Skip to content

Commit 4c832a8

Browse files
authored
Merge pull request #111487 from MicrosoftDocs/master
4/15 AM Publish
2 parents d6e4eeb + 42754a7 commit 4c832a8

File tree

1,025 files changed

+19772
-1027
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,025 files changed

+19772
-1027
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50091,6 +50091,11 @@
5009150091
"redirect_url": "/azure/cognitive-services/speech-service",
5009250092
"redirect_document_id": false
5009350093
},
50094+
{
50095+
"source_path": "articles/hdinsight/spark/azure-synapse-analytics-job-definition.md",
50096+
"redirect_url": "../../synapse-analytics/spark/apache-spark-job-definitions.md",
50097+
"redirect_document_id": true
50098+
},
5009450099
{
5009550100
"source_path": "articles/media-services/latest/access-api-portal.md",
5009650101
"redirect_url": "/azure/media-services/latest/access-api-howto",
@@ -50784,6 +50789,11 @@
5078450789
"source_path": "articles/security/fundamentals/database-security-overview.md",
5078550790
"redirect_url": "/azure/sql-database/sql-database-security-overview",
5078650791
"redirect_document_id": false
50792+
},
50793+
{
50794+
"source_path": "articles/azure-monitor/insights/key-vault-insights-overview.md",
50795+
"redirect_url": "/azure/azure-monitor/overview",
50796+
"redirect_document_id": false
5078750797
},
5078850798
{
5078950799
"source_path": "articles/security/fundamentals/database-best-practices.md",

.vscode/settings.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@
6262
"auditd"
6363
],
6464
"git.ignoreLimitWarning": true
65-
}
65+
}

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Next, expose the API by adding a scope:
112112
1. In **App registrations (Legacy)**, select **New application registration**.
113113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
114114
1. For **Application type**, choose **Native**.
115-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
115+
1. For **Redirect URI**, enter `myapp://auth`.
116116
1. Select **Create**. After it's created, copy the application ID and save it to use later.
117117
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
118118
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
@@ -125,7 +125,7 @@ Next, expose the API by adding a scope:
125125
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126126
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127127
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
128+
1. For **Redirect URI**, enter `myapp://auth`.
129129
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130130
1. Select **Register**.
131131
1. Record the **Application (client) ID** for use in a later step.

articles/active-directory/b2b/invitation-email-elements.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 02/06/2019
9+
ms.date: 04/15/2020
1010

1111
ms.author: mimart
1212
author: msmimart
301 Bytes
Loading
680 Bytes
Loading

articles/active-directory/hybrid/how-to-connect-pta-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ If you are migrating from AD FS (or other federation technologies) to Pass-throu
116116

117117
## Can I use Pass-through Authentication in a multi-forest Active Directory environment?
118118

119-
Yes. Multi-forest environments are supported if there are forest trusts between your Active Directory forests and if name suffix routing is correctly configured.
119+
Yes. Multi-forest environments are supported if there are forest trusts (two-way) between your Active Directory forests and if name suffix routing is correctly configured.
120120

121121
## Does Pass-through Authentication provide load balancing across multiple Authentication Agents?
122122

articles/active-directory/hybrid/tshoot-connect-objectsync.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -58,11 +58,6 @@ When UserPrincipalName (UPN)/Alternate Login ID suffix is not verified with the
5858

5959
![Azure AD replaces UPN](media/tshoot-connect-objectsync/objsynch2.png)
6060

61-
### Changing UPN Suffix from one federated domain to another federated domain
62-
Azure Active Directory does not allow the synchronization of UserPrincipalName (UPN)/Alternate Login ID suffix change from one federated domain to another federated domain. This applies to domains, that are verified with the Azure AD Tenant and have the Authentication Type as Federated.
63-
64-
![No UPN synch from one federated domain to another](media/tshoot-connect-objectsync/objsynch3.png)
65-
6661
### Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled
6762
When the Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled, Azure Active Directory does not allow synchronization updates to UserPrincipalName/Alternate Login ID for licensed user accounts with managed authentication.
6863

articles/active-directory/manage-apps/application-proxy-connector-installation-problem.md

Lines changed: 52 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,21 +47,70 @@ When the installation of a connector fails, the root cause is usually one of the
4747

4848
3. Open a browser (separate tab) and go to the following web page: `https://login.microsoftonline.com`, make sure that you can login to that page.
4949

50-
## Verify Machine and backend components support for Application Proxy trust cert
50+
## Verify Machine and backend components support for Application Proxy trust certificate
5151

52-
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust.
52+
**Objective:** Verify that the connector machine, backend proxy and firewall can support the certificate created by the connector for future trust and that the certificate is valid.
5353

