Skip to content

Commit 3cd01bb

Browse files
authored
Merge pull request #210599 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 1170bff + ee823c4 commit 3cd01bb

13 files changed

+45
-42
lines changed

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,11 @@ sections:
164164
How are Windows Updates applied in Azure AD Domain Services?
165165
answer: |
166166
Domain controllers in a managed domain automatically apply required Windows updates. There's nothing for you to configure or administer here. Make sure you don't create network security group rules that block outbound traffic to Windows Updates. For your own VMs joined to the managed domain, you are responsible for configuring and applying any required OS and application updates.
167+
168+
- question: |
169+
Why do my domain controllers change names?
170+
answer: |
171+
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
167172
168173
- name: Billing and availability
169174
questions:

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -113,28 +113,28 @@ Run the following PowerShell cmdlet:
113113
The command returns your current additional authentication rules for your relying party trust. Append the following rules to your current claim rules:
114114

115115
```console
116-
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
117-
"YourGroupSID"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
116+
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
117+
"YourGroupSID"] => issue(Type = "http://schemas.microsoft.com/claims/authnmethodsproviders",
118118
Value = "AzureMfaAuthentication");
119-
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
119+
not exists([Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
120120
Value=="YourGroupSid"]) => issue(Type =
121-
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
121+
"http://schemas.microsoft.com/claims/authnmethodsproviders", Value =
122122
"AzureMfaServerAuthentication");'
123123
```
124124

125125
The following example assumes your current claim rules are configured to prompt for MFA when users connect from outside your network. This example includes the additional rules that you need to append.
126126

127127
```PowerShell
128128
Set-AdfsAdditionalAuthenticationRule -AdditionalAuthenticationRules 'c:[type ==
129-
"https://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", value == "false"] => issue(type =
130-
"https://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
131-
"https://schemas.microsoft.com/claims/multipleauthn" );
132-
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
133-
"YourGroupSID"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
129+
"http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", value == "false"] => issue(type =
130+
"http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
131+
"http://schemas.microsoft.com/claims/multipleauthn" );
132+
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
133+
"YourGroupSID"] => issue(Type = "http://schemas.microsoft.com/claims/authnmethodsproviders",
134134
Value = "AzureMfaAuthentication");
135-
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
135+
not exists([Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
136136
Value=="YourGroupSid"]) => issue(Type =
137-
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
137+
"http://schemas.microsoft.com/claims/authnmethodsproviders", Value =
138138
"AzureMfaServerAuthentication");'
139139
```
140140

@@ -145,15 +145,15 @@ This example modifies claim rules on a specific relying party trust (application
145145

146146
```PowerShell
147147
Set-AdfsRelyingPartyTrust -TargetName AppA -AdditionalAuthenticationRules 'c:[type ==
148-
"https://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", value == "false"] => issue(type =
149-
"https://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
150-
"https://schemas.microsoft.com/claims/multipleauthn" );
151-
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
152-
"YourGroupSID"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
148+
"http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", value == "false"] => issue(type =
149+
"http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
150+
"http://schemas.microsoft.com/claims/multipleauthn" );
151+
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
152+
"YourGroupSID"] => issue(Type = "http://schemas.microsoft.com/claims/authnmethodsproviders",
153153
Value = "AzureMfaAuthentication");
154-
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
154+
not exists([Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
155155
Value=="YourGroupSid"]) => issue(Type =
156-
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
156+
"http://schemas.microsoft.com/claims/authnmethodsproviders", Value =
157157
"AzureMfaServerAuthentication");'
158158
```
159159

@@ -379,12 +379,12 @@ For example, remove the following from the rule(s):
379379

380380

381381
```console
382-
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
383-
"**YourGroupSID**"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
382+
c:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
383+
"**YourGroupSID**"] => issue(Type = "http://schemas.microsoft.com/claims/authnmethodsproviders",
384384
Value = "AzureMfaAuthentication");
385-
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
385+
not exists([Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
386386
Value=="YourGroupSid"]) => issue(Type =
387-
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
387+
"http://schemas.microsoft.com/claims/authnmethodsproviders", Value =
388388
"AzureMfaServerAuthentication");'
389389
```
390390

articles/active-directory/external-identities/hybrid-cloud-to-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The following diagram provides a high-level overview of how Azure AD Application
6666
You can manage the on-premises B2B user objects through lifecycle management policies. For example:
6767

