Skip to content

Commit 238b05b

Browse files
committed
fix png
2 parents 5c3647b + 836e811 commit 238b05b

File tree

148 files changed

+1220
-680
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

148 files changed

+1220
-680
lines changed

.openpublishing.redirection.json

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2877,7 +2877,27 @@
28772877
},
28782878
{
28792879
"source_path": "articles/automation/automation-sec-configure-azure-runas-account.md",
2880-
"redirect_url": "/azure/automation/automation-create-runas-account",
2880+
"redirect_url": "/azure/automation/manage-runas-account",
2881+
"redirect_document_id": false
2882+
},
2883+
{
2884+
"source_path": "articles/automation/automation-create-runas-account.md",
2885+
"redirect_url": "/azure/automation/manage-runas-account",
2886+
"redirect_document_id": false
2887+
},
2888+
{
2889+
"source_path": "articles/automation/automation-manage-account.md",
2890+
"redirect_url": "/azure/automation/manage-runas-account",
2891+
"redirect_document_id": false
2892+
},
2893+
{
2894+
"source_path": "articles/automation/automation-create-aduser-account.md",
2895+
"redirect_url": "/azure/automation/automation-credentials",
2896+
"redirect_document_id": false
2897+
},
2898+
{
2899+
"source_path": "articles/automation/automation-verify-runas-authentication.md",
2900+
"redirect_url": "/azure/automation/manage-runas-account",
28812901
"redirect_document_id": false
28822902
},
28832903
{

articles/active-directory/authentication/howto-mfa-nps-extension-rdg.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ Remote Desktop connection authorization policies (RD CAPs) specify the requireme
177177
![Server Name](./media/howto-mfa-nps-extension-rdg/image9.png)
178178

179179
4. In the Properties dialog box, select the **RD CAP Store** tab.
180-
5. On the RD CAP Store tab, select **Central Server running NPS**.
180+
5. On the RD CAP Store tab, select **Central server running NPS**.
181181
6. In the **Enter a name or IP address for the server running NPS** field, type the IP address or server name of the server where you installed the NPS extension.
182182

183183
![Enter Name or IP Address](./media/howto-mfa-nps-extension-rdg/image10.png)
@@ -223,7 +223,7 @@ To ensure there is time to validate users’ credentials, perform two-step verif
223223
By default, when you configure the RD Gateway to use a central policy store for connection authorization policies, the RD Gateway is configured to forward CAP requests to the NPS server. The NPS server with the Azure MFA extension installed, processes the RADIUS access request. The following steps show you how to verify the default connection request policy.
224224

225225
1. On the RD Gateway, in the NPS (Local) console, expand **Policies**, and select **Connection Request Policies**.
226-
2. Right-click **Connect Request Policies**, and double-click **TS GATEWAY AUTHORIZATION POLICY**.
226+
2. Double-click **TS GATEWAY AUTHORIZATION POLICY**.
227227
3. In the **TS GATEWAY AUTHORIZATION POLICY properties** dialog box, click the **Settings** tab.
228228
4. On **Settings** tab, under Forwarding Connection Request, click **Authentication**. RADIUS client is configured to forward requests for authentication.
229229

@@ -264,15 +264,15 @@ The Remote Desktop Gateway needs to be configured as a RADIUS client to the NPS
264264
Recall that the NPS server with the Azure MFA extension is the designated central policy store for the Connection Authorization Policy (CAP). Therefore, you need to implement a CAP on the NPS server to authorize valid connections requests.
265265

266266
1. On the NPS Server, open the NPS (Local) console, expand **Policies**, and click **Network Policies**.
267-
2. Right-click **Connections to other access servers**, and click **Duplicate policy**.
267+
2. Right-click **Connections to other access servers**, and click **Duplicate Policy**.
268268

269269
![Duplicate Policy](./media/howto-mfa-nps-extension-rdg/image19.png)
270270

271271
3. Right-click **Copy of Connections to other access servers**, and click **Properties**.
272272

273273
![Network Properties](./media/howto-mfa-nps-extension-rdg/image20.png)
274274

275-
4. In the **Copy of Connections to other access servers** dialog box, in **Policy Name**, enter a suitable name, such as _RDG_CAP_. Check **Policy enabled**, and select **Grant access**. Optionally, in **Type of network access server**, select **Remote Desktop Gateway**, or you can leave it as **Unspecified**.
275+
4. In the **Copy of Connections to other access servers** dialog box, in **Policy name**, enter a suitable name, such as _RDG_CAP_. Check **Policy enabled**, and select **Grant access**. Optionally, in **Type of network access server**, select **Remote Desktop Gateway**, or you can leave it as **Unspecified**.
276276

