You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
4. In the Properties dialog box, select the **RD CAP Store** tab.
180
-
5. On the RD CAP Store tab, select **Central Server running NPS**.
180
+
5. On the RD CAP Store tab, select **Central server running NPS**.
181
181
6. In the **Enter a name or IP address for the server running NPS** field, type the IP address or server name of the server where you installed the NPS extension.
182
182
183
183

@@ -223,7 +223,7 @@ To ensure there is time to validate users’ credentials, perform two-step verif
223
223
By default, when you configure the RD Gateway to use a central policy store for connection authorization policies, the RD Gateway is configured to forward CAP requests to the NPS server. The NPS server with the Azure MFA extension installed, processes the RADIUS access request. The following steps show you how to verify the default connection request policy.
224
224
225
225
1. On the RD Gateway, in the NPS (Local) console, expand **Policies**, and select **Connection Request Policies**.
226
-
2.Right-click **Connect Request Policies**, and double-click **TS GATEWAY AUTHORIZATION POLICY**.
3. In the **TS GATEWAY AUTHORIZATION POLICY properties** dialog box, click the **Settings** tab.
228
228
4. On **Settings** tab, under Forwarding Connection Request, click **Authentication**. RADIUS client is configured to forward requests for authentication.
229
229
@@ -264,15 +264,15 @@ The Remote Desktop Gateway needs to be configured as a RADIUS client to the NPS
264
264
Recall that the NPS server with the Azure MFA extension is the designated central policy store for the Connection Authorization Policy (CAP). Therefore, you need to implement a CAP on the NPS server to authorize valid connections requests.
265
265
266
266
1. On the NPS Server, open the NPS (Local) console, expand **Policies**, and click **Network Policies**.
267
-
2. Right-click **Connections to other access servers**, and click **Duplicate policy**.
267
+
2. Right-click **Connections to other access servers**, and click **Duplicate Policy**.
4. In the **Copy of Connections to other access servers** dialog box, in **Policy Name**, enter a suitable name, such as _RDG_CAP_. Check **Policy enabled**, and select **Grant access**. Optionally, in **Type of network access server**, select **Remote Desktop Gateway**, or you can leave it as **Unspecified**.
275
+
4. In the **Copy of Connections to other access servers** dialog box, in **Policy name**, enter a suitable name, such as _RDG_CAP_. Check **Policy enabled**, and select **Grant access**. Optionally, in **Type of network access server**, select **Remote Desktop Gateway**, or you can leave it as **Unspecified**.
276
276
277
277

Copy file name to clipboardExpand all lines: articles/active-directory/connect-health/active-directory-aadconnect-health-agent-install.md
+11-2Lines changed: 11 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,13 @@ The following table is a list of requirements for using Azure AD Connect Health.
26
26
| --- | --- |
27
27
| Azure AD Premium |Azure AD Connect Health is an Azure AD Premium feature and requires Azure AD Premium. </br></br>For more information, see [Getting started with Azure AD Premium](../fundamentals/active-directory-get-started-premium.md) </br>To start a free 30-day trial, see [Start a trial.](https://azure.microsoft.com/trial/get-started-active-directory/)|
28
28
| You must be a global administrator of your Azure AD to get started with Azure AD Connect Health |By default, only the global administrators can install and configure the health agents to get started, access the portal, and perform any operations within Azure AD Connect Health. For more information, see [Administering your Azure AD directory](../fundamentals/active-directory-administer.md). <br><br> Using Role Based Access Control you can allow access to Azure AD Connect Health to other users in your organization. For more information, see [Role Based Access Control for Azure AD Connect Health.](active-directory-aadconnect-health-operations.md#manage-access-with-role-based-access-control) </br></br>**Important:** The account used when installing the agents must be a work or school account. It cannot be a Microsoft account. For more information, see [Sign up for Azure as an organization](../fundamentals/sign-up-organization.md)|
29
-
| Azure AD Connect Health Agent is installed on each targeted server | Azure AD Connect Health requires the Health Agents to be installed and configured on targeted servers to receive the data and provide the Monitoring and Analytics capabilities </br></br>For example, to get data from your AD FS infrastructure, the agent must be installed on the AD FS and Web Application Proxy servers. Similarly, to get data on your on-premises AD DS infrastructure, the agent must be installed on the domain controllers. </br></br> |