6868
- You can set up multi-factor authentication (MFA) policies for the Guest user so that MFA is used during Application Proxy authentication. For more information, see [Conditional Access for B2B collaboration users](authentication-conditional-access.md).
69-
- Any sponsorships, access reviews, account verifications, etc. that are performed on the cloud B2B user applies to the on-premises users. For example, if the cloud user is deleted through your lifecycle management policies, the on-premises user is also deleted by MIM Sync or through Azure AD Connect sync. For more information, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
69+
- Any sponsorships, access reviews, account verifications, etc. that are performed on the cloud B2B user applies to the on-premises users. For example, if the cloud user is deleted through your lifecycle management policies, the on-premises user is also deleted by MIM Sync or through the Azure AD B2B script. For more information, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
7070

7171
### Create B2B guest user objects through an Azure AD B2B script
7272

articles/active-directory/governance/entitlement-management-organization.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,20 +78,20 @@ To add an external Azure AD directory or domain as a connected organization, fol
7878

7979
The **Select directories + domains** pane opens.
8080

81-
1. In the search box, enter a domain name to search for the Azure AD directory or domain. Be sure to enter the entire domain name.
81+
1. In the search box, enter a domain name to search for the Azure AD directory or domain. You can also add domains that are not in Azure AD. Be sure to enter the entire domain name.
8282

83-
1. Confirm that the organization name and authentication type are correct. User sign in, prior to being able to access the myaccess portal, depends on the authentication type for their organization. If the authentication type for a connected organization is Azure AD, then all users with an account in any verified domain of that Azure AD directory will sign into their directory, and then can request access to access packages that allow that connected organization. If the authentication type is One-time passcode, this allows users with email addresses from just that domain to visit the myaccess portal. Then, after they authenticate with the passcode, the user can make a request.
83+
1. Confirm that the organization name(s) and authentication type(s) are correct. User sign in, prior to being able to access the MyAccess portal, depends on the authentication type for their organization. If the authentication type for a connected organization is Azure AD, all users with an account in any verified domain of that Azure AD directory will sign into their directory, and then can request access to access packages that allow that connected organization. If the authentication type is One-time passcode, this allows users with email addresses from just that domain to visit the MyAccess portal. After they authenticate with the passcode, the user can make a request.
8484

8585
![The "Select directories + domains" pane](./media/entitlement-management-organization/organization-select-directories-domains.png)
8686

8787
> [!NOTE]
8888
> Access from some domains could be blocked by the Azure AD business to business (B2B) allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
8989
90-
1. Select **Add** to add the Azure AD directory or domain. Currently, you can add only one Azure AD directory or domain per connected organization.
90+
1. Select **Add** to add the Azure AD directory or domain. **You can add multiple Azure AD directories and domains**.
9191

92-
1. After you've added the Azure AD directory or domain, select **Select**.
92+
1. After you've added the Azure AD directories or domains, select **Select**.
9393

94-
The organization appears in the list.
94+
The organization(s) appears in the list.
9595

9696
![The "Directory + domain" pane](./media/entitlement-management-organization/organization-directory-domain.png)
9797

articles/active-directory/reports-monitoring/reference-azure-ad-sla-performance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ For each month, we truncate the SLA attainment at three places after the decimal
6060
| May | 99.999% | 99.999% |
6161
| June | 99.999% | 99.999% |
6262
| July | 99.999% | 99.999% |
63-
| August | 99.999% | |
63+
| August | 99.999% | 99.999% |
6464
| September | 99.999% | |
6565
| October | 99.999% | |
6666
| November | 99.998% | |

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ To add the required permissions, follow these steps:
158158
1. Website ID registration
159159
1. Domain verification.
160160
1. Select on each section and download the JSON file under each.
161-
1. Crete a website that you can use to distribute the files. If you specified **https://contoso.com** as your domain, the URLs for each of the files would look as shown below:
161+
1. Create a website that you can use to distribute the files. If you specified **https://contoso.com** as your domain, the URLs for each of the files would look as shown below:
162162
- `https://contoso.com/.well-known/did.json`
163163
- `https://contoso.com/.well-known/did-configuration.json`
164164

@@ -167,4 +167,4 @@ Once that you have successfully completed the verification steps, you are ready
167167
## Next steps
168168

169169
- [Learn how to issue Microsoft Entra Verified ID credentials from a web application](verifiable-credentials-configure-issuer.md).
170-
- [Learn how to verify Microsoft Entra Verified ID credentials](verifiable-credentials-configure-verifier.md).
170+
- [Learn how to verify Microsoft Entra Verified ID credentials](verifiable-credentials-configure-verifier.md).

