Skip to content

Commit 48158f8

Browse files
authored
Merge pull request #172301 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/azure-docs (branch master)
2 parents 44fadf8 + eb19898 commit 48158f8

File tree

5 files changed

+29
-65
lines changed

5 files changed

+29
-65
lines changed

articles/active-directory/hybrid/reference-connect-tls-enforcement.md

Lines changed: 20 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,16 @@ ms.collection: M365-identity-device-management
2020

2121
# TLS 1.2 enforcement for Azure AD Connect
2222

23-
Transport Layer Security (TLS) protocol version 1.2 is a cryptography protocol that is designed to provide secure communications. The TLS protocol aims primarily to provide privacy and data integrity. TLS has gone through many iterations with version 1.2 being defined in [RFC 5246](https://tools.ietf.org/html/rfc5246). Azure Active Directory Connect version 1.2.65.0 and later now fully support using only TLS 1.2 for communications with Azure. This document will provide information on how to force your Azure AD Connect server to use only TLS 1.2.
23+
Transport Layer Security (TLS) protocol version 1.2 is a cryptography protocol that is designed to provide secure communications. The TLS protocol aims primarily to provide privacy and data integrity. TLS has gone through many iterations, with version 1.2 being defined in [RFC 5246](https://tools.ietf.org/html/rfc5246). Azure Active Directory Connect version 1.2.65.0 and later now fully support using only TLS 1.2 for communications with Azure. This article provides information about how to force your Azure AD Connect server to use only TLS 1.2.
2424

25-
>[!NOTE]
26-
>All versions of Windows Server that are supported for Azure AD Connect V2.0 already default to TLS 1.2. If TLS 1.2 is not enabled on your server you will need to enable this before you can deploy Azure AD Connect V2.0.
25+
> [!NOTE]
26+
> All versions of Windows Server that are supported for Azure AD Connect V2.0 already default to TLS 1.2. If TLS 1.2 is not enabled on your server you will need to enable this before you can deploy Azure AD Connect V2.0.
2727
2828
## Update the registry
29-
In order to force the Azure AD Connect server to only use TLS 1.2 the registry of the Windows server must be updated. Set the following registry keys on the Azure AD Connect server.
29+
In order to force the Azure AD Connect server to only use TLS 1.2, the registry of the Windows server must be updated. Set the following registry keys on the Azure AD Connect server.
3030

31-
>[!IMPORTANT]
32-
>After you have updated the registry, you must restart the Windows server for the changes to take affect.
31+
> [!IMPORTANT]
32+
> After you have updated the registry, you must restart the Windows server for the changes to take affect.
3333
3434

3535
### Enable TLS 1.2
@@ -48,34 +48,20 @@ In order to force the Azure AD Connect server to only use TLS 1.2 the registry o
4848
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
4949
- "DisabledByDefault"=dword:00000000
5050

51-
### PowerShell script to enable TLS 1.2
52-
You can use the following PowerShell script to enable TLS 1.2 on your Azure AD Connect server.
51+
### PowerShell cmdlet to check TLS 1.2
52+
You can use the following [Get-ADSyncToolsTls12](reference-connect-adsynctools.md#get-adsynctoolstls12) PowerShell cmdlet to check the current TLS 1.2 settings on your Azure AD Connect server.
5353

5454
```powershell
55-
New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
56-
57-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '1' -PropertyType 'DWord' -Force | Out-Null
58-
59-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null
60-
61-
New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
62-
63-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '1' -PropertyType 'DWord' -Force | Out-Null
55+
Import-module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\Tools\AdSyncTools"
56+
Get-ADSyncToolsTls12
57+
```
6458

65-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '1' -PropertyType 'DWord' -Force | Out-Null
59+
### PowerShell cmdlet to enable TLS 1.2
60+
You can use the following [Set-ADSyncToolsTls12](reference-connect-adsynctools.md#set-adsynctoolstls12) PowerShell cmdlet to enforce TLS 1.2 on your Azure AD Connect server.
6661

