Skip to content

Commit 2314a43

Browse files
committed
Merge branch 'main' into default-enablement
2 parents 55c1f34 + 2ff4032 commit 2314a43

File tree

3,744 files changed

+40964
-36099
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,744 files changed

+40964
-36099
lines changed

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@
1919
"source_path_from_root": "/articles/aks/aks-planned-maintenance-weekly-releases.md",
2020
"redirect_url": "/azure/aks/planned-maintenance",
2121
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/aks/create-k8s-cluster-with-aks-application-gateway-ingress.md",
25+
"redirect_url": "/azure/application-gateway/for-containers/overview",
26+
"redirect_document_id": false
2227
}
2328
]
2429
}

.openpublishing.redirection.json

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13457,6 +13457,11 @@
1345713457
"redirect_url": "/azure/governance/policy/samples/swift-csp-cscf-2021",
1345813458
"redirect_document_id": false
1345913459
},
13460+
{
13461+
"source_path_from_root": "/articles/governance/policy/samples/azure-security-benchmarkv1.md",
13462+
"redirect_url": "/azure/governance/policy/samples/azure-security-benchmark",
13463+
"redirect_document_id": false
13464+
},
1346013465
{
1346113466
"source_path_from_root": "/articles/azure-policy/create-manage-policy.md",
1346213467
"redirect_url": "/azure/governance/policy/tutorials/create-and-manage",
@@ -22357,6 +22362,11 @@
2235722362
"redirect_url": "/azure/communication-services/how-tos/calling-sdk/lobby",
2235822363
"redirect_document_id": false
2235922364
},
22365+
{
22366+
"source_path_from_root": "/articles/communication-services/tutorials/widgets/click-to-call-widget.md",
22367+
"redirect_url": "/azure/communication-services/tutorials/calling-widget/calling-widget-overview",
22368+
"redirect_document_id": false
22369+
},
2236022370
{
2236122371
"source_path_from_root": "/articles/load-balancer/tutorial-load-balancer-standard-manage-portal.md",
2236222372
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-portal",
@@ -23586,8 +23596,27 @@
2358623596
"source_path_from_root": "/articles/devtest-labs/how-to-move-schedule-to-new-region.md",
2358723597
"redirect_url": "/azure/devtest-labs/how-to-move-labs",
2358823598
"redirect_document_id": false
23599+
},
23600+
{
23601+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-prescriptive-adoption.md",
23602+
"redirect_url": "/azure/devtest-labs/deliver-proof-of-concept",
23603+
"redirect_document_id": false
23604+
},
23605+
{
23606+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-cost-ownership.md",
23607+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23608+
"redirect_document_id": false
2358923609
},
2359023610
{
23611+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-policy-compliance.md",
23612+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23613+
"redirect_document_id": false
23614+
},
23615+
{
23616+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-application-migration-integration.md",
23617+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23618+
"redirect_document_id": false
23619+
}, {
2359123620
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
2359223621
"redirect_url": "/azure/advisor/advisor-overview",
2359323622
"redirect_document_id": false
@@ -24481,6 +24510,11 @@
2448124510
"source_path_from_root": "/articles/private-link/tutorial-private-endpoint-cosmosdb-portal.md",
2448224511
"redirect_url": "/azure/cosmos-db/how-to-configure-private-endpoints",
2448324512
"redirect_document_id": false
24513+
},
24514+
{
24515+
"source_path_from_root": "/articles/aks/command-invoke.md",
24516+
"redirect_url": "/azure/aks/access-private-cluster",
24517+
"redirect_document_id": false
2448424518
}
2448524519
]
2448624520
}

articles/active-directory-domain-services/check-health.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Check the health of Azure Active Directory Domain Services | Microsoft Docs
3-
description: Learn how to check the health of an Azure Active Directory Domain Services (Azure AD DS) managed domain and understand status messages using the Azure portal.
3+
description: Learn how to check the health of an Azure Active Directory Domain Services (Azure AD DS) managed domain and understand status messages.
44
services: active-directory-ds
55
author: justinha
66
manager: amycolannino
@@ -10,25 +10,26 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/29/2023
13+
ms.date: 09/13/2023
1414
ms.author: justinha
1515

1616
---
1717
# Check the health of an Azure Active Directory Domain Services managed domain
1818

19-
Azure Active Directory Domain Services (Azure AD DS) runs some background tasks to keep the managed domain healthy and up-to-date. These tasks include taking backups, applying security updates, and synchronizing data from Azure AD. If there are issues with the Azure AD DS managed domain, these tasks may not successfully complete. To review and resolve any issues, you can check the health status of a managed domain using the Azure portal.
19+
Azure Active Directory Domain Services (Azure AD DS) runs some background tasks to keep the managed domain healthy and up-to-date. These tasks include taking backups, applying security updates, and synchronizing data from Azure AD. If there are issues with the Azure AD DS managed domain, these tasks may not successfully complete. To review and resolve any issues, you can check the health status of a managed domain using the Microsoft Entra admin center.
2020