277277
![Copy of Connections](./media/howto-mfa-nps-extension-rdg/image21.png)
278278

articles/active-directory/connect-health/active-directory-aadconnect-health-agent-install.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ The following table is a list of requirements for using Azure AD Connect Health.
2626
| --- | --- |
2727
| Azure AD Premium |Azure AD Connect Health is an Azure AD Premium feature and requires Azure AD Premium. </br></br>For more information, see [Getting started with Azure AD Premium](../fundamentals/active-directory-get-started-premium.md) </br>To start a free 30-day trial, see [Start a trial.](https://azure.microsoft.com/trial/get-started-active-directory/) |
2828
| You must be a global administrator of your Azure AD to get started with Azure AD Connect Health |By default, only the global administrators can install and configure the health agents to get started, access the portal, and perform any operations within Azure AD Connect Health. For more information, see [Administering your Azure AD directory](../fundamentals/active-directory-administer.md). <br><br> Using Role Based Access Control you can allow access to Azure AD Connect Health to other users in your organization. For more information, see [Role Based Access Control for Azure AD Connect Health.](active-directory-aadconnect-health-operations.md#manage-access-with-role-based-access-control) </br></br>**Important:** The account used when installing the agents must be a work or school account. It cannot be a Microsoft account. For more information, see [Sign up for Azure as an organization](../fundamentals/sign-up-organization.md) |
29-
| Azure AD Connect Health Agent is installed on each targeted server | Azure AD Connect Health requires the Health Agents to be installed and configured on targeted servers to receive the data and provide the Monitoring and Analytics capabilities </br></br>For example, to get data from your AD FS infrastructure, the agent must be installed on the AD FS and Web Application Proxy servers. Similarly, to get data on your on-premises AD DS infrastructure, the agent must be installed on the domain controllers. </br></br> |
29+
| Azure AD Connect Health Agent is installed on each targeted server | Azure AD Connect Health requires the Health Agents to be installed and configured on targeted servers to receive the data and provide the Monitoring and Analytics capabilities. </br></br>For example, to get data from your AD FS infrastructure, the agent must be installed on the AD FS and Web Application Proxy servers. Similarly, to get data on your on-premises AD DS infrastructure, the agent must be installed on the domain controllers. </br></br> |
3030
| Outbound connectivity to the Azure service endpoints | During installation and runtime, the agent requires connectivity to Azure AD Connect Health service endpoints. If outbound connectivity is blocked using Firewalls, ensure that the following endpoints are added to the allowed list. See [outbound connectivity endpoints](active-directory-aadconnect-health-agent-install.md#outbound-connectivity-to-the-azure-service-endpoints) |
3131
|Outbound connectivity based on IP Addresses | For IP address based filtering on firewalls, refer to the [Azure IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653).|
3232
| SSL Inspection for outbound traffic is filtered or disabled | The agent registration step or data upload operations may fail if there is SSL inspection or termination for outbound traffic at the network layer. Read more about [how to setup SSL inspection](https://technet.microsoft.com/library/ee796230.aspx) |
3333
| Firewall ports on the server running the agent |The agent requires the following firewall ports to be open in order for the agent to communicate with the Azure AD Health service endpoints.</br></br><li>TCP port 443</li><li>TCP port 5671</li> </br>Read more about [enable firewall ports](https://technet.microsoft.com/library/ms345310(v=sql.100).aspx) |
3434
| Allow the following websites if IE Enhanced Security is enabled |If IE Enhanced Security is enabled, then the following websites must be allowed on the server that is going to have the agent installed.</br></br><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com</li><li>https:\//login.windows.net</li><li>The federation server for your organization trusted by Azure Active Directory. For example: https:\//sts.contoso.com</li> Read more about [how to configure IE](https://support.microsoft.com/help/815141/internet-explorer-enhanced-security-configuration-changes-the-browsing) |
35-
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](http://www.microsoft.com/download/details.aspx?id=40855) the Windows Menagement Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|
35+
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](http://www.microsoft.com/download/details.aspx?id=40855) the Windows Management Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|
3636
|Disable FIPS|FIPS is not supported by Azure AD Connect Health agents.|
3737

3838
### Outbound connectivity to the Azure service endpoints
@@ -57,6 +57,11 @@ The following table is a list of requirements for using Azure AD Connect Health.
5757
* [See the installation instructions](#installing-the-azure-ad-connect-health-agent-for-ad-ds).
5858