67-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
68-
69-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
70-
71-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
72-
73-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
74-
75-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '1' -PropertyType 'DWord' -Force | Out-Null
76-
77-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value 0 -PropertyType 'DWord' -Force | Out-Null
78-
Write-Host 'TLS 1.2 has been enabled.'
62+
```powershell
63+
Import-module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\Tools\AdSyncTools"
64+
Set-ADSyncToolsTls12 -Enabled $true
7965
```
8066

8167
### Disable TLS 1.2
@@ -94,34 +80,12 @@ You can use the following PowerShell script to enable TLS 1.2 on your Azure AD C
9480
- [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
9581
- "DisabledByDefault"=dword:00000001
9682

97-
### PowerShell script to disable TLS 1.2
98-
You can use the following PowerShell script to disable TLS 1.2 on your Azure AD Connect server.\
83+
### PowerShell script to disable TLS 1.2 (not recommended)
84+
You can use the following [Set-ADSyncToolsTls12](reference-connect-adsynctools.md#set-adsynctoolstls12) PowerShell cmdlet to disable TLS 1.2 on your Azure AD Connect server.
9985

10086
```powershell
101-
New-Item 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
102-
103-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '0' -PropertyType 'DWord' -Force | Out-Null
104-
105-
New-ItemProperty -path 'HKLM:\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '0' -PropertyType 'DWord' -Force | Out-Null
106-
107-
New-Item 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -Force | Out-Null
108-
109-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SystemDefaultTlsVersions' -value '0' -PropertyType 'DWord' -Force | Out-Null
110-
111-
New-ItemProperty -path 'HKLM:\SOFTWARE\Microsoft\.NETFramework\v4.0.30319' -name 'SchUseStrongCrypto' -value '0' -PropertyType 'DWord' -Force | Out-Null
112-
113-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -Force | Out-Null
114-
115-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
116-
117-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
118-
119-
New-Item 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -Force | Out-Null
120-
121-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'Enabled' -value '0' -PropertyType 'DWord' -Force | Out-Null
122-
123-
New-ItemProperty -path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client' -name 'DisabledByDefault' -value 1 -PropertyType 'DWord' -Force | Out-Null
124-
Write-Host 'TLS 1.2 has been disabled.'
87+
Import-module -Name "C:\Program Files\Microsoft Azure Active Directory Connect\Tools\AdSyncTools"
88+
Set-ADSyncToolsTls12 -Enabled $false
12589
```
12690

12791
## Next steps

articles/aks/ingress-tls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ az network public-ip show --ids $PUBLICIPID --query "[dnsSettings.fqdn]" --outpu
162162
```
163163

164164
#### Method 2: Set the DNS label using helm chart settings
165-
You can pass an annotation setting to your helm chard configuration by using the `--set controller.service.annotations."service\.beta\.kubernetes\.io/azure-dns-label-name"` parameter. This can be set either when the ingress controller is first deployed, or it can be configured later.
165+
You can pass an annotation setting to your helm chart configuration by using the `--set controller.service.annotations."service\.beta\.kubernetes\.io/azure-dns-label-name"` parameter. This can be set either when the ingress controller is first deployed, or it can be configured later.
166166
The following example shows how to update this setting after the controller has been deployed.
167167

168168
```
@@ -538,4 +538,4 @@ You can also:
538538
[install-azure-cli]: /cli/azure/install-azure-cli
539539
[aks-supported versions]: supported-kubernetes-versions.md
540540
[aks-integrated-acr]: cluster-container-registry-integration.md?tabs=azure-cli#create-a-new-aks-cluster-with-acr-integration
541-
[acr-helm]: ../container-registry/container-registry-helm-repos.md
541+
[acr-helm]: ../container-registry/container-registry-helm-repos.md