29
+
| Azure AD Connect Health Agent is installed on each targeted server | Azure AD Connect Health requires the Health Agents to be installed and configured on targeted servers to receive the data and provide the Monitoring and Analytics capabilities. </br></br>For example, to get data from your AD FS infrastructure, the agent must be installed on the AD FS and Web Application Proxy servers. Similarly, to get data on your on-premises AD DS infrastructure, the agent must be installed on the domain controllers. </br></br> |
30
30
| Outbound connectivity to the Azure service endpoints | During installation and runtime, the agent requires connectivity to Azure AD Connect Health service endpoints. If outbound connectivity is blocked using Firewalls, ensure that the following endpoints are added to the allowed list. See [outbound connectivity endpoints](active-directory-aadconnect-health-agent-install.md#outbound-connectivity-to-the-azure-service-endpoints)|
31
31
|Outbound connectivity based on IP Addresses | For IP address based filtering on firewalls, refer to the [Azure IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653).|
32
32
| SSL Inspection for outbound traffic is filtered or disabled | The agent registration step or data upload operations may fail if there is SSL inspection or termination for outbound traffic at the network layer. Read more about [how to setup SSL inspection](https://technet.microsoft.com/library/ee796230.aspx)|
33
33
| Firewall ports on the server running the agent |The agent requires the following firewall ports to be open in order for the agent to communicate with the Azure AD Health service endpoints.</br></br><li>TCP port 443</li><li>TCP port 5671</li> </br>Read more about [enable firewall ports](https://technet.microsoft.com/library/ms345310(v=sql.100).aspx)|
34
34
| Allow the following websites if IE Enhanced Security is enabled |If IE Enhanced Security is enabled, then the following websites must be allowed on the server that is going to have the agent installed.</br></br><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com</li><li>https:\//login.windows.net</li><li>The federation server for your organization trusted by Azure Active Directory. For example: https:\//sts.contoso.com</li> Read more about [how to configure IE](https://support.microsoft.com/help/815141/internet-explorer-enhanced-security-configuration-changes-the-browsing)|
35
-
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](http://www.microsoft.com/download/details.aspx?id=40855) the Windows Menagement Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|
35
+
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](http://www.microsoft.com/download/details.aspx?id=40855) the Windows Management Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|
36
36
|Disable FIPS|FIPS is not supported by Azure AD Connect Health agents.|
37
37
38
38
### Outbound connectivity to the Azure service endpoints
@@ -57,6 +57,11 @@ The following table is a list of requirements for using Azure AD Connect Health.
57
57
*[See the installation instructions](#installing-the-azure-ad-connect-health-agent-for-ad-ds).
58
58
59
59
## Installing the Azure AD Connect Health Agent for AD FS
60
+
> [!NOTE]
61
+
> AD FS server should be different from your Sync server. Do not install AD FS agent to your Sync server.
62
+
>
63
+
64
+
Before installation, make sure your AD FS server host name is unique and not present in the AD FS service.
60
65
To start the agent installation, double-click the .exe file that you downloaded. On the first screen, click Install.
61
66
62
67

@@ -161,6 +166,10 @@ Note that "basic" audit level is enabled by default. Read more about the [AD FS
161
166
162
167
163
168
## Installing the Azure AD Connect Health agent for sync
169
+
> [!NOTE]
170
+
> Sync server should be different from your AD FS server. Do not install Sync agent to your AD FS server.
171
+
>
172
+
164
173
The Azure AD Connect Health agent for sync is installed automatically in the latest build of Azure AD Connect. To use Azure AD Connect for sync, you need to download the latest version of Azure AD Connect and install it. You can download the latest version [here](http://www.microsoft.com/download/details.aspx?id=47594).
165
174
166
175
To verify the agent has been installed, look for the following services on the server. If you completed the configuration, they should already be running. Otherwise, they are stopped until the configuration is complete.
