Skip to content

Commit 4ced029

Browse files
authored
Merge pull request #57641 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 5ccd503 + 1016dd4 commit 4ced029

File tree

7 files changed

+67
-62
lines changed

7 files changed

+67
-62
lines changed

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ To enable / disable a device, you have two options:
150150
**Remarks:**
151151

152152
- You need to be a global administrator in Azure AD to enable / disable a device.
153-
- Disabling a device prevents a device from accessing your Azure AD resources.
153+
- Disabling a device prevents a device from successfully authenticating with Azure AD, therby preventing the device from accessing your Azure AD resources that are guarded by device CA or using your WH4B credentials.
154154

155155

156156

articles/active-directory/devices/faq.md

Lines changed: 55 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -18,29 +18,10 @@ ms.author: markvi
1818
ms.reviewer: jairoc
1919

2020
---
21-
# Azure Active Directory device management FAQ
22-
23-
**Q: Can I register Android or iOS BYOD devices?**
24-
25-
**A:** Yes, but only with Azure device registration service and for hybrid customers. It is not supported with on-premises device registration service in AD FS.
26-
27-
**Q: How can I register a macOS device?**
28-
29-
**A:** To register macOS device:
30-
31-
1. [Create a compliance policy](https://docs.microsoft.com/intune/compliance-policy-create-mac-os)
32-
2. [Define a conditional access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
3321

34-
**Remarks:**
35-
36-
- The users that are included in your conditional access policy need a [supported version of Office for macOS](../conditional-access/technical-reference.md#client-apps-condition) to access resources.
37-
38-
- During the first access attempt, your users are prompted to enroll the device using the company portal.
39-
40-
---
41-
42-
**Q: I registered the device recently. Why can’t I see the device under my user info in the Azure portal?**
22+
# Azure Active Directory device management FAQ
4323

24+
**Q: I registered the device recently. Why can’t I see the device under my user info in the Azure portal? Or Why is device owner marked as N/A for hybrid Azure AD joined devices?**
4425
**A:** Windows 10 devices that are hybrid Azure AD joined do not show up under the USER devices.
4526
You need to use All devices view in Azure portal. You can also use PowerShell [Get-MsolDevice](/powershell/module/msonline/get-msoldevice?view=azureadps-1.0) cmdlet.
4627

@@ -54,15 +35,20 @@ Only the following devices are listed under the USER devices:
5435

5536
**Q: How do I know what the device registration state of the client is?**
5637

57-
**A:** You can use the Azure portal, go to All devices and search for the device using device ID. Check the value under the join type column.
58-
59-
If you want to check the local device registration state from a registered device:
38+
**A:** You can use the Azure portal, go to All devices and search for the device using device ID. Check the value under the join type column. Sometimes, the device could have been reset or re-imaged. So, it is essential to also check device registration state on the device too:
6039

6140
- For Windows 10 and Windows Server 2016 or later devices, run dsregcmd.exe /status.
6241
- For down-level OS versions, run "%programFiles%\Microsoft Workplace Join\autoworkplace.exe"
6342

6443
---
6544

45+
**Q: I see the device record under the USER info in the Azure portal and can see the state as registered on the device. Am I setup correctly for using conditional access?**
46+
47+
**A:** The device join state, reflected by deviceID, must match with that on Azure AD and meet any evaluation criteria for conditional access.
48+
For more information, see [Require managed devices for cloud app access with conditional access](../conditional-access/require-managed-devices.md).
49+
50+
---
51+
6652
**Q: I have deleted in the Azure portal or using Windows PowerShell, but the local state on the device says that it is still registered?**
6753

6854
**A:** This is by design. The device will not have access to resources in the cloud.
@@ -83,25 +69,6 @@ For down-level Windows OS versions that are on-premises AD domain-joined:
8369
2. Type `"%programFiles%\Microsoft Workplace Join\autoworkplace.exe /l"`.
8470
3. Type `"%programFiles%\Microsoft Workplace Join\autoworkplace.exe /j"`.
8571

86-
---
87-
**Q: How do I unjoin an Azure AD Joined device locally on the device?**
88-
89-
**A:**
90-
- For hybrid Azure AD Joined devices, make sure to turn off auto registration so that the scheduled task does not register the device again. Next, open command prompt as an administrator and type `dsregcmd.exe /debug /leave`. Alternatively, this command can be run as a script across multiple devices to unjoin in bulk.
91-
92-
- For pure Azure AD Joined devices, make sure you have an offline local administrator account or create one, as you won't be able to sign in with any Azure AD user credentials. Next, go to **Settings** > **Accounts** > **Access Work or School**. Select your account and click on **Disconnect**. Follow the prompts and provide the local administrator credentials when prompted. Reboot the device to complete the unjoin process.
93-
94-
---
95-
96-
**Q: My users cannot search printers from Azure AD Joined devices. How can I enable printing from Azure AD Joined devices ?**
97-
98-
**A:** For deploying printers for Azure AD Joined devices, see [Hybrid cloud print](https://docs.microsoft.com/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy). You will need an on-premises Windows Server to deploy hybrid cloud print. Currently, cloud-based print service is not available.
99-
100-
---
101-
102-
**Q: How do I connect to a remote Azure AD joined device?**
103-
**A:** Refer to the article https://docs.microsoft.com/windows/client-management/connect-to-remote-aadj-pc for details.
104-
10572
---
10673

