1818

19-
Applications and services often need an identity to authenticate themselves with other resources. For example, a web service may need to authenticate with a database service. If an application or service has multiple instances, such as a web server farm, manually creating and configuring the identities for those resources gets time consuming. Instead, a group managed service account (gMSA) can be created in the Azure Active Directory Domain Services (Azure AD DS) managed domain. The Windows OS automatically manages the credentials for a gMSA, which simplifies the management of large groups of resources.
19+
Applications and services often need an identity to authenticate themselves with other resources. For example, a web service may need to authenticate with a database service. If an application or service has multiple instances, such as a web server farm, manually creating and configuring the identities for those resources gets time consuming.
2020

21-
This article shows you how to create a gMSA in an Azure AD DS managed domain.
21+
Instead, a group managed service account (gMSA) can be created in the Azure Active Directory Domain Services (Azure AD DS) managed domain. The Windows OS automatically manages the credentials for a gMSA, which simplifies the management of large groups of resources.
22+
23+
This article shows you how to create a gMSA in an Azure AD DS managed domain using Azure PowerShell.
2224

2325
## Before you begin
2426

@@ -56,6 +58,9 @@ As Azure AD DS managed domains are locked down and managed by Microsoft, there a
5658

5759
First, create a custom OU using the [New-ADOrganizationalUnit][New-AdOrganizationalUnit] cmdlet. For more information on creating and managing custom OUs, see [Custom OUs in Azure AD DS][create-custom-ou].
5860

61+
> [!TIP]
62+
> To complete these steps to create a gMSA, [use your management VM][tutorial-create-management-vm]. This management VM should already have the required AD PowerShell cmdlets and connection to the managed domain.
63+
5964
The following example creates a custom OU named *myNewOU* in the Azure AD DS managed domain named *contoso.com*. Use your own OU and managed domain name:
6065