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-feature-device-writeback.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,8 +33,6 @@ This provides additional security and assurance that access to applications is g
33
33
> [!IMPORTANT]
34
34
> <li>Devices must be located in the same forest as the users. Since devices must be written back to a single forest, this feature does not currently support a deployment with multiple user forests.</li>
35
35
> <li>Only one device registration configuration object can be added to the on-premises Active Directory forest. This feature is not compatible with a topology where the on-premises Active Directory is synchronized to multiple Azure AD directories.</li>
36
-
>
37
-
>
38
36
39
37
## Part 1: Install Azure AD Connect
40
38
Install Azure AD Connect using Custom or Express settings. Microsoft recommends to start with all users and groups successfully synchronized before you enable device writeback.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-v2-limitations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 07/12/2017
17
+
ms.date: 08/14/2018
18
18
ms.author: celested
19
19
ms.reviewer: hirsin, dastrock
20
20
ms.custom: aaddev
@@ -97,6 +97,7 @@ Currently, library support for the v2.0 endpoint is limited. If you want to use
97
97
* If you are building a desktop or mobile application, you can use one of the preview Microsoft Authentication Libraries (MSAL). These libraries are in a production-supported preview, so it is safe to use them in production applications. You can read more about the terms of the preview and the available libraries in [authentication libraries reference](reference-v2-libraries.md).
98
98
* For platforms not covered by Microsoft libraries, you can integrate with the v2.0 endpoint by directly sending and receiving protocol messages in your application code. The v2.0 OpenID Connect and OAuth protocols [are explicitly documented](active-directory-v2-protocols.md) to help you perform such an integration.
99
99
* Finally, you can use open-source Open ID Connect and OAuth libraries to integrate with the v2.0 endpoint. The v2.0 protocol should be compatible with many open-source protocol libraries without major changes. The availability of these kinds of libraries varies by language and platform. The [Open ID Connect](http://openid.net/connect/) and [OAuth 2.0](http://oauth.net/2/) websites maintain a list of popular implementations. For more information, see [Azure Active Directory v2.0 and authentication libraries](reference-v2-libraries.md), and the list of open-source client libraries and samples that have been tested with the v2.0 endpoint.
100
+
* For reference, the `.well-known` endpoint for the v2.0 common endpoint is `https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration` . Replace `common` with your tenant ID to get data specific to your tenant.
100
101
101
102
## Restrictions on protocols
102
103
@@ -105,7 +106,6 @@ The v2.0 endpoint does not support SAML or WS-Federation; it only supports Open
105
106
The following protocol features and capabilities currently are *not available* in the v2.0 endpoint:
106
107
107
108
* Currently, the `email` claim is returned only if an optional claim is configured and scope is scope=email was specified in the request. However, this behavior will change as the v2.0 endpoint is updated to further comply with the Open ID Connect and OAuth2.0 standards.
108
-
* The OpenID Connect UserInfo endpoint is not implemented on the v2.0 endpoint. However, all user profile data that you potentially would receive at this endpoint is available from the Microsoft Graph `/me` endpoint.
109
109
* The v2.0 endpoint does not support issuing role or group claims in ID tokens.
110
110
* The [OAuth 2.0 Resource Owner Password Credentials Grant](https://tools.ietf.org/html/rfc6749#section-4.3) is not supported by the v2.0 endpoint.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-permissions-and-consent.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 01/07/2017
17
+
ms.date: 08/21/2018
18
18
ms.author: celested
19
19
ms.reviewer: hirsin, dastrock
20
20
ms.custom: aaddev
@@ -70,6 +70,19 @@ If your app does not request the `offline_access` scope, it won't receive refres
70
70
71
71
For more information about how to get and use refresh tokens, see the [v2.0 protocol reference](active-directory-v2-protocols.md).
72
72
73
+
## Accessing v1.0 resources
74
+
v2.0 applications can request tokens and consent for v1.0 applications (such as the PowerBI API `https://analysis.windows.net/powerbi/api` or Sharepoint API `https://{tenant}.sharepoint.com`). To do so, you can reference the app URI and scope string in the `scope` parameter. For example, `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All` would request the PowerBI `View all Datasets` permission for your application.
