Skip to content

Commit 2f58c48

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into fixScreens
2 parents 70a6e50 + 15fe7e9 commit 2f58c48

File tree

607 files changed

+12204
-11135
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

607 files changed

+12204
-11135
lines changed

articles/active-directory-domain-services/network-considerations.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/14/2023
12+
ms.date: 07/31/2023
1313
ms.author: justinha
1414
ms.reviewer: xyuan
1515

@@ -49,6 +49,16 @@ A managed domain connects to a subnet in an Azure virtual network. Design this s
4949
* A managed domain requires 3-5 IP addresses. Make sure that your subnet IP address range can provide this number of addresses.
5050
* Restricting the available IP addresses can prevent the managed domain from maintaining two domain controllers.
5151

52+
>[!NOTE]
53+
>You shouldn't use public IP addresses for virtual networks and their subnets due to the following issues:
54+
>
55+
>- **Scarcity of the IP address**: IPv4 public IP addresses are limited, and their demand often exceeds the available supply. Also, there are potentially overlapping IPs with public endpoints.
56+
>- **Security risks**: Using public IPs for virtual networks exposes your devices directly to the internet, increasing the risk of unauthorized access and potential attacks. Without proper security measures, your devices may become vulnerable to various threats.
57+
>
58+
>- **Complexity**: Managing a virtual network with public IPs can be more complex than using private IPs, as it requires dealing with external IP ranges and ensuring proper network segmentation and security.
59+
>
60+
>It is strongly recommended to use private IP addresses. If you use a public IP, ensure you are the owner/dedicated user of the chosen IPs in the public range you chose.
61+
5262
The following example diagram outlines a valid design where the managed domain has its own subnet, there's a gateway subnet for external connectivity, and application workloads are in a connected subnet within the virtual network:
5363

5464
![Recommended subnet design](./media/active-directory-domain-services-design-guide/vnet-subnet-design.png)

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 01/29/2023
11+
ms.date: 07/31/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -106,6 +106,16 @@ To quickly create a managed domain, you can select **Review + create** to accept
106106
* Creates a subnet named *aadds-subnet* using the IP address range of *10.0.2.0/24*.
107107
* Synchronizes *All* users from Azure AD into the managed domain.
108108

109+
>[!NOTE]
110+
>You shouldn't use public IP addresses for virtual networks and their subnets due to the following issues:
111+
>
112+
>- **Scarcity of the IP address**: IPv4 public IP addresses are limited, and their demand often exceeds the available supply. Also, there are potentially overlapping IPs with public endpoints.
113+
>- **Security risks**: Using public IPs for virtual networks exposes your devices directly to the internet, increasing the risk of unauthorized access and potential attacks. Without proper security measures, your devices may become vulnerable to various threats.
114+
>
115+
>- **Complexity**: Managing a virtual network with public IPs can be more complex than using private IPs, as it requires dealing with external IP ranges and ensuring proper network segmentation and security.
116+
>
117+
>It is strongly recommended to use private IP addresses. If you use a public IP, ensure you are the owner/dedicated user of the chosen IPs in the public range you chose.
118+
109119
Select **Review + create** to accept these default configuration options.
110120

111121
## Deploy the managed domain

articles/active-directory/app-provisioning/application-provisioning-configuration-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Content-type: application/json
6060
{
6161
"value": [
6262
{
63-
"id": "8b1025e4-1dd2-430b-a150-2ef79cd700f5",
63+
"id": "8b1025e4-1dd2-430b-a150-2ef79cd700f5",
6464
"displayName": "AWS Single-Account Access",
6565
"homePageUrl": "http://aws.amazon.com/",
6666
"supportedSingleSignOnModes": [

articles/active-directory/app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Summary of factors that influence the time it takes to complete an **initial cyc
8585

8686
- Whether users in scope for provisioning are matched to existing users in the target application, or need to be created for the first time. Sync jobs for which all users are created for the first time take about *twice as long* as sync jobs for which all users are matched to existing users.
8787

88-
- Number of errors in the [provisioning logs](check-status-user-account-provisioning.md). Performance is slower if there are many errors and the provisioning service has gone into a quarantine state.
88+
- Number of errors in the [provisioning logs](check-status-user-account-provisioning.md). Performance is slower if there are many errors and the provisioning service has gone into a quarantine state.
8989

9090
- Request rate limits and throttling implemented by the target system. Some target systems implement request rate limits and throttling, which can impact performance during large sync operations. Under these conditions, an app that receives too many requests too fast might slow its response rate or close the connection. To improve performance, the connector needs to adjust by not sending the app requests faster than the app can process them. Provisioning connectors built by Microsoft make this adjustment.
9191

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,11 @@ This section describes how you can assign the necessary permissions to a managed
5555

