You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/faqs.yml
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -164,6 +164,11 @@ sections:
164
164
How are Windows Updates applied in Azure AD Domain Services?
165
165
answer: |
166
166
Domain controllers in a managed domain automatically apply required Windows updates. There's nothing for you to configure or administer here. Make sure you don't create network security group rules that block outbound traffic to Windows Updates. For your own VMs joined to the managed domain, you are responsible for configuring and applying any required OS and application updates.
167
+
168
+
- question: |
169
+
Why do my domain controllers change names?
170
+
answer: |
171
+
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
119
+
not exists([Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
120
120
Value=="YourGroupSid"]) => issue(Type =
121
-
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
121
+
"http://schemas.microsoft.com/claims/authnmethodsproviders", Value =
122
122
"AzureMfaServerAuthentication");'
123
123
```
124
124
125
125
The following example assumes your current claim rules are configured to prompt for MFA when users connect from outside your network. This example includes the additional rules that you need to append.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/hybrid-cloud-to-on-premises.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ The following diagram provides a high-level overview of how Azure AD Application
66
66
You can manage the on-premises B2B user objects through lifecycle management policies. For example:
67
67
68
68
- You can set up multi-factor authentication (MFA) policies for the Guest user so that MFA is used during Application Proxy authentication. For more information, see [Conditional Access for B2B collaboration users](authentication-conditional-access.md).
69
-
- Any sponsorships, access reviews, account verifications, etc. that are performed on the cloud B2B user applies to the on-premises users. For example, if the cloud user is deleted through your lifecycle management policies, the on-premises user is also deleted by MIM Sync or through Azure AD Connect sync. For more information, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
69
+
- Any sponsorships, access reviews, account verifications, etc. that are performed on the cloud B2B user applies to the on-premises users. For example, if the cloud user is deleted through your lifecycle management policies, the on-premises user is also deleted by MIM Sync or through the Azure AD B2B script. For more information, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
70
70
71
71
### Create B2B guest user objects through an Azure AD B2B script
Copy file name to clipboardExpand all lines: articles/active-directory/governance/entitlement-management-organization.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,20 +78,20 @@ To add an external Azure AD directory or domain as a connected organization, fol
78
78
79
79
The **Select directories + domains** pane opens.
80
80
81
-
1. In the search box, enter a domain name to search for the Azure AD directory or domain. Be sure to enter the entire domain name.
81
+
1. In the search box, enter a domain name to search for the Azure AD directory or domain. You can also add domains that are not in Azure AD. Be sure to enter the entire domain name.
82
82
83
-
1. Confirm that the organization name and authentication type are correct. User sign in, prior to being able to access the myaccess portal, depends on the authentication type for their organization. If the authentication type for a connected organization is Azure AD, then all users with an account in any verified domain of that Azure AD directory will sign into their directory, and then can request access to access packages that allow that connected organization. If the authentication type is One-time passcode, this allows users with email addresses from just that domain to visit the myaccess portal. Then, after they authenticate with the passcode, the user can make a request.
83
+
1. Confirm that the organization name(s) and authentication type(s) are correct. User sign in, prior to being able to access the MyAccess portal, depends on the authentication type for their organization. If the authentication type for a connected organization is Azure AD, all users with an account in any verified domain of that Azure AD directory will sign into their directory, and then can request access to access packages that allow that connected organization. If the authentication type is One-time passcode, this allows users with email addresses from just that domain to visit the MyAccess portal. After they authenticate with the passcode, the user can make a request.
> Access from some domains could be blocked by the Azure AD business to business (B2B) allow or deny list. For more information, see [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
89
89
90
-
1. Select **Add** to add the Azure AD directory or domain. Currently, you can add only one Azure AD directory or domain per connected organization.
90
+
1. Select **Add** to add the Azure AD directory or domain. **You can add multiple Azure AD directories and domains**.
91
91
92
-
1. After you've added the Azure AD directory or domain, select **Select**.
92
+
1. After you've added the Azure AD directories or domains, select **Select**.
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -158,7 +158,7 @@ To add the required permissions, follow these steps:
158
158
1. Website ID registration
159
159
1. Domain verification.
160
160
1. Select on each section and download the JSON file under each.
161
-
1.Crete a website that you can use to distribute the files. If you specified **https://contoso.com** as your domain, the URLs for each of the files would look as shown below:
161
+
1.Create a website that you can use to distribute the files. If you specified **https://contoso.com** as your domain, the URLs for each of the files would look as shown below:
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-enable-existing-clusters.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,7 +179,7 @@ The Log Analytics workspace must be created before you deploy the Resource Manag
179
179
180
180
- For **aksResourceId** and **aksResourceLocation**, use the values on the **AKS Overview** page for the AKS cluster.
181
181
- For **workspaceResourceId**, use the resource ID of your Log Analytics workspace.