10774
**Q: Why do I see duplicate device entries in Azure portal?**
@@ -124,7 +91,27 @@ For down-level Windows OS versions that are on-premises AD domain-joined:
12491

12592
>[!Note]
12693
>For enrolled devices, we recommend wiping the device to ensure that users cannot access the resources. For more information, see [Enroll devices for management in Intune](https://docs.microsoft.com/intune/deploy-use/enroll-devices-in-microsoft-intune).
94+
---
95+
96+
# Azure AD Join FAQ
97+
98+
**Q: How do I unjoin an Azure AD Joined device locally on the device?**
99+
100+
**A:**
101+
- For hybrid Azure AD Joined devices, make sure to turn off auto registration so that the scheduled task does not register the device again. Next, open command prompt as an administrator and type `dsregcmd.exe /debug /leave`. Alternatively, this command can be run as a script across multiple devices to unjoin in bulk.
102+
103+
- For pure Azure AD Joined devices, make sure you have an offline local administrator account or create one, as you won't be able to sign in with any Azure AD user credentials. Next, go to **Settings** > **Accounts** > **Access Work or School**. Select your account and click on **Disconnect**. Follow the prompts and provide the local administrator credentials when prompted. Reboot the device to complete the unjoin process.
104+
105+
---
106+
107+
**Q: My users cannot search printers from Azure AD Joined devices. How can I enable printing from Azure AD Joined devices ?**
108+
109+
**A:** For deploying printers for Azure AD Joined devices, see [Hybrid cloud print](https://docs.microsoft.com/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy). You will need an on-premises Windows Server to deploy hybrid cloud print. Currently, cloud-based print service is not available.
127110

111+
---
112+
113+
**Q: How do I connect to a remote Azure AD joined device?**
114+
**A:** Refer to the article https://docs.microsoft.com/windows/client-management/connect-to-remote-aadj-pc for details.
128115

129116
---
130117

@@ -141,13 +128,6 @@ Please evaluate the conditional access policy rules and ensure that the device i
141128

142129
---
143130

144-
**Q: I see the device record under the USER info in the Azure portal and can see the state as registered on the device. Am I setup correctly for using conditional access?**
145-
146-
**A:** The device join state, reflected by deviceID, must match with that on Azure AD and meet any evaluation criteria for conditional access.
147-
For more information, see [Require managed devices for cloud app access with conditional access](../conditional-access/require-managed-devices.md).
148-
149-
---
150-
151131
**Q: Why do I get a "username or password is incorrect" message for a device I have just joined to Azure AD?**
152132

153133
**A:** Common reasons for this scenario are:
@@ -156,7 +136,7 @@ For more information, see [Require managed devices for cloud app access with con
156136

157137
- Your computer is unable to communicate with Azure Active Directory. Check for any network connectivity issues.
158138

159-
- Federated logins requires your federation server to support a WS-Trust active endpoint.
139+
- Federated logins requires your federation server to support WS-Trust endpoints enabled and accessible.
160140

161141
- You have enabled Pass through Authentication and the user has a temporary password that needs to be changed on logon.
162142

@@ -168,15 +148,16 @@ For more information, see [Require managed devices for cloud app access with con
168148

169149
---
170150

171-
**Q: Why did my attempt to join a PC fail although I didn't get any error information?**
151+
**Q: Why did my attempt to Azure AD join a PC fail although I didn't get any error information?**
172152

173153
**A:** A likely cause is that the user is logged in to the device using the local built-in administrator account.
174154
Please create a different local account before using Azure Active Directory Join to complete the setup.
175155

176-
177156
---
178157

179-
**Q: Where can I find troubleshooting information about the automatic device registration?**
158+
# Hybrid Azure AD Join FAQ
159+
160+
**Q: Where can I find troubleshooting information for diagnosing hybrid Azure AD join failures?**
180161

181162
**A:** For troubleshooting information, see:
182163

@@ -187,3 +168,23 @@ Please create a different local account before using Azure Active Directory Join
187168

