Skip to content

Commit 2eb5052

Browse files
authored
Merge pull request #101387 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents e7f6d4e + 11d4023 commit 2eb5052

File tree

8 files changed

+98
-11
lines changed

8 files changed

+98
-11
lines changed

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,12 +21,17 @@ It is probably not a surprise that an Azure Active Directory (Azure AD) joined d
2121

2222
This article explains how this works.
2323

24+
## Prerequisites
25+
26+
If Azure AD joined machines are not connected to your organization's network, a VPN or other network infrastructure is required. On-premises SSO requires line-of-sight communication with your on-premises AD DS domain controllers.
27+
2428
## How it works
2529

2630
Because you need to remember just one single user name and password, SSO simplifies access to your resources and improves the security of your environment. With an Azure AD joined device, your users already have an SSO experience to the cloud apps in your environment. If your environment has an Azure AD and an on-premises AD, you probably want to expand the scope of your SSO experience to your on-premises Line Of Business (LOB) apps, file shares, and printers.
2731

2832
Azure AD joined devices have no knowledge about your on-premises AD environment because they aren't joined to it. However, you can provide additional information about your on-premises AD to these devices with Azure AD Connect.
29-
An environment that has both, an Azure AD and an on-premises AD, is also known has hybrid environment. If you have a hybrid environment, it is likely that you already have Azure AD Connect deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, Azure AD Connect synchronizes on-premises domain information to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
33+
34+
An environment that has both, an Azure AD and an on-premises AD, is also known has hybrid environment. If you have a hybrid environment, it is likely that you already have Azure AD Connect deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, Azure AD Connect synchronizes on-premises user information to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
3035

3136
1. Azure AD sends the name of the on-premises domain the user is a member of back to the device.
3237
1. The local security authority (LSA) service enables Kerberos authentication on the device.

articles/cognitive-services/Speech-Service/includes/quickstarts/translate-sts/csharp/csharp.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,5 +18,7 @@ ms.author: erhopf
1818
[!INCLUDE [dotnet](./dotnet.md)]
1919
#### [.NET Core](#tab/dotnetcore)
2020
[!INCLUDE [dotnetcore](./dotnetcore.md)]
21+
#### [UWP](#tab/uwp)
22+
[!INCLUDE [uwp](./uwp.md)]
2123

22-
* * *
24+
* * *

articles/cognitive-services/Speech-Service/includes/quickstarts/translate-stt/csharp/csharp.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,5 +18,7 @@ ms.author: erhopf
1818
[!INCLUDE [dotnet](./dotnet.md)]
1919
#### [.NET Core](#tab/dotnetcore)
2020
[!INCLUDE [dotnetcore](./dotnetcore.md)]
21+
#### [UWP](#tab/uwp)
22+
[!INCLUDE [uwp](./uwp.md)]
2123

22-
* * *
24+
* * *

articles/governance/blueprints/concepts/deployment-stages.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Stages of a blueprint deployment
3-
description: Learn the security and artifact related steps the Azure Blueprint services goes through while creating a blueprint assignment.
3+
description: Learn the security and artifact related steps the Azure Blueprints services goes through while creating a blueprint assignment.
44
ms.date: 11/13/2019
55
ms.topic: conceptual
66
---
@@ -32,7 +32,7 @@ principal doesn't get and doesn't need owner rights on the subscription.
3232

3333
The rights are granted automatically if the assignment is done through the portal. However, if the
3434
assignment is done through the REST API, granting the rights needs to be done with a separate API
35-
call. The Azure Blueprint AppId is `f71766dc-90d9-4b7d-bd9d-4499c4331c3f`, but the service principal
35+
call. The Azure Blueprints AppId is `f71766dc-90d9-4b7d-bd9d-4499c4331c3f`, but the service principal
3636
varies by tenant. Use
3737
[Azure Active Directory Graph API](../../../active-directory/develop/active-directory-graph-api.md)
3838
and REST endpoint [servicePrincipals](/graph/api/resources/serviceprincipal) to get the service
@@ -98,4 +98,4 @@ subscription. Rights removal prevents Blueprints from becoming a permanent owner
9898
- Learn to customize the [blueprint sequencing order](sequencing-order.md).
9999
- Find out how to make use of [blueprint resource locking](resource-locking.md).
100100
- Learn how to [update existing assignments](../how-to/update-existing-assignments.md).
101-
- Resolve issues during the assignment of a blueprint with [general troubleshooting](../troubleshoot/general.md).
101+
- Resolve issues during the assignment of a blueprint with [general troubleshooting](../troubleshoot/general.md).

articles/security-center/security-center-just-in-time.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,8 @@ When a user requests access to a VM, Security Center checks that the user has [R
4444

4545
| To enable a user to: | Permissions to set|
4646
| --- | --- |
47-
| Configure or edit a JIT policy for a VM | *Assign these actions to the role:* <ul><li>On the scope of a subscription or Resource Group that is associated with the VM:<br/> ```Microsoft.Security/locations/jitNetworkAccessPolicies/write``` </li><li> On the scope of a subscription or Resource Group or VM: <br/>```Microsoft.Compute/virtualMachines/write```</li></ul> |
48-
| ||
49-
|Request JIT access to a VM | *Assign these actions to the user:* <ul><li>On the scope of a subscription or Resource Group that is associated with the VM:<br/> ```Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action``` </li><li> On the scope of a Subscription or Resource Group or VM:<br/> ```Microsoft.Compute/virtualMachines/read``` </li></ul>|
47+
| Configure or edit a JIT policy for a VM | *Assign these actions to the role:* <ul><li>On the scope of a subscription or resource group that is associated with the VM:<br/> `Microsoft.Security/locations/jitNetworkAccessPolicies/write` </li><li> On the scope of a subscription or resource group or VM: <br/>`Microsoft.Compute/virtualMachines/write`</li></ul> |
48+
|Request JIT access to a VM | *Assign these actions to the user:* <ul><li>On the scope of a subscription or resource group that is associated with the VM:<br/> `Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action` </li><li>On the scope of a subscription or resource group that is associated with the VM:<br/> `Microsoft.Security/locations/jitNetworkAccessPolicies/*/read` </li><li> On the scope of a subscription or resource group or VM:<br/> `Microsoft.Compute/virtualMachines/read` </li><li> On the scope of a subscription or resource group or VM:<br/> `Microsoft.Network/networkInterfaces/*/read` </li></ul>|
5049