5454
>[!NOTE]
5555
>The connector tries to create a SHA512 cert that is supported by TLS1.2. If the machine or the backend firewall and proxy does not support TLS1.2, the installation fails.
5656
>
5757
>
5858
59-
**To resolve the issue:**
59+
**Review the pre-requisites required:**
6060

6161
1. Verify the machine supports TLS1.2 – All Windows versions after 2012 R2 should support TLS 1.2. If your connector machine is from a version of 2012 R2 or prior, make sure that the following KBs are installed on the machine: <https://support.microsoft.com/help/2973337/sha512-is-disabled-in-windows-when-you-use-tls-1.2>
6262

6363
2. Contact your network admin and ask to verify that the backend proxy and firewall do not block SHA512 for outgoing traffic.
6464

65+
**To verify the client certificate:**
66+
67+
Verify the thumbprint of the current client certificate. The certificate store can be found in %ProgramData%\microsoft\Microsoft AAD Application Proxy Connector\Config\TrustSettings.xml
68+
69+
```
70+
<?xml version="1.0" encoding="utf-8"?>
71+
<ConnectorTrustSettingsFile xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
72+
<CloudProxyTrust>
73+
<Thumbprint>4905CC64B2D81BBED60962ECC5DCF63F643CCD55</Thumbprint>
74+
<IsInUserStore>false</IsInUserStore>
75+
</CloudProxyTrust>
76+
</ConnectorTrustSettingsFile>
77+
```
78+
79+
Here are the possible **IsInUserStore** values and meanings:
80+
81+
- **false** - The client certificate was created during the installation or registration initiated by Register-AppProxyConnector command. It is stored in the personal container in the certificate store of the local machine.
82+
83+
Follow the steps to verify the certificate:
84+
85+
1. Run **certlm.msc**
86+
2. In the management console expand the Personal container and click on Certificates
87+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.net**
88+
89+
- **true** - The automatically renewed certificate is stored in the personal container in the user certificate store of the Network Service.
90+
91+
Follow the steps to verify the certificate:
92+
93+
1. Download [PsTools.zip](https://docs.microsoft.com/sysinternals/downloads/pstools)
94+
2. Extract [PsExec](https://docs.microsoft.com/sysinternals/downloads/psexec) from the package and run **psexec -i -u "nt authority\network service" cmd.exe** from an elevated command prompt.
95+
3. Run **certmgr.msc** in the newly appeared command prompt
96+
2. In the management console expand the Personal container and click on Certificates
97+
3. Locate the certificate issued by **connectorregistrationca.msappproxy.ne
98+
99+
**To renew the client certificate:**
100+
101+
If a connector is not connected to the service for several months, its certificates may be outdated. The failure of the certificate renewal leads to an expired certificate. This makes the connector service to stop working. The event 1000 is recorded in the admin log of the connector:
102+
103+
"Connector re-registration failed: The Connector trust certificate expired. Run the PowerShell cmdlet Register-AppProxyConnector on the computer on which the Connector is running to re-register your Connector."
104+
105+
In this case, uninstall and reinstall the connector to trigger registration or you can run the following PowerShell commands:
106+
107+
```
108+
Import-module AppProxyPSModule
109+
Register-AppProxyConnector
110+
```
111+
112+
To learn more about the Register-AppProxyConnector command, please see [Create an unattended installation script for the Azure AD Application Proxy connector](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-register-connector-powershell)
113+
65114
## Verify admin is used to install the connector
66115

67116
**Objective:** Verify that the user who tries to install the connector is an administrator with correct credentials. Currently, the user must be at least an application administrator for the installation to succeed.

articles/active-directory/manage-apps/application-proxy-wildcard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ The wildcard application is represented with just one tile in the [MyApps panel]
113113

114114
### Kerberos constrained delegation
115115

116-
For applications using [kerberos constrained delegation (KCD) as the SSO method](application-proxy-configure-single-sign-on-with-kcd.md), the SPN listed for the SSO method may also need a wildcard. For example, the SPN could be: `HTTP/*.adventure-works.com`. You still need to have the individual SPNs configured on your backend servers (for example, `http://expenses.adventure-works.com and HTTP/travel.adventure-works.com`).
116+
For applications using [kerberos constrained delegation (KCD) as the SSO method](application-proxy-configure-single-sign-on-with-kcd.md), the SPN listed for the SSO method may also need a wildcard. For example, the SPN could be: `HTTP/*.adventure-works.com`. You still need to have the individual SPNs configured on your backend servers (for example, `HTTP/expenses.adventure-works.com and HTTP/travel.adventure-works.com`).
117117

118118
## Scenario 1: General wildcard application
119119

0 commit comments

Comments
 (0)