6166
```powershell

articles/active-directory-domain-services/delete-aadds.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Disable Azure Active Directory Domain Services | Microsoft Docs'
3-
description: Learn how to disable Azure Active Directory Domain Services using the Azure portal
2+
title: Delete Azure Active Directory Domain Services | Microsoft Docs
3+
description: Learn how to disable, or delete, an Azure Active Directory Domain Services managed domain using the Azure portal
44
services: active-directory-ds
55
author: iainfoulds
66
manager: daveba
@@ -10,11 +10,11 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/04/2019
13+
ms.date: 11/26/2019
1414
ms.author: iainfou
1515

1616
---
17-
# Disable Azure Active Directory Domain Services using the Azure portal
17+
# Delete an Azure Active Directory Domain Services managed domain using the Azure portal
1818

1919
If you no longer need a managed domain, you can delete an Azure Active Directory Domain Services (Azure AD DS) instance. There's no option to turn off or temporarily disable an Azure AD DS managed domain. Deleting the Azure AD DS managed domain doesn't delete or otherwise adversely impact the Azure AD tenant. This article shows you how to use the Azure portal to delete an Azure AD DS managed domain.
2020

articles/active-directory-domain-services/deploy-kcd.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/04/2019
13+
ms.date: 11/26/2019
1414
ms.author: iainfou
1515

1616
---
1717
# Configure Kerberos constrained delegation (KCD) in Azure Active Directory Domain Services
1818

1919
As you run applications, there may be a need for those applications to access resources in the context of a different user. Active Directory Domain Services (AD DS) supports a mechanism called *Kerberos delegation* that enables this use-case. Kerberos *constrained* delegation (KCD) then builds on this mechanism to define specific resources that can be accessed in the context of the user. Azure Active Directory Domain Services (Azure AD DS) managed domains are more securely locked down that traditional on-premises AD DS environments, so use a more secure *resource-based* KCD.
2020

21-
This article shows you how to configure resource-basd Kerberos constrained delegation in an Azure AD DS managed domain.
21+
This article shows you how to configure resource-based Kerberos constrained delegation in an Azure AD DS managed domain.
2222

2323
## Prerequisites
2424

@@ -38,7 +38,9 @@ To complete this article, you need the following resources:
3838

3939
Kerberos delegation lets one account impersonate another account to access resources. For example, a web application that accesses a back-end web component can impersonate itself as a different user account when it makes the back-end connection. Kerberos delegation is insecure as it doesn't limit what resources the impersonating account can access.
4040

41-
Kerberos constrained delegation (KCD) restricts the services or resources that a specified server or application can connect when impersonating another identity. Traditional KCD requires domain administrator privileges to configure a domain account for a service, and it restricts the account to run on a single domain. Traditional KCD also has a few issues. For example, in earlier operating systems, the service administrator had no useful way to know which front-end services delegated to the resource services they owned. Any front-end service that could delegate to a resource service was a potential attack point. If a server that hosted a front-end service configured to delegate to resource services was compromised, the resource services could also be compromised.
41+
Kerberos constrained delegation (KCD) restricts the services or resources that a specified server or application can connect when impersonating another identity. Traditional KCD requires domain administrator privileges to configure a domain account for a service, and it restricts the account to run on a single domain.
42+
43+
Traditional KCD also has a few issues. For example, in earlier operating systems, the service administrator had no useful way to know which front-end services delegated to the resource services they owned. Any front-end service that could delegate to a resource service was a potential attack point. If a server that hosted a front-end service configured to delegate to resource services was compromised, the resource services could also be compromised.
4244

4345
In an Azure AD DS managed domain, you don't have domain administrator privileges. As a result, traditional account-based KCD can't be configured in an Azure AD DS a managed domain. Resource-based KCD can instead be used, which is also more secure.
4446

articles/active-directory-domain-services/notifications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: article
13-
ms.date: 09/12/2019
13+
ms.date: 11/26/2019
1414
ms.author: iainfou
1515

1616
---

articles/active-directory-domain-services/scoped-synchronization.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,15 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: article
13-
ms.date: 09/06/2019
13+
ms.date: 11/26/2019
1414
ms.author: iainfou
1515

1616
---
1717
# Configure scoped synchronization from Azure AD to Azure Active Directory Domain Services
1818

19-
To provide authentication services, Azure Active Directory Domain Services (Azure AD DS) synchronizes users and groups from Azure AD. In a hybrid environment, users and groups from an on-premises Active Directory Domain Services (AD DS) environment can be first synchronized to Azure AD using Azure AD Connect, and then synchronized to Azure AD DS. By default, all users and groups from an Azure AD directory are synchronized to an Azure AD DS managed domain. If you have specific needs, you can instead choose to synchronize only a defined set of users.
19+
To provide authentication services, Azure Active Directory Domain Services (Azure AD DS) synchronizes users and groups from Azure AD. In a hybrid environment, users and groups from an on-premises Active Directory Domain Services (AD DS) environment can be first synchronized to Azure AD using Azure AD Connect, and then synchronized to Azure AD DS.
20+
21+
By default, all users and groups from an Azure AD directory are synchronized to an Azure AD DS managed domain. If you have specific needs, you can instead choose to synchronize only a defined set of users.
2022

2123
This article shows you how to create an Azure AD DS managed domain that uses scoped synchronization and then change or disable the set of scoped users.
2224

@@ -49,7 +51,7 @@ You use the Azure portal or PowerShell to configure the scoped synchronization s
4951
5052
## Enable scoped synchronization using the Azure portal
5153

52-
1. Follow the [tutorial to create and configure an Azure AD DS instance](tutorial-create-instance.md). Complete all prerequisites and deployment steps other than for synchronization scope.
54+
1. Follow the [tutorial to create and configure an Azure AD DS instance](tutorial-create-instance-advanced.md). Complete all prerequisites and deployment steps other than for synchronization scope.
5355
1. Choose **Scoped** at the synchronization step, then select the Azure AD groups to synchronize to the Azure AD DS instance.
5456

5557
The Azure AD DS managed domain can take up to an hour to complete the deployment. In the Azure portal, the **Overview** page for your Azure AD DS managed domain shows the current status throughout this deployment stage.
@@ -58,13 +60,13 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
5860

5961
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
6062
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
61-
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
63+
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance-advanced.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
6264

6365
## Modify scoped synchronization using the Azure portal
6466

6567
To modify the list of groups whose users should be synchronized to the Azure AD DS managed domain, complete the following steps:
6668

67-
1. In the Azure portal, select your Azure AD DS instance, such as *contoso.com*.
69+
1. In the Azure portal, search for and select **Azure AD Domain Services**. Choose your instance, such as *contoso.com*.
6870
1. Select **Synchronization** from the menu on the left-hand side.
6971
1. To add a group, choose **+ Select groups** at the top, then choose the groups to add.
7072
1. To remove a group from the synchronization scope, select it from the list of currently synchronized groups and choose **Remove groups**.
@@ -76,7 +78,7 @@ Changing the scope of synchronization causes the Azure AD DS managed domain to r
7678

7779
To disable group-based scoped synchronization for an Azure AD DS managed domain, complete the following steps:
7880

79-
1. In the Azure portal, select your Azure AD DS instance, such as *contoso.com*.
81+
1. In the Azure portal, search for and select **Azure AD Domain Services**. Choose your instance, such as *contoso.com*.
8082
1. Select **Synchronization** from the menu on the left-hand side.
8183
1. Set the synchronization scope from **Scoped** to **All**, then select **Save synchronization scope**.
8284

@@ -211,7 +213,9 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
211213

212214
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
213215
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
214-
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
216+
* If you created an Azure AD DS managed domain in a region that supports Availability Zones, create a network security group to restrict traffic in the virtual network for the Azure AD DS managed domain. An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly.
217+
* To create the network security group and required rules, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically create and configure the network security group.
218+
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance-advanced.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
215219

216220
## Modify scoped synchronization using Powershell
217221

articles/active-directory-domain-services/secure-your-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: article
13-
ms.date: 09/09/2019
13+
ms.date: 11/26/2019
1414
ms.author: iainfou
1515

1616
---

articles/active-directory/develop/howto-add-app-roles-in-azure-ad-apps.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,8 @@ These application roles are defined in the [Azure portal](https://portal.azure.c
3939
1. On the top bar, select your account, and then **Switch Directory**.
4040
1. Once the **Directory + subscription** pane opens, choose the Active Directory tenant where you wish to register your application, from the **Favorites** or **All Directories** list.
4141
1. Select **All services** in the left-hand nav, and choose **Azure Active Directory**.
42-
1. In the **Azure Active Directory** pane, select **App registrations (Legacy)** to view a list of all your applications.
43-
44-
If you do not see the application you want show up here, use the various filters at the top of the **App registrations (Legacy)** list to restrict the list or scroll down the list to locate your application.
45-
46-
1. Select the application you want to define app roles in.
47-
1. In the blade for your application, select **Manifest**.
42+
1. In the **Azure Active Directory** pane, select **App registrations** to view a list of all your applications.
43+
1. Select the application you want to define app roles in. Then select **Manifest**.
4844
1. Edit the app manifest by locating the `appRoles` setting and adding all your Application Roles.
4945

5046
> [!NOTE]

0 commit comments

Comments
 (0)