5150

5251
## Configure JIT on a VM

articles/sentinel/connect-azure-activity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You can stream logs from [Azure Activity log](../azure-monitor/platform/platform
2727

2828
## Prerequisites
2929

30-
- User with global administrator or security administrator permissions
30+
- User with contributor permissions to Log Analytics workspace
3131

3232

3333
## Connect to Azure Activity log

articles/virtual-machines/extensions/diagnostics-linux.md

Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,85 @@ az vm extension set --publisher Microsoft.Azure.Diagnostics --name LinuxDiagnost
8686

8787
The URL for the sample configuration, and its contents, are subject to change. Download a copy of the portal settings JSON file and customize it for your needs. Any templates or automation you construct should use your own copy, rather than downloading that URL each time.
8888

89+
#### PowerShell sample
90+
91+
```Powershell
92+
// Set your Azure VM diagnostics variables correctly below - don't forget to replace the VMResourceID
93+
94+
$SASKey = '<SASKeyForDiagStorageAccount>'
95+
96+
$ladCfg = "{
97+
'diagnosticMonitorConfiguration': {
98+
'performanceCounters': {
99+
'sinks': 'WADMetricEventHub,WADMetricJsonBlob',
100+
'performanceCounterConfiguration': [
101+
{
102+
'unit': 'Percent',
103+
'type': 'builtin',
104+
'counter': 'PercentProcessorTime',
105+
'counterSpecifier': '/builtin/Processor/PercentProcessorTime',
106+
'annotation': [
107+
{
108+
'locale': 'en-us',
109+
'displayName': 'Aggregate CPU %utilization'
110+
}
111+
],
112+
'condition': 'IsAggregate=TRUE',
113+
'class': 'Processor'
114+
},
115+
{
116+
'unit': 'Bytes',
117+
'type': 'builtin',
118+
'counter': 'UsedSpace',
119+
'counterSpecifier': '/builtin/FileSystem/UsedSpace',
120+
'annotation': [
121+
{
122+
'locale': 'en-us',
123+
'displayName': 'Used disk space on /'
124+
}
125+
],
126+
'condition': 'Name='/'',
127+
'class': 'Filesystem'
128+
}
129+
]
130+
},
131+
'metrics': {
132+
'metricAggregation': [
133+
{
134+
'scheduledTransferPeriod': 'PT1H'
135+
},
136+
{
137+
'scheduledTransferPeriod': 'PT1M'
138+
}
139+
],
140+
'resourceId': '<VMResourceID>'
141+
},
142+
'eventVolume': 'Large',
143+
'syslogEvents': {
144+
'sinks': 'SyslogJsonBlob,LoggingEventHub',
145+
'syslogEventConfiguration': {
146+
'LOG_USER': 'LOG_INFO'
147+
}
148+
}
149+
}
150+
}"
151+
$ladCfg = [System.Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($ladCfg))
152+
$perfCfg = "[
153+
{
154+
'query': 'SELECT PercentProcessorTime, PercentIdleTime FROM SCX_ProcessorStatisticalInformation WHERE Name='_TOTAL'',
155+
'table': 'LinuxCpu',
156+
'frequency': 60,
157+
'sinks': 'LinuxCpuJsonBlob'
158+
}
159+
]"
160+
161+
// Get the VM Resource
162+
Get-AzureRmVM -ResourceGroupName <RGName> -VMName <VMName>
163+
164+
// Finally tell Azure to install and enable the extension
165+
Set-AzureRmVMExtension -ExtensionType LinuxDiagnostic -Publisher Microsoft.Azure.Diagnostics -ResourceGroupName <RGName> -VMName <VMName> -Location <Location> -Name LinuxDiagnostic -Settings @{'StorageAccount'='<DiagStorageAccount>'; 'sampleRateInSeconds' = '15' ; 'ladCfg'=$ladCfg; 'perfCfg' = $perfCfg} -ProtectedSettings @{'storageAccountName' = '<DiagStorageAccount>'; 'storageAccountSasToken' = $SASKey } -TypeHandlerVersion 3.0
166+
```
167+
89168
### Updating the extension settings
90169

91170
After you've changed your Protected or Public settings, deploy them to the VM by running the same command. If anything changed in the settings, the updated settings are sent to the extension. LAD reloads the configuration and restarts itself.

includes/iot-hub-basic-whole.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@
1010
ms.custom: include file
1111
---
1212
>[!NOTE]
13-
>The features described in this article are available only in the standard tier of IoT Hub. For more information about the basic and standard IoT Hub tiers, see [Choose the right IoT Hub tier](../articles/iot-hub/iot-hub-scaling.md).
13+
>The features described in this article are available only in the standard tier of IoT Hub. For more information about the basic and standard/free IoT Hub tiers, see [Choose the right IoT Hub tier](../articles/iot-hub/iot-hub-scaling.md).

0 commit comments

Comments
 (0)