articles/azure-monitor/containers/container-insights-enable-existing-clusters.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ The Log Analytics workspace must be created before you deploy the Resource Manag
179179
180180
- For **aksResourceId** and **aksResourceLocation**, use the values on the **AKS Overview** page for the AKS cluster.
181181
- For **workspaceResourceId**, use the resource ID of your Log Analytics workspace.
182-
- For **resourceTagValues**, match the existing tag values specified for the existing Container insights extension DCR of the cluster and the name of the data collection rule, which will be MSCI-\<clusterName\>-\<clusterRegion\> and this resource created in Log Analytics Workspace Resource Group. If this first-time onboarding, you can set the arbitrary tag values.
182+
- For **resourceTagValues**, match the existing tag values specified for the existing Container insights extension DCR of the cluster and the name of the data collection rule, which will be MSCI-\<clusterName\>-\<clusterRegion\> and this resource created in AKS clusters Resource Group. If this first-time onboarding, you can set the arbitrary tag values.
183183
184184
185185
**If you don't want to enable [managed identity authentication (preview)](container-insights-onboard.md#authentication)**

articles/backup/azure-backup-architecture-for-sap-hana-backup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ See the [high-level architecture of Azure Backup for SAP HANA databases](./sap-h
6868

6969
1. To stream the backup data, Backint creates up to three pipes, which directly write to Azure Backup’s Recovery Services vault.
7070

71-
If you aren’t using firewall/NVA in your setup, then the backup stream is transferred over the Azure network to the Recovery Services vault. Also, you can set up [Virtual Network Service Endpoint](../virtual-network/virtual-network-service-endpoints-overview.md) or [Private Endpoint](../private-link/private-endpoint-overview.md) to allow SAP HANA to send backup traffic directly to Azure Storage, skipping NVA/Azure Firewall. Additionally, when you use firewall/NVA, the traffic to Azure Active Directory and Recovery Services vault will pass through the firewall/NVA and it doesn’t affect the overall backup performance.
71+
If you aren’t using firewall/NVA in your setup, then the backup stream is transferred over the Azure network to the Recovery Services vault / Azure Storage. Also, you can set up [Virtual Network Service Endpoint](../virtual-network/virtual-network-service-endpoints-overview.md) or [Private Endpoint](../private-link/private-endpoint-overview.md) to allow SAP HANA to send backup traffic directly to Recovery Services Vault / Azure Storage, skipping NVA/Azure Firewall. Additionally, when you use firewall/NVA, the traffic to Azure Active Directory and Azure Backup Service will pass through the firewall/NVA and it doesn’t affect the overall backup performance.
7272

7373
1. Azure Backup attempts to achieve speeds up to 420 MB/sec for non-log backups and up to 100 MB/sec for log backups. [Learn more](./tutorial-backup-sap-hana-db.md#understanding-backup-and-restore-throughput-performance) about backup and restore throughput performance.
7474

articles/purview/catalog-private-link-end-to-end.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,9 +109,9 @@ Using one of the deployment options explained further in this guide, you can dep
109109
> [!NOTE]
110110
> For DNS configuration, you can also use your existing Azure Private DNS Zones from the dropdown list or add the required DNS records to your DNS Servers manually later. For more information, see [Configure DNS Name Resolution for private endpoints](./catalog-private-link-name-resolution.md)
111111
112-
7. Go to the summary page, and select **Create** to create the portal private endpoint.
112+
7. Go to the summary page, and select **Create** to create the account private endpoint.
113113

114-
8. Follow the same steps when you select **portal** for **Target sub-resource**.
114+
8. Repeat steps 2 through 7 to create the portal private endpoint. Make sure you select **portal** for **Target sub-resource**.
115115

116116
9. From your Microsoft Purview account, under **Settings** select **Networking**, and then select **Ingestion private endpoint connections**.
117117

articles/purview/concept-best-practices-network.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -105,11 +105,6 @@ When you're scanning a data source in Microsoft Purview, you need to provide a c
105105

106106
## Option 2: Use private endpoints
107107

108-
You can use [Azure private endpoints](../private-link/private-endpoint-overview.md) for your Microsoft Purview accounts. This option is useful if you need to do either of the following:
109-
110-
- Scan Azure infrastructure as a service (IaaS) and PaaS data sources inside Azure virtual networks and on-premises data sources through a private connection.
111-
- Allow users on a virtual network to securely access Microsoft Purview over [Azure Private Link](../private-link/private-link-overview.md).
112-
113108
Similar to other PaaS solutions, Microsoft Purview does not support deploying directly into a virtual network. So you can't use certain networking features with the offering's resources, such as network security groups, route tables, or other network-dependent appliances such as Azure Firewall. Instead, you can use private endpoints that can be enabled on your virtual network. You can then disable public internet access to securely connect to Microsoft Purview.
114109

115110
You must use private endpoints for your Microsoft Purview account if you have any of the following requirements:

0 commit comments

Comments
 (0)