5656
[![Screenshot of managed identity name.](media/inbound-provisioning-api-grant-access/managed-identity-name.png)](media/inbound-provisioning-api-grant-access/managed-identity-name.png#lightbox)
5757

58-
1. Run the following PowerShell script to assign permissions to your managed identity.
58+
1. Run the following PowerShell script to assign permissions to your managed identity.
59+
5960
```powershell
6061
Install-Module Microsoft.Graph -Scope CurrentUser
61-
62+
6263
Connect-MgGraph -Scopes "Application.Read.All","AppRoleAssignment.ReadWrite.All,RoleManagement.ReadWrite.Directory"
6364
Select-MgProfile Beta
6465
$graphApp = Get-MgServicePrincipal -Filter "AppId eq '00000003-0000-0000-c000-000000000000'"
@@ -75,7 +76,7 @@ This section describes how you can assign the necessary permissions to a managed
7576
$managedID = Get-MgServicePrincipal -Filter "DisplayName eq 'CSV2SCIMBulkUpload'"
7677
New-MgServicePrincipalAppRoleAssignment -PrincipalId $managedID.Id -ServicePrincipalId $managedID.Id -ResourceId $graphApp.Id -AppRoleId $AppRole.Id
7778
```
78-
1. To confirm that the permission was applied, find the managed identity service principal under **Enterprise Applications** in Azure AD. Remove the **Application type** filter to see all service principals.
79+
1. To confirm that the permission was applied, find the managed identity service principal under **Enterprise Applications** in Azure AD. Remove the **Application type** filter to see all service principals.
7980
[![Screenshot of managed identity principal.](media/inbound-provisioning-api-grant-access/managed-identity-principal.png)](media/inbound-provisioning-api-grant-access/managed-identity-principal.png#lightbox)
8081
1. Click on the **Permissions** blade under **Security**. Ensure the permission is set.
8182
[![Screenshot of managed identity permissions.](media/inbound-provisioning-api-grant-access/managed-identity-permissions.png)](media/inbound-provisioning-api-grant-access/managed-identity-permissions.png#lightbox)

articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@ The PowerShell sample script published in the [Microsoft Entra ID inbound provis
8282
- Test-ScriptCommands.ps1 (sample usage commands)
8383
- UseClientCertificate.ps1 (script to generate self-signed certificate and upload it as service principal credential for use in OAuth flow)
8484
- `Sample1` (folder with more examples of how CSV file columns can be mapped to SCIM standard attributes. If you get different CSV files for employees, contractors, interns, you can create a separate AttributeMapping.psd1 file for each entity.)
85-
1. Download and install the latest version of PowerShell.
86-
1. Run the command to enable execution of remote signed scripts:
85+
1. Download and install the latest version of PowerShell.
86+
1. Run the command to enable execution of remote signed scripts:
8787
```powershell
8888
set-executionpolicy remotesigned
8989
```

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -110,13 +110,13 @@ In this example, the users and or groups are created in a cloud HR application l
110110

111111
![Picture 2](./media/plan-auto-user-provisioning/workdayprovisioning.png)
112112

113-
1. **HR team** performs the transactions in the cloud HR app tenant.
114-
2. **Azure AD provisioning service** runs the scheduled cycles from the cloud HR app tenant and identifies changes that need to be processed for sync with AD.
115-
3. **Azure AD provisioning service** invokes the Azure AD Connect provisioning agent with a request payload containing AD account create/update/enable/disable operations.
116-
4. **Azure AD Connect provisioning agent** uses a service account to manage AD account data.
117-
5. **Azure AD Connect** runs delta sync to pull updates in AD.
118-
6. **AD** updates are synced with Azure AD.
119-
7. **Azure AD provisioning service** writebacks email attribute and username from Azure AD to the cloud HR app tenant.
113+
1. **HR team** performs the transactions in the cloud HR app tenant.
114+
2. **Azure AD provisioning service** runs the scheduled cycles from the cloud HR app tenant and identifies changes that need to be processed for sync with AD.
115+
3. **Azure AD provisioning service** invokes the Azure AD Connect provisioning agent with a request payload containing AD account create/update/enable/disable operations.
116+
4. **Azure AD Connect provisioning agent** uses a service account to manage AD account data.
117+
5. **Azure AD Connect** runs delta sync to pull updates in AD.
118+
6. **AD** updates are synced with Azure AD.
119+
7. **Azure AD provisioning service** writebacks email attribute and username from Azure AD to the cloud HR app tenant.
120120

