Skip to content

Commit 3116ad6

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into endpoint
2 parents f77495f + 27af1c0 commit 3116ad6

File tree

2,437 files changed

+80596
-73389
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,437 files changed

+80596
-73389
lines changed

.openpublishing.publish.config.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,11 @@
163163
"url": "https://github.com/Azure/azure-functions-templates",
164164
"branch": "dev"
165165
},
166+
{
167+
"path_to_root": "azure-functions-samples-java",
168+
"url": "https://github.com/Azure-Samples/azure-functions-samples-java",
169+
"branch": "master"
170+
},
166171
{
167172
"path_to_root": "functions-quickstart-java",
168173
"url": "https://github.com/Azure-Samples/functions-quickstarts-java",
@@ -515,6 +520,11 @@
515520
"url": "https://github.com/Azure-Samples/azure-cosmos-java-getting-started",
516521
"branch": "master"
517522
},
523+
{
524+
"path_to_root": "azure-cosmos-java-sql-api-samples",
525+
"url": "https://github.com/Azure-Samples/azure-cosmos-java-sql-api-samples",
526+
"branch": "master"
527+
},
518528
{
519529
"path_to_root": "azure-storage-snippets",
520530
"url": "https://github.com/azure-samples/AzureStorageSnippets",

.openpublishing.redirection.json

Lines changed: 1845 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/configure-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ You can configure the token lifetime on any user flow.
5050

5151
## Next steps
5252

53-
Learn more about how to [use access tokens](access-tokens.md).
53+
Learn more about how to [request access tokens](access-tokens.md).
5454

5555

5656

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@
4747
href: synchronization.md
4848
- name: How password hash synchronization works
4949
href: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
50+
- name: Classic deployment migration benefits
51+
href: concepts-migration-benefits.md
5052
- name: What is Azure Active Directory?
5153
href: ../active-directory/fundamentals/active-directory-whatis.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
5254
- name: Azure Active Directory architecture
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Benefits of Classic deployment migration in Azure AD Domain Services | Microsoft Docs
3+
description: Learn more about the benefits of migrating a Classic deployment of Azure Active Directory Domain Services to the Resource Manager deployment model
4+
services: active-directory-ds
5+
author: iainfoulds
6+
manager: daveba
7+
8+
ms.service: active-directory
9+
ms.subservice: domain-services
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 05/26/2020
13+
ms.author: iainfou
14+
---
15+
16+
# Benefits of migration from the Classic to Resource Manager deployment model in Azure Active Directory Domain Services
17+
18+
Azure Active Directory Domain Services (AD DS) lets you migrate an existing managed domain that uses the Classic deployment model to the Resource Manager deployment model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
19+
20+
This article outlines the benefits for migration. To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager][howto-migrate].
21+
22+
> [!NOTE]
23+
> In 2017, Azure AD Domain Services became available to host in an Azure Resource Manager network. Since then, we have been able to build a more secure service using the Azure Resource Manager's modern capabilities. Because Azure Resource Manager deployments fully replace classic deployments, Azure AD DS classic virtual network deployments will be retired on March 1, 2023.
24+
>
25+
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/)
26+
27+
## Migration benefits
28+
29+
The migration process takes an existing Azure AD DS instance that uses the Classic deployment model and moves to use the Resource Manager deployment model. When you migrate an Azure AD DS managed domain from the Classic to Resource Manager deployment model, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
30+
31+
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager deployment model, such as the following:
32+
33+
* [Fine-grained password policy support][password-policy].
34+
* Faster synchronization speeds between Azure AD and Azure AD Domain Services.
35+
* Two new [attributes that synchronize from Azure AD][attributes] - *manager* and *employeeID*.
36+
* Access to higher-powered domain controllers when you [upgrade the SKU][skus].
37+
* AD account lockout protection.
38+
* [Email notifications for alerts on your managed domain][email-alerts].
39+
* [Use Azure Workbooks and Azure monitor to view audit logs and sign-in activity][workbooks].
40+
* In supported regions, [Azure Availability Zones][availability-zones].
41+
* Integrations with other Azure products such as [Azure Files][azure-files], [HD Insights][hd-insights], and [Windows Virtual Desktop][wvd].
42+
* Support has access to more telemetry and can help troubleshoot more effectively.
43+
* Encryption at rest using [Azure Managed Disks][managed-disks] for the data on the managed domain controllers.
44+
45+
Azure AD DS managed domains that use a Resource Manager deployment model help you stay up-to-date with the latest new features. New features aren't available for Azure AD DS managed domains that use the Classic deployment model.
46+
47+
## Next steps
48+
49+
To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager[howto-migrate].
50+
51+
<!-- LINKS - INTERNAL -->
52+
[password-policy]: password-policy.md
53+
[skus]: change-sku.md
54+
[email-alerts]: notifications.md
55+
[workbooks]: use-azure-monitor-workbooks.md
56+
[azure-files]: ../storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md
57+
[hd-insights]: ../hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds.md
58+
[wvd]: ../virtual-desktop/overview.md
59+
[availability-zones]: ../availability-zones/az-overview.md
60+
[howto-migrate]: migrate-from-classic-vnet.md
61+
[attributes]: synchronization.md#attribute-synchronization-and-mapping-to-azure-ad-ds
62+
[managed-disks]: ../virtual-machines/windows/managed-disks-overview.md