182
-
- For **resourceTagValues**, match the existing tag values specified for the existing Container insights extension DCR of the cluster and the name of the data collection rule, which will be MSCI-\<clusterName\>-\<clusterRegion\> and this resource created in Log Analytics Workspace Resource Group. If this first-time onboarding, you can set the arbitrary tag values.
182
+
- For **resourceTagValues**, match the existing tag values specified for the existing Container insights extension DCR of the cluster and the name of the data collection rule, which will be MSCI-\<clusterName\>-\<clusterRegion\> and this resource created in AKS clusters Resource Group. If this first-time onboarding, you can set the arbitrary tag values.
183
183
184
184
185
185
**If you don't want to enable [managed identity authentication (preview)](container-insights-onboard.md#authentication)**
Copy file name to clipboardExpand all lines: articles/backup/azure-backup-architecture-for-sap-hana-backup.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ See the [high-level architecture of Azure Backup for SAP HANA databases](./sap-h
68
68
69
69
1. To stream the backup data, Backint creates up to three pipes, which directly write to Azure Backup’s Recovery Services vault.
70
70
71
-
If you aren’t using firewall/NVA in your setup, then the backup stream is transferred over the Azure network to the Recovery Services vault. Also, you can set up [Virtual Network Service Endpoint](../virtual-network/virtual-network-service-endpoints-overview.md) or [Private Endpoint](../private-link/private-endpoint-overview.md) to allow SAP HANA to send backup traffic directly to Azure Storage, skipping NVA/Azure Firewall. Additionally, when you use firewall/NVA, the traffic to Azure Active Directory and Recovery Services vault will pass through the firewall/NVA and it doesn’t affect the overall backup performance.
71
+
If you aren’t using firewall/NVA in your setup, then the backup stream is transferred over the Azure network to the Recovery Services vault / Azure Storage. Also, you can set up [Virtual Network Service Endpoint](../virtual-network/virtual-network-service-endpoints-overview.md) or [Private Endpoint](../private-link/private-endpoint-overview.md) to allow SAP HANA to send backup traffic directly to Recovery Services Vault / Azure Storage, skipping NVA/Azure Firewall. Additionally, when you use firewall/NVA, the traffic to Azure Active Directory and Azure Backup Service will pass through the firewall/NVA and it doesn’t affect the overall backup performance.
72
72
73
73
1. Azure Backup attempts to achieve speeds up to 420 MB/sec for non-log backups and up to 100 MB/sec for log backups. [Learn more](./tutorial-backup-sap-hana-db.md#understanding-backup-and-restore-throughput-performance) about backup and restore throughput performance.
Copy file name to clipboardExpand all lines: articles/purview/catalog-private-link-end-to-end.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -109,9 +109,9 @@ Using one of the deployment options explained further in this guide, you can dep
109
109
> [!NOTE]
110
110
> For DNS configuration, you can also use your existing Azure Private DNS Zones from the dropdown list or add the required DNS records to your DNS Servers manually later. For more information, see [Configure DNS Name Resolution for private endpoints](./catalog-private-link-name-resolution.md)
111
111
112
-
7. Go to the summary page, and select **Create** to create the portal private endpoint.
112
+
7. Go to the summary page, and select **Create** to create the account private endpoint.
113
113
114
-
8.Follow the same steps when you select **portal** for **Target sub-resource**.
114
+
8.Repeat steps 2 through 7 to create the portal private endpoint. Make sure you select **portal** for **Target sub-resource**.
115
115
116
116
9. From your Microsoft Purview account, under **Settings** select **Networking**, and then select **Ingestion private endpoint connections**.
Copy file name to clipboardExpand all lines: articles/purview/concept-best-practices-network.md
-5Lines changed: 0 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,11 +105,6 @@ When you're scanning a data source in Microsoft Purview, you need to provide a c
105
105
106
106
## Option 2: Use private endpoints
107
107
108
-
You can use [Azure private endpoints](../private-link/private-endpoint-overview.md) for your Microsoft Purview accounts. This option is useful if you need to do either of the following:
109
-
110
-
- Scan Azure infrastructure as a service (IaaS) and PaaS data sources inside Azure virtual networks and on-premises data sources through a private connection.
111
-
- Allow users on a virtual network to securely access Microsoft Purview over [Azure Private Link](../private-link/private-link-overview.md).
112
-
113
108
Similar to other PaaS solutions, Microsoft Purview does not support deploying directly into a virtual network. So you can't use certain networking features with the offering's resources, such as network security groups, route tables, or other network-dependent appliances such as Azure Firewall. Instead, you can use private endpoints that can be enabled on your virtual network. You can then disable public internet access to securely connect to Microsoft Purview.
114
109
115
110
You must use private endpoints for your Microsoft Purview account if you have any of the following requirements:
0 commit comments