5959
## Installing the Azure AD Connect Health Agent for AD FS
60+
> [!NOTE]
61+
> AD FS server should be different from your Sync server. Do not install AD FS agent to your Sync server.
62+
>
63+
64+
Before installation, make sure your AD FS server host name is unique and not present in the AD FS service.
6065
To start the agent installation, double-click the .exe file that you downloaded. On the first screen, click Install.
6166

6267
![Verify Azure AD Connect Health](./media/active-directory-aadconnect-health-requirements/install1.png)
@@ -161,6 +166,10 @@ Note that "basic" audit level is enabled by default. Read more about the [AD FS
161166
162167

163168
## Installing the Azure AD Connect Health agent for sync
169+
> [!NOTE]
170+
> Sync server should be different from your AD FS server. Do not install Sync agent to your AD FS server.
171+
>
172+
164173
The Azure AD Connect Health agent for sync is installed automatically in the latest build of Azure AD Connect. To use Azure AD Connect for sync, you need to download the latest version of Azure AD Connect and install it. You can download the latest version [here](http://www.microsoft.com/download/details.aspx?id=47594).
165174

166175
To verify the agent has been installed, look for the following services on the server. If you completed the configuration, they should already be running. Otherwise, they are stopped until the configuration is complete.

articles/active-directory/connect/active-directory-aadconnect-feature-device-writeback.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@ This provides additional security and assurance that access to applications is g
3333
> [!IMPORTANT]
3434
> <li>Devices must be located in the same forest as the users. Since devices must be written back to a single forest, this feature does not currently support a deployment with multiple user forests.</li>
3535
> <li>Only one device registration configuration object can be added to the on-premises Active Directory forest. This feature is not compatible with a topology where the on-premises Active Directory is synchronized to multiple Azure AD directories.</li>
36-
>
37-
>
3836
3937
## Part 1: Install Azure AD Connect
4038
Install Azure AD Connect using Custom or Express settings. Microsoft recommends to start with all users and groups successfully synchronized before you enable device writeback.

articles/active-directory/develop/active-directory-v2-limitations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 07/12/2017
17+
ms.date: 08/14/2018
1818
ms.author: celested
1919
ms.reviewer: hirsin, dastrock
2020
ms.custom: aaddev
@@ -97,6 +97,7 @@ Currently, library support for the v2.0 endpoint is limited. If you want to use
9797
* If you are building a desktop or mobile application, you can use one of the preview Microsoft Authentication Libraries (MSAL). These libraries are in a production-supported preview, so it is safe to use them in production applications. You can read more about the terms of the preview and the available libraries in [authentication libraries reference](reference-v2-libraries.md).
9898
* For platforms not covered by Microsoft libraries, you can integrate with the v2.0 endpoint by directly sending and receiving protocol messages in your application code. The v2.0 OpenID Connect and OAuth protocols [are explicitly documented](active-directory-v2-protocols.md) to help you perform such an integration.
9999
* Finally, you can use open-source Open ID Connect and OAuth libraries to integrate with the v2.0 endpoint. The v2.0 protocol should be compatible with many open-source protocol libraries without major changes. The availability of these kinds of libraries varies by language and platform. The [Open ID Connect](http://openid.net/connect/) and [OAuth 2.0](http://oauth.net/2/) websites maintain a list of popular implementations. For more information, see [Azure Active Directory v2.0 and authentication libraries](reference-v2-libraries.md), and the list of open-source client libraries and samples that have been tested with the v2.0 endpoint.
100+
* For reference, the `.well-known` endpoint for the v2.0 common endpoint is `https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration` . Replace `common` with your tenant ID to get data specific to your tenant.
100101

101102
## Restrictions on protocols
102103

@@ -105,7 +106,6 @@ The v2.0 endpoint does not support SAML or WS-Federation; it only supports Open
105106
The following protocol features and capabilities currently are *not available* in the v2.0 endpoint:
106107

107108
* Currently, the `email` claim is returned only if an optional claim is configured and scope is scope=email was specified in the request. However, this behavior will change as the v2.0 endpoint is updated to further comply with the Open ID Connect and OAuth2.0 standards.
108-
* The OpenID Connect UserInfo endpoint is not implemented on the v2.0 endpoint. However, all user profile data that you potentially would receive at this endpoint is available from the Microsoft Graph `/me` endpoint.
109109
* The v2.0 endpoint does not support issuing role or group claims in ID tokens.
110110
* The [OAuth 2.0 Resource Owner Password Credentials Grant](https://tools.ietf.org/html/rfc6749#section-4.3) is not supported by the v2.0 endpoint.
111111

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 01/07/2017
17+
ms.date: 08/21/2018
1818
ms.author: celested
1919
ms.reviewer: hirsin, dastrock
2020
ms.custom: aaddev
@@ -70,6 +70,19 @@ If your app does not request the `offline_access` scope, it won't receive refres
7070