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,16 @@ ms.author: iainfou
1717

1818
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
1919

20-
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance.
20+
This article outlines considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. For some of the benefits, see [Benefits of migration from the Classic to Resource Manager deployment model in Azure AD DS][migration-benefits].
2121

2222
> [!NOTE]
2323
> In 2017, Azure AD Domain Services became available to host in an Azure Resource Manager network. Since then, we have been able to build a more secure service using the Azure Resource Manager's modern capabilities. Because Azure Resource Manager deployments fully replace classic deployments, Azure AD DS classic virtual network deployments will be retired on March 1, 2023.
2424
>
25-
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/)
25+
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/).
2626
2727
## Overview of the migration process
2828

29-
The migration process takes an existing Azure AD DS instance that runs in a Classic virtual network and moves it to an existing Resource Manager virtual network. The migration is performed using PowerShell, and has two main stages of execution - *preparation* and *migration*.
29+
The migration process takes an existing Azure AD DS instance that runs in a Classic virtual network and moves it to an existing Resource Manager virtual network. The migration is performed using PowerShell, and has two main stages of execution: *preparation* and *migration*.
3030

3131
![Overview of the migration process for Azure AD DS](media/migrate-from-classic-vnet/migration-overview.png)
3232

@@ -38,21 +38,6 @@ In the *migration* stage, the underlying virtual disks for the domain controller
3838

3939
![Migration of Azure AD DS](media/migrate-from-classic-vnet/migration-process.png)
4040

41-
## Migration benefits
42-
43-
When you move an Azure AD DS managed domain using this migration process, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
44-
45-
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager virtual networks, such as:
46-
47-
* Fine-grained password policy support.
48-
* AD account lockout protection.
49-
* Email notifications of alerts on the Azure AD DS managed domain.
50-
* Audit logs using Azure Monitor.
51-
* Azure Files integration
52-
* HD Insights integration
53-
54-
Azure AD DS managed domains that use a Resource Manager virtual network help you stay up-to-date with the latest new features. Support for Azure AD DS using Classic virtual networks is to be deprecated in the future.
55-
5641
## Example scenarios for migration
5742

5843
Some common scenarios for migrating an Azure AD DS managed domain include the following examples.
@@ -364,6 +349,7 @@ With your Azure AD DS managed domain migrated to the Resource Manager deployment
364349
[troubleshoot-sign-in]: troubleshoot-sign-in.md
365350
[tshoot-ldaps]: tshoot-ldaps.md
366351
[get-credential]: /powershell/module/microsoft.powershell.security/get-credential
352+
[migration-benefits]: concepts-migration-benefits.md
367353