188169
---
189170

171+
# Azure AD Register FAQ
172+
173+
**Q: Can I register Android or iOS BYOD devices?**
174+
175+
**A:** Yes, but only with Azure device registration service and for hybrid customers. It is not supported with on-premises device registration service in AD FS.
176+
177+
**Q: How can I register a macOS device?**
178+
179+
**A:** To register macOS device:
180+
181+
1. [Create a compliance policy](https://docs.microsoft.com/intune/compliance-policy-create-mac-os)
182+
2. [Define a conditional access policy for macOS devices](../active-directory-conditional-access-azure-portal.md)
183+
184+
**Remarks:**
185+
186+
- The users that are included in your conditional access policy need a [supported version of Office for macOS](../conditional-access/technical-reference.md#client-apps-condition) to access resources.
187+
188+
- During the first access attempt, your users are prompted to enroll the device using the company portal.
189+
190+
---

articles/aks/ingress-static-ip.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You can also:
2525

2626
## Before you begin
2727

28-
This article uses Helm to install the NGINX ingress controller, cert-manager, and a sample web app. You need to have Helm initialized within your AKS cluster and using a service account for Tiller. Make sure that you are using the latest release of Helm. Make sure that you are using the latest release of Helm. For upgrade instructions, see the [Helm install docs][helm-install]. For more information on configuring and using Helm, see [Install applications with Helm in Azure Kubernetes Service (AKS)][use-helm].
28+
This article uses Helm to install the NGINX ingress controller, cert-manager, and a sample web app. You need to have Helm initialized within your AKS cluster and using a service account for Tiller. Make sure that you are using the latest release of Helm. For upgrade instructions, see the [Helm install docs][helm-install]. For more information on configuring and using Helm, see [Install applications with Helm in Azure Kubernetes Service (AKS)][use-helm].
2929

3030
This article also requires that you are running the Azure CLI version 2.0.41 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
3131

articles/dev-spaces/get-started-netcore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ az group create --name MyResourceGroup --location <region>
6666
Create a Kubernetes cluster with the following command:
6767

6868
```cmd
69-
az aks create -g MyResourceGroup -n MyAKS --location <region> --kubernetes-version 1.11.2 --enable-addons http_application_routing
69+
az aks create -g MyResourceGroup -n MyAKS --location <region> --kubernetes-version 1.11.2 --enable-addons http_application_routing --generate-ssh-keys
7070
```
7171

7272
It takes a few minutes to create the cluster.

articles/dev-spaces/get-started-nodejs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ az group create --name MyResourceGroup --location <region>
6666
Create a Kubernetes cluster with the following command:
6767

6868
```cmd
69-
az aks create -g MyResourceGroup -n MyAKS --location <region> --kubernetes-version 1.11.2 --enable-addons http_application_routing
69+
az aks create -g MyResourceGroup -n MyAKS --location <region> --kubernetes-version 1.11.2 --enable-addons http_application_routing --generate-ssh-keys
7070
```
7171

7272
It takes a few minutes to create the cluster.

articles/dev-spaces/troubleshooting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,9 @@ On the command line:
5858

5959
When using _azds.exe_, use the --verbose command-line option, and use the --output command-line option to specify the output format.
6060

61-
```cmd
62-
azds up --verbose --output json
63-
```
61+
```cmd
62+
azds up --verbose --output json
63+
```
6464

6565
In Visual Studio:
6666

articles/sql-database/sql-database-managed-instance-connect-app.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ If you've established on-premises to Azure connection successfully and you can't
5555
Managed Instance can be accessed only through a private IP address so in order to access it from your developer box, you first need to make a connection between your developer box and the Managed Instance VNet. To do so, configure a Point-to-Site connection to a VNet using native Azure certificate authentication. For more information, see [Configure a point-to-site connection to connect to an Azure SQL Database Managed Instance from on-premises computer](sql-database-managed-instance-configure-p2s.md).
5656

5757
## Connect from on-premises with VNet peering
58-
Another scenario implemented by customers is where VPN gateway is installed in a separate virtual network and a subscription from the one hosting Managed Instance. The two virtual etworks are then peered. The following sample architecture diagram shows how this can be implemented.
58+
Another scenario implemented by customers is where VPN gateway is installed in a separate virtual network and a subscription from the one hosting Managed Instance. The two virtual networks are then peered. The following sample architecture diagram shows how this can be implemented.
5959

6060
![VNet peering](./media/sql-database-managed-instance-connect-app/vnet-peering.png)
6161

@@ -78,6 +78,10 @@ A special case of connecting Azure App Service to Managed Instance is when you i
7878
This scenario is illustrated in the following diagram:
7979

8080
![integrated app peering](./media/sql-database-managed-instance/integrated-app-peering.png)
81+
82+
>[!NOTE]
83+
>The VNet Integration feature does not integrate an app with a VNet that has an ExpressRoute Gateway. Even if the ExpressRoute Gateway is configured in coexistence mode the VNet Integration does not work. If you need to access resources through an ExpressRoute connection, then you can use an App Service Environment, which runs in your VNet.
84+
>
8185
8286
## Troubleshooting connectivity issues
8387

0 commit comments

Comments
 (0)