articles/communication-services/quickstarts/includes/user-access-token-python.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: tomaschladek
66
manager: nmurav
77
ms.service: azure-communication-services
88
ms.subservice: azure-communication-services
9-
ms.date: 06/30/2021
9+
ms.date: 09/13/2021
1010
ms.topic: include
1111
ms.custom: include file
1212
ms.author: tchladek
@@ -104,10 +104,10 @@ Use the `create_user_and_token` method to create a Communication Services identi
104104
```python
105105
# Issue an identity and an access token with the "voip" scope for the new identity
106106
identity_token_result = client.create_user_and_token(["voip"])
107-
identity = identity_token_result[0].properties['id']
107+
identity = identity_token_result[0]
108108
token = identity_token_result[1].token
109109
expires_on = identity_token_result[1].expires_on.strftime("%d/%m/%y %I:%M %S %p")
110-
print("\nCreated an identity with ID: " + identity)
110+
print("\nCreated an identity with ID: " + identity.properties['id'])
111111
print("\nIssued an access token with 'voip' scope that expires at " + expires_on + ":")
112112
print(token)
113113
```
@@ -119,7 +119,7 @@ To refresh an access token, use the `CommunicationUserIdentifier` object to reis
119119
```python
120120
# Value existingIdentity represents identity of Azure Communication Services stored during identity creation
121121
identity = CommunicationUserIdentifier(existingIdentity)
122-
token_result = client.get_token( identity, ["voip"])
122+
token_result = client.get_token(identity, ["voip"])
123123
```
124124

125125
## Revoke access tokens

articles/cost-management-billing/manage/link-partner-id-power-apps-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ When you have access to your customer's resources, use the Azure portal, PowerSh
3434

3535
1. Sign in to the [Azure portal](https://portal.azure.com).
3636
1. Go to [Link to a partner ID](https://portal.azure.com/#blade/Microsoft_Azure_Billing/managementpartnerblade) in the Azure portal.
37-
1. Enter the [Microsoft Partner Network](https://partner.microsoft.com/) ID for your organization. Be sure to use the **Associated MPN ID** shown on your partner profile.
37+
1. Enter the [Microsoft Partner Network](https://partner.microsoft.com/) ID for your organization. Be sure to use the **Associated MPN ID** shown on your partner center profile. This is typically known as your [Partner Location Account MPN ID](/partner-center/account-structure).
3838
:::image type="content" source="./media/link-partner-id-power-apps-accounts/link-partner-id.png" alt-text="Screenshot showing the Link to a partner ID window." lightbox="./media/link-partner-id-power-apps-accounts/link-partner-id.png" :::
3939
1. To link your partner ID to another customer, switch the directory. Under **Switch directory**, select the appropriate directory.
4040
:::image type="content" source="./media/link-partner-id-power-apps-accounts/switch-directory.png" alt-text="Screenshot showing the Directory + subscription window where can you switch your directory." lightbox="./media/link-partner-id-power-apps-accounts/switch-directory.png" :::

articles/network-watcher/network-watcher-intrusion-detection-open-source-tools.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ For all other methods of installation, visit https://suricata.readthedocs.io/en/
4040
```
4141
sudo add-apt-repository ppa:oisf/suricata-stable
4242
sudo apt-get update
43-
sudo sudo apt-get install suricata
43+
sudo apt-get install suricata
4444
```
4545
4646
1. To verify your installation, run the command `suricata -h` to see the full list of commands.
@@ -290,4 +290,4 @@ Learn how to visualize your NSG flow logs with Power BI by visiting [Visualize N
290290
[4]: ./media/network-watcher-intrusion-detection-open-source-tools/figure4.png
291291
[5]: ./media/network-watcher-intrusion-detection-open-source-tools/figure5.png
292292
[6]: ./media/network-watcher-intrusion-detection-open-source-tools/figure6.png
293-
[7]: ./media/network-watcher-intrusion-detection-open-source-tools/figure7.png
293+
[7]: ./media/network-watcher-intrusion-detection-open-source-tools/figure7.png

0 commit comments

Comments
 (0)