2121
This article shows you how to view the Azure AD DS health status and understand the information or alerts shown.
2222

2323
## View the health status
2424

25-
The health status for a managed domain is viewed using the Azure portal. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:
25+
The health status for a managed domain is viewed using the Microsoft Entra admin center. Information on the last backup time and synchronization with Azure AD can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:
2626

27-
1. In the Azure portal, search for and select **Azure AD Domain Services**.
27+
1. Sign in to [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator).
28+
1. Search for and select **Azure AD Domain Services**.
2829
1. Select your managed domain, such as *aaddscontoso.com*.
2930
1. On the left-hand side of the Azure AD DS resource window, select **Health**. The following example screenshot shows a healthy managed domain and the status of the last backup and Azure AD synchronization:
3031

31-
![Health page overview in the Azure portal showing the Azure Active Directory Domain Services status](./media/check-health/health-page.png)
32+
![Health page overview showing the Azure Active Directory Domain Services status](./media/check-health/health-page.png)
3233

3334
The *Last evaluated* timestamp of the health page shows when the managed domain was last checked. The health of a managed domain is evaluated every hour. If you make any changes to a managed domain, wait until the next evaluation cycle to view the updated health status.
3435

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: overview
12-
ms.date: 04/03/2023
12+
ms.date: 09/13/2023
1313
ms.author: justinha
1414

1515
#Customer intent: As an IT administrator or decision maker, I want to understand the differences between Active Directory Domain Services (AD DS), Azure AD, and Azure AD DS so I can choose the most appropriate identity solution for my organization.
@@ -24,7 +24,7 @@ Although the three Active Directory-based identity solutions share a common name
2424
* **Active Directory Domain Services (AD DS)** - Enterprise-ready lightweight directory access protocol (LDAP) server that provides key features such as identity and authentication, computer object management, group policy, and trusts.
2525
* AD DS is a central component in many organizations with an on-premises IT environment, and provides core user account authentication and computer management features.
2626
* For more information, see [Active Directory Domain Services overview in the Windows Server documentation][overview-adds].
27-
* **Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Microsoft 365, the Azure portal, or SaaS applications.
27+
* **Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Microsoft 365, the Microsoft Entra admin center, or SaaS applications.
2828
* Azure AD can be synchronized with an on-premises AD DS environment to provide a single identity to users that works natively in the cloud.
2929
* For more information about Azure AD, see [What is Azure Active Directory?][whatis-azuread]
3030
* **Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
@@ -34,7 +34,7 @@ Although the three Active Directory-based identity solutions share a common name
3434
This overview article compares and contrasts how these identity solutions can work together, or would be used independently, depending on the needs of your organization.
3535

3636
> [!div class="nextstepaction"]
37-
> [To get started, create an Azure AD DS managed domain using the Azure portal][tutorial-create]
37+
> [To get started, create an Azure AD DS managed domain using the Microsoft Entra admin center][tutorial-create]
3838
3939
## Azure AD DS and self-managed AD DS
4040

@@ -117,7 +117,7 @@ If on-premises AD DS and Azure AD are configured for federated authentication us
117117

118118
## Next steps
119119

120-
To get started with using Azure AD DS, [create an Azure AD DS managed domain using the Azure portal][tutorial-create].
120+
To get started with using Azure AD DS, [create an Azure AD DS managed domain using the Microsoft Entra admin center][tutorial-create].
121121

122122
You can also learn more about
123123
[management concepts for user accounts, passwords, and administration in Azure AD DS][administration-concepts] and [how objects and credentials are synchronized in a managed domain][synchronization].

articles/active-directory-domain-services/concepts-forest-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/02/2023
12+
ms.date: 09/13/2023
1313
ms.author: justinha
1414
---
1515

@@ -107,7 +107,7 @@ Before you can create a forest trust, you need to verify you have the correct Do
107107

108108
To create a forest trust, you must be a member of the Domain Admins group (in the forest root domain) or the Enterprise Admins group in Active Directory. Each trust is assigned a password that the administrators in both forests must know. Members of Enterprise Admins in both forests can create the trusts in both forests at once and, in this scenario, a password that is cryptographically random is automatically generated and written for both forests.
109109

110-
A managed domain forest supports up to five one-way outbound forest trusts to on-premises forests. The outbound forest trust for Azure AD Domain Services is created in the Azure portal. You don't manually create the trust with the managed domain itself. The incoming forest trust must be configured by a user with the privileges previously noted in the on-premises Active Directory.
110+
A managed domain forest supports up to five one-way outbound forest trusts to on-premises forests. The outbound forest trust for Azure AD Domain Services is created in the Microsoft Entra admin center. You don't manually create the trust with the managed domain itself. The incoming forest trust must be configured by a user with the privileges previously noted in the on-premises Active Directory.
111111