121121
## Plan the deployment project
122122

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Once schema extensions are created, these extension attributes are automatically
4949
When you've more than 1000 service principals, you may find extensions missing in the source attribute list. If an attribute you've created doesn't automatically appear, then verify the attribute was created and add it manually to your schema. To verify it was created, use Microsoft Graph and [Graph Explorer](/graph/graph-explorer/graph-explorer-overview). To add it manually to your schema, see [Editing the list of supported attributes](customize-application-attributes.md#editing-the-list-of-supported-attributes).
5050

5151
### Create an extension attribute for cloud only users using Microsoft Graph
52-
You can extend the schema of Azure AD users using [Microsoft Graph](/graph/overview).
52+
You can extend the schema of Azure AD users using [Microsoft Graph](/graph/overview).
5353

5454
First, list the apps in your tenant to get the ID of the app you're working on. To learn more, see [List extensionProperties](/graph/api/application-list-extensionproperty).
5555

@@ -67,7 +67,7 @@ Content-type: application/json
6767
"name": "extensionName",
6868
"dataType": "string",
6969
"targetObjects": [
70-
"User"
70+
"User"
7171
]
7272
}
7373
```
@@ -89,10 +89,10 @@ GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_in
8989

9090

9191
### Create an extension attribute on a cloud only user using PowerShell
92-
Create a custom extension using PowerShell and assign a value to a user.
92+
Create a custom extension using PowerShell and assign a value to a user.
9393

9494
```
95-
#Connect to your Azure AD tenant
95+
#Connect to your Azure AD tenant
9696
Connect-AzureAD
9797
9898
#Create an application (you can instead use an existing application if you would like)
@@ -123,7 +123,7 @@ Cloud sync will automatically discover your extensions in on-premises Active Dir
123123
4. Select the configuration you wish to add the extension attribute and mapping.
124124
5. Under **Manage attributes** select **click to edit mappings**.
125125
6. Click **Add attribute mapping**. The attributes will automatically be discovered.
126-
7. The new attributes will be available in the drop-down under **source attribute**.
126+
7. The new attributes will be available in the drop-down under **source attribute**.
127127
8. Fill in the type of mapping you want and click **Apply**.
128128
[![Custom attribute mapping](media/user-provisioning-sync-attributes-for-mapping/schema-1.png)](media/user-provisioning-sync-attributes-for-mapping/schema-1.png#lightbox)
129129

@@ -142,11 +142,11 @@ If users who will access the applications originate in on-premises Active Direct
142142
1. Open the Azure AD Connect wizard, choose Tasks, and then choose **Customize synchronization options**.
143143

144144
![Azure Active Directory Connect wizard Additional tasks page](./media/user-provisioning-sync-attributes-for-mapping/active-directory-connect-customize.png)
145-
146-
2. Sign in as an Azure AD Global Administrator.
145+
146+
2. Sign in as an Azure AD Global Administrator.
147147

148148
3. On the **Optional Features** page, select **Directory extension attribute sync**.
149-
149+
150150
![Azure Active Directory Connect wizard Optional features page](./media/user-provisioning-sync-attributes-for-mapping/active-directory-connect-directory-extension-attribute-sync.png)
151151

152152
4. Select the attribute(s) you want to extend to Azure AD.
@@ -156,13 +156,13 @@ If users who will access the applications originate in on-premises Active Direct
156156
![Screenshot that shows the "Directory extensions" selection page](./media/user-provisioning-sync-attributes-for-mapping/active-directory-connect-directory-extensions.png)
157157

158158
5. Finish the Azure AD Connect wizard and allow a full synchronization cycle to run. When the cycle is complete, the schema is extended and the new values are synchronized between your on-premises AD and Azure AD.
159-
159+
160160
6. In the Azure portal, while you’re [editing user attribute mappings](customize-application-attributes.md), the **Source attribute** list will now contain the added attribute in the format `<attributename> (extension_<appID>_<attributename>)`, where appID is the identifier of a placeholder application in your tenant. Select the attribute and map it to the target application for provisioning.
161161

162162
![Azure Active Directory Connect wizard Directory extensions selection page](./media/user-provisioning-sync-attributes-for-mapping/attribute-mapping-extensions.png)
163163

164164
> [!NOTE]
165-
> The ability to provision reference attributes from on-premises AD, such as **managedby** or **DN/DistinguishedName**, is not supported today. You can request this feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789).
165+
> The ability to provision reference attributes from on-premises AD, such as **managedby** or **DN/DistinguishedName**, is not supported today. You can request this feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789).
166166
167167

168168
## Next steps

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: arvinh
1515
# What is app provisioning in Azure Active Directory?
1616

1717
In Azure Active Directory (Azure AD), the term *app provisioning* refers to automatically creating user identities and roles for applications.
18-
18+
1919
![Diagram that shows provisioning scenarios.](../governance/media/what-is-provisioning/provisioning.png)
2020

2121
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and many more.

0 commit comments

Comments
 (0)