368354
<!-- EXTERNAL LINKS -->
369355
[powershell-script]: https://www.powershellgallery.com/packages/Migrate-Aadds/

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -744,6 +744,17 @@ TLS 1.2 Cipher Suites minimum bar:
744744
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
745745
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
746746

747+
### IP Ranges
748+
The Azure AD Provisionong service currently operates under the following IP ranges.
749+
750+
13.86.239.205; 52.188.178.195; 13.86.61.156; 40.67.254.206; 51.105.237.71; 20.44.38.166; 40.81.88.68; 52.184.94.250;
751+
20.43.180.59; 20.193.16.105; 20.40.167.232; 13.86.3.57; 52.188.72.113; 13.88.140.233; 52.142.121.156; 51.124.0.213;
752+
40.81.92.36; 20.44.39.175; 20.189.114.130; 20.44.193.163; 20.193.23.17; 20.40.173.237; 13.86.138.128; 52.142.29.23;
753+
13.86.2.238; 40.127.246.167; 51.136.72.4; 20.44.39.244; 40.81.92.186; 20.189.114.131; 20.44.193.210; 20.193.2.21; 20.40.174.46;
754+
13.86.219.18; 40.71.13.10; 20.44.16.38; 13.89.174.16; 13.69.66.182; 13.69.229.118; 104.211.147.176; 40.78.195.176;
755+
13.67.9.240; 13.75.38.48; 13.70.73.48; 13.77.52.176;
756+
757+
747758

748759
## Step 3: Build a SCIM endpoint
749760

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -202,9 +202,12 @@ If your previous computer certificate has expired, and a new certificate has bee
202202
203203
### Microsoft Azure Government additional steps
204204

205-
For customers that use Azure Government cloud, the following additional configuration steps are required on each NPS server:
205+
For customers that use Azure Government cloud, the following additional configuration steps are required on each NPS server.
206206

207-
1. Open **Registry Editor** on the NPS server.
207+
> [!IMPORTANT]
208+
> Only configure these registry settings if you're an Azure Government customer.
209+
210+
1. If you're an Azure Government customer, open **Registry Editor** on the NPS server.
208211
1. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa`. Set the following key values:
209212

210213
| Registry key | Value |

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Note: For users who have [Password hash synchronization (PHS)](https://docs.micr
106106

107107
You can help users register quickly by deploying SSPR alongside another popular application or service in the organization. This action will generate a large volume of sign-ins and will drive registration.
108108

109-
Before deploying SSPR, you may opt to determine the number and the average cost of each password reset call. YOU can use this data post deployment to show the value SSPR is bringing to the organization.
109+
Before deploying SSPR, you may opt to determine the number and the average cost of each password reset call. You can use this data post deployment to show the value SSPR is bringing to the organization.
110110

111111
#### Enable combined registration for SSPR and MFA
112112

@@ -344,4 +344,4 @@ Audit logs for registration and password reset are available for 30 days. If sec
344344

345345
* [Consider implementing Azure AD password protection](https://docs.microsoft.com/azure/active-directory/authentication/concept-password-ban-bad)
346346

347-
* [Consider implementing Azure AD Smart Lockout](https://docs.microsoft.com/azure/active-directory/authentication/howto-password-smart-lockout)
347+
* [Consider implementing Azure AD Smart Lockout](https://docs.microsoft.com/azure/active-directory/authentication/howto-password-smart-lockout)

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Administrators can assign a Conditional Access policy to the following cloud app
3333
- [Office 365 (preview)](#office-365-preview)
3434
- Azure Analysis Services
3535
- Azure DevOps
36-
- [Azure SQL Database and Data Warehouse](../../sql-database/sql-database-conditional-access.md)
36+
- [Azure SQL Database and Data Warehouse](../../azure-sql/database/conditional-access-configure.md)
3737
- Dynamics CRM Online
3838
- Microsoft Application Insights Analytics
3939
- [Microsoft Azure Information Protection](/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)

0 commit comments

Comments
 (0)