75
+
76
+
To request multiple permissions, append the entire URI with a space or `+`, e.g. `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://analysis.windows.net/powerbi/api/Report.Read.All`. This requests both the `View all Datasets` and `View all Reports` permissions. Note that as with all Azure AD scopes and permissions, applications can only make a request to one resource at a time - so the request `scope=https://analysis.windows.net/powerbi/api/Dataset.Read.All+https://api.skypeforbusiness.com/Conversations.Initiate`, which requests both the PowerBI `View all Datasets` permission and the Skype for Business `Initiate conversations` permission, will be rejected due to requesting permissions on two different resources.
77
+
78
+
### v1.0 resources and tenancy
79
+
Both the v1.0 and v2.0 Azure AD protocols use a `{tenant}` parameter embedded in the URI (`https://login.microsoftonline.com/{tenant}/oauth2/`). When using the v2.0 endpoint to access a v1.0 organizational resource, the `common` and `consumers` tenants cannot be used, as these resources are only accessible with organizational (Azure AD) accounts. Thus, when accessing these resources, only the tenant GUID or `organizations` can be used as the `{tenant}` parameter.
80
+
81
+
If an application attempts to access an organizational v1.0 resource using an incorrect tenant, an error similar to the one below will be returned.
82
+
83
+
`AADSTS90124: Resource 'https://analysis.windows.net/powerbi/api' (Microsoft.Azure.AnalysisServices) is not supported over the /common or /consumers endpoints. Please use the /organizations or tenant-specific endpoint.`
84
+
85
+
73
86
## Requesting individual user consent
74
87
In an [OpenID Connect or OAuth 2.0](active-directory-v2-protocols.md) authorization request, an app can request the permissions it needs by using the `scope` query parameter. For example, when a user signs in to an app, the app sends a request like the following example (with line breaks added for legibility):
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/application-proxy-integrate-with-tableau.md
+4-19Lines changed: 4 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,19 @@
1
1
---
2
2
title: Azure Active Directory Application Proxy and Tableau | Microsoft Docs
3
-
description: Learn how to use Azure Active Directory (Azure AD) Application Proxy to provide remote access for your Tableau deployment. .
3
+
description: Learn how to use Azure Active Directory (Azure AD) Application Proxy to provide remote access for your Tableau deployment.
4
4
services: active-directory
5
-
documentationcenter: ''
6
5
author: barbkess
7
6
manager: mtillman
8
-
9
7
ms.service: active-directory
10
8
ms.component: app-mgmt
11
9
ms.workload: identity
12
-
ms.tgt_pltfrm: na
13
-
ms.devlang: na
14
10
ms.topic: conceptual
15
-
ms.date: 05/24/2018
11
+
ms.date: 08/20/2018
16
12
ms.author: barbkess
17
-
ms.reviewer: harshja
13
+
ms.reviewer: japere
18
14
ms.custom: it-pro
19
-
20
15
---
21
16
22
-
23
17
# Azure Active Directory Application Proxy and Tableau
24
18
25
19
Azure Active Directory Application Proxy and Tableau have partnered to ensure you are easily able to use Application Proxy to provide remote access for your Tableau deployment. This article explains how to configure this scenario.
@@ -33,19 +27,10 @@ The scenario in this article assumes that you have:
33
27
- An [Application Proxy connector](application-proxy-enable.md) installed.
34
28
35
29
36
-
37
30
## Enabling Application Proxy for Tableau
38
31
39
-
If you want to use Application Proxy for Tableau, you need to send an email to [[email protected]](mailto:[email protected]) to get this scenario enabled.
40
-
In your email:
32
+
Application Proxy supports the OAuth 2.0 Grant Flow, which is required for Tableau to work properly. This means that there are no longer any special steps required to enable this application, other than configuring it by following the publishing steps below.
41
33
42
-
- Use Enable Application Proxy for Tableau as subject
43
-
- Include your tenant ID in the body
44
-
45
-
You get a confirmation when you are ready to use the application. You can finish the configurations while waiting for the confirmation.
0 commit comments