7171
For more information about how to get and use refresh tokens, see the [v2.0 protocol reference](active-directory-v2-protocols.md).
7272

73+
## Accessing v1.0 resources
74+
v2.0 applications can request tokens and consent for v1.0 applications (such as the PowerBI API `https://analysis.windows.net/powerbi/api` or Sharepoint API `https://{tenant}.sharepoint.com`). To do so, you can reference the app URI and scope string in the `scope` parameter. For example, `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All` would request the PowerBI `View all Datasets` permission for your application.
75+
76+
To request multiple permissions, append the entire URI with a space or `+`, e.g. `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://analysis.windows.net/powerbi/api/Report.Read.All`. This requests both the `View all Datasets` and `View all Reports` permissions. Note that as with all Azure AD scopes and permissions, applications can only make a request to one resource at a time - so the request `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://api.skypeforbusiness.com/Conversations.Initiate`, which requests both the PowerBI `View all Datasets` permission and the Skype for Business `Initiate conversations` permission, will be rejected due to requesting permissions on two different resources.
77+
78+
### v1.0 resources and tenancy
79+
Both the v1.0 and v2.0 Azure AD protocols use a `{tenant}` parameter embedded in the URI (`https://login.microsoftonline.com/{tenant}/oauth2/`). When using the v2.0 endpoint to access a v1.0 organizational resource, the `common` and `consumers` tenants cannot be used, as these resources are only accessible with organizational (Azure AD) accounts. Thus, when accessing these resources, only the tenant GUID or `organizations` can be used as the `{tenant}` parameter.
80+
81+
If an application attempts to access an organizational v1.0 resource using an incorrect tenant, an error similar to the one below will be returned.
82+
83+
`AADSTS90124: Resource 'https://analysis.windows.net/powerbi/api' (Microsoft.Azure.AnalysisServices) is not supported over the /common or /consumers endpoints. Please use the /organizations or tenant-specific endpoint.`
84+
85+
7386
## Requesting individual user consent
7487
In an [OpenID Connect or OAuth 2.0](active-directory-v2-protocols.md) authorization request, an app can request the permissions it needs by using the `scope` query parameter. For example, when a user signs in to an app, the app sends a request like the following example (with line breaks added for legibility):
7588

articles/active-directory/manage-apps/application-proxy-integrate-with-tableau.md

Lines changed: 4 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,19 @@
11
---
22
title: Azure Active Directory Application Proxy and Tableau | Microsoft Docs
3-
description: Learn how to use Azure Active Directory (Azure AD) Application Proxy to provide remote access for your Tableau deployment. .
3+
description: Learn how to use Azure Active Directory (Azure AD) Application Proxy to provide remote access for your Tableau deployment.
44
services: active-directory
5-
documentationcenter: ''
65
author: barbkess
76
manager: mtillman
8-
97
ms.service: active-directory
108
ms.component: app-mgmt
119
ms.workload: identity
12-
ms.tgt_pltfrm: na
13-
ms.devlang: na
1410
ms.topic: conceptual
15-
ms.date: 05/24/2018
11+
ms.date: 08/20/2018
1612
ms.author: barbkess
17-
ms.reviewer: harshja
13+
ms.reviewer: japere
1814
ms.custom: it-pro
19-
2015
---
2116

22-
2317
# Azure Active Directory Application Proxy and Tableau
2418

2519
Azure Active Directory Application Proxy and Tableau have partnered to ensure you are easily able to use Application Proxy to provide remote access for your Tableau deployment. This article explains how to configure this scenario.
@@ -33,19 +27,10 @@ The scenario in this article assumes that you have:
3327
- An [Application Proxy connector](application-proxy-enable.md) installed.
3428

3529

36-
3730
## Enabling Application Proxy for Tableau
3831

39-
If you want to use Application Proxy for Tableau, you need to send an email to [[email protected]](mailto:[email protected]) to get this scenario enabled.
40-
In your email:
32+
Application Proxy supports the OAuth 2.0 Grant Flow, which is required for Tableau to work properly. This means that there are no longer any special steps required to enable this application, other than configuring it by following the publishing steps below.
4133

42-
- Use Enable Application Proxy for Tableau as subject
43-
- Include your tenant ID in the body
44-
45-
You get a confirmation when you are ready to use the application. You can finish the configurations while waiting for the confirmation.
46-
47-
48-
4934

5035
## Publish your applications in Azure
5136

-4.55 KB
Loading
1.23 KB
Loading
3.6 KB
Loading

0 commit comments

Comments
 (0)