112112
## Trust processes and interactions
113113

articles/active-directory-domain-services/create-forest-trust-powershell.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/03/2023
11+
ms.date: 09/15/2023
1212
ms.author: justinha
1313
ms.custom: devx-track-azurepowershell, has-azure-ad-ps-ref
1414
#Customer intent: As an identity administrator, I want to create an Azure AD Domain Services forest and one-way outbound trust from an Azure Active Directory Domain Services forest to an on-premises Active Directory Domain Services forest using Azure PowerShell to provide authentication and resource access between forests.
@@ -52,9 +52,9 @@ To complete this article, you need the following resources and privileges:
5252
* You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Azure AD roles in your tenant to enable Azure AD DS.
5353
* You need [Domain Services Contributor](../role-based-access-control/built-in-roles.md#contributor) Azure role to create the required Azure AD DS resources.
5454

55-
## Sign in to the Azure portal
55+
## Sign in to the Microsoft Entra admin center
5656

57-
In this article, you create and configure the outbound forest trust from a managed domain using the Azure portal. To get started, first sign in to the [Azure portal](https://portal.azure.com).
57+
In this article, you create and configure the outbound forest trust from a managed domain using the Microsoft Entra admin center. To get started, first sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
5858

5959
## Deployment process
6060

@@ -161,7 +161,7 @@ Before you start, make sure you understand the [network considerations and recom
161161
* Confirm that your on-premises domain controller can connect to the managed VM using `ping` or remote desktop, for example.
162162
* Verify that your management VM can connect to your on-premises domain controllers, again using a utility such as `ping`.
163163
164-
1. In the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain, such as *aaddscontoso.com* and wait for the status to report as **Running**.
164+
1. In the Microsoft Entra admin center, search for and select **Azure AD Domain Services**. Choose your managed domain, such as *aaddscontoso.com* and wait for the status to report as **Running**.
165165
166166
When running, [update DNS settings for the Azure virtual network](tutorial-create-instance.md#update-dns-settings-for-the-azure-virtual-network) and then [enable user accounts for Azure AD DS](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) to finalize the configurations for your managed domain.
167167
@@ -226,7 +226,7 @@ To correctly resolve the managed domain from the on-premises environment, you ma
226226

227227
## Create inbound forest trust in the on-premises domain
228228

229-
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Azure portal.
229+
The on-premises AD DS domain needs an incoming forest trust for the managed domain. This trust must be manually created in the on-premises AD DS domain, it can't be created from the Microsoft Entra admin center.
230230

231231
To configure inbound trust on the on-premises AD DS domain, complete the following steps from a management workstation for the on-premises AD DS domain:
232232

@@ -235,8 +235,8 @@ To configure inbound trust on the on-premises AD DS domain, complete the followi
235235
1. Choose **Trusts** tab, then **New Trust**
236236
1. Enter the name of the managed domain, such as *aaddscontoso.com*, then select **Next**
237237
1. Select the option to create a **Forest trust**, then to create a **One way: incoming** trust.
238-
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Azure portal for the managed domain.
239-
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Azure portal in the next section.
238+
1. Choose to create the trust for **This domain only**. In the next step, you create the trust in the Microsoft Entra admin center for the managed domain.
239+
1. Choose to use **Forest-wide authentication**, then enter and confirm a trust password. This same password is also entered in the Microsoft Entra admin center in the next section.
240240
1. Step through the next few windows with default options, then choose the option for **No, do not confirm the outgoing trust**. You can't validate the trust relation because your delegated admin account to the managed domain doesn't have the required permissions. This behavior is by design.
241241
1. Select **Finish**
242242

articles/active-directory-domain-services/create-ou.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/29/2023
13+
ms.date: 09/15/2023
1414
ms.author: justinha
1515

1616
---
@@ -62,7 +62,7 @@ To create a custom OU, you use the Active Directory Administrative Tools from a
6262
> [!NOTE]
6363
> To create a custom OU in a managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
6464
65-
1. Sign in to your management VM. For steps on how to connect using the Azure portal, see [Connect to a Windows Server VM][connect-windows-server-vm].
65+
1. Sign in to your management VM. For steps on how to connect using the Microsoft Entra admin center, see [Connect to a Windows Server VM][connect-windows-server-vm].
6666
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
6767
1. To create and manage OUs, select **Active Directory Administrative Center** from the list of administrative tools.
6868
1. In the left pane, choose your managed domain, such as *aaddscontoso.com*. A list of existing OUs and resources is shown:

articles/active-directory-domain-services/csp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/29/2023
12+
ms.date: 09/15/2023
1313
ms.author: justinha
1414

1515
---
@@ -91,4 +91,4 @@ The following important considerations apply when administering a managed domain
9191

9292
## Next steps
9393

94-
To get started, [enroll in the Azure CSP program](/partner-center/enrolling-in-the-csp-program). You can then enable Azure AD Domain Services using the [Azure portal](tutorial-create-instance.md) or [Azure PowerShell](powershell-create-instance.md).
94+
To get started, [enroll in the Azure CSP program](/partner-center/enrolling-in-the-csp-program). You can then enable Azure AD Domain Services using the [Microsoft Entra admin center](tutorial-create-instance.md) or [Azure PowerShell](powershell-create-instance.md).

0 commit comments

Comments
 (0)