Skip to content

Commit 502ccf7

Browse files
committed
Resolved conflict
2 parents dd05609 + 52e0c2a commit 502ccf7

File tree

717 files changed

+15770
-7969
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

717 files changed

+15770
-7969
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -377,6 +377,11 @@
377377
"url": "https://github.com/microsoft/immersive-reader-sdk",
378378
"branch": "master",
379379
"branch_mapping": {}
380+
},
381+
{
382+
"path_to_root": "azure-cosmosdb-java-v2",
383+
"url": "https://github.com/Azure/azure-cosmosdb-java",
384+
"branch": "master"
380385
}
381386
],
382387
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 423 additions & 13 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/predicates.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 10/28/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -27,6 +27,8 @@ The following diagram shows the relationship between the elements:
2727

2828
The **Predicate** element defines a basic validation to check the value of a claim type and returns `true` or `false`. The validation is done by using a specified **Method** element and a set of **Parameter** elements relevant to the method. For example, a predicate can check whether the length of a string claim value is within the range of minimum and maximum parameters specified, or whether a string claim value contains a character set. The **UserHelpText** element provides an error message for users if the check fails. The value of **UserHelpText** element can be localized using [language customization](localization.md).
2929

30+
The **Predicates** element must appear directly following the **ClaimsSchema** element within the [BuildingBlocks](buildingblocks.md) element.
31+
3032
The **Predicates** element contains the following element:
3133

3234
| Element | Occurrences | Description |
@@ -108,6 +110,8 @@ The following example shows a `IsDateRange` method with the parameters `Minimum`
108110

109111
While the predicates define the validation to check against a claim type, the **PredicateValidations** group a set of predicates to form a user input validation that can be applied to a claim type. Each **PredicateValidation** element contains a set of **PredicateGroup** elements that contain a set of **PredicateReference** elements that points to a **Predicate**. To pass the validation, the value of the claim should pass all of the tests of any predicate under all of the **PredicateGroup** with their set of **PredicateReference** elements.
110112

113+
The **PredicateValidations** element must appear directly following the **Predicates** element within the [BuildingBlocks](buildingblocks.md) element.
114+
111115
```XML
112116
<PredicateValidations>
113117
<PredicateValidation Id="">
@@ -190,7 +194,7 @@ With **Predicates** and **PredicateValidationsInput** you can control the comple
190194
- **Lowercase** using the `IncludesCharacters` method, validates that the password contains a lowercase letter.
191195
- **Uppercase** using the `IncludesCharacters` method, validates that the password contains an uppercase letter.
192196
- **Number** using the `IncludesCharacters` method, validates that the password contains a digit.
193-
- **Symbol** using the `IncludesCharacters` method, validates that the password contains one of following symbols `@#$%^&*\-_+=[]{}|\:',?/~"();!`
197+
- **Symbol** using the `IncludesCharacters` method, validates that the password contains one of several symbol characters.
194198
- **PIN** using the `MatchesRegex` method, validates that the password contains numbers only.
195199
- **AllowedAADCharacters** using the `MatchesRegex` method, validates that the password only invalid character was provided.
196200
- **DisallowedWhitespace** using the `MatchesRegex` method, validates that the password doesn't begin or end with a whitespace character.
@@ -229,7 +233,7 @@ With **Predicates** and **PredicateValidationsInput** you can control the comple
229233
<Predicate Id="Symbol" Method="IncludesCharacters">
230234
<UserHelpText>a symbol</UserHelpText>
231235
<Parameters>
232-
<Parameter Id="CharacterSet">@#$%^&amp;*\-_+=[]{}|\:',?/`~"();!</Parameter>
236+
<Parameter Id="CharacterSet">@#$%^&amp;*\-_+=[]{}|\\:',.?/`~"();!</Parameter>
233237
</Parameters>
234238
</Predicate>
235239

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ On an Azure AD-joined or registered device, user authentication happens using mo
9494
| Representation in the directory | Device objects in the Azure AD directory | Computer objects in the Azure AD DS managed domain |
9595
| Authentication | OAuth / OpenID Connect based protocols | Kerberos and NTLM protocols |
9696
| Management | Mobile Device Management (MDM) software like Intune | Group Policy |
97-
| Networking | Works over the internet | Requires machines to be on the same virtual network as the managed domain |
97+
| Networking | Works over the internet | Must be connected to, or peered with, the virtual network where the managed domain is deployed |
9898
| Great for... | End-user mobile or desktop devices | Server VMs deployed in Azure |
9999

100100
## Next steps
@@ -107,4 +107,4 @@ To get started with using Azure AD DS, [create an Azure AD DS managed domain usi
107107
[custom-ou]: create-ou.md
108108
[manage-gpos]: manage-group-policy.md
109109
[tutorial-ldaps]: tutorial-configure-ldaps.md
110-
[tutorial-create]: tutorial-create-instance.md
110+
[tutorial-create]: tutorial-create-instance.md

articles/active-directory-domain-services/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Classic virtual networks aren't supported for new deployments. Existing managed
4343
Yes. Azure AD Domain Services can be enabled in an Azure Resource Manager virtual network. Classic Azure virtual networks are no longer supported for when you create a new managed domain.
4444

4545
### Can I migrate my existing managed domain from a Classic virtual network to a Resource Manager virtual network?
46-
Yes, this feature is in preview. For more information, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager (preview)][migrate-from-classic-vnet.md]
46+
Yes, this feature is in preview. For more information, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager (preview)](migrate-from-classic-vnet.md).
4747

4848
### Can I enable Azure AD Domain Services in an Azure CSP (Cloud Solution Provider) subscription?
4949
Yes. For more information, see [how to enable Azure AD Domain Services in Azure CSP subscriptions](csp.md).

articles/active-directory-domain-services/network-considerations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 08/09/2019
13+
ms.date: 10/23/2019
1414
ms.author: iainfou
1515

1616
---
@@ -87,8 +87,8 @@ An Azure AD DS managed domain creates some networking resources during deploymen
8787
| Azure resource | Description |
8888
|:----------------------------------------|:---|
8989
| Network interface card | Azure AD DS hosts the managed domain on two domain controllers (DCs) that run on Windows Server as Azure VMs. Each VM has a virtual network interface that connects to your virtual network subnet. |
90-
| Dynamic basic public IP address | Azure AD DS communicates with the synchronization and management service using a basic SKU public IP address. For more information about public IP addresses, see [IP address types and allocation methods in Azure](../virtual-network/virtual-network-ip-addresses-overview-arm.md). |
91-
| Azure basic load balancer | Azure AD DS uses a basic SKU load balancer for network address translation (NAT) and load balancing (when used with secure LDAP). For more information about Azure load balancers, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md) |
90+
| Dynamic standard public IP address | Azure AD DS communicates with the synchronization and management service using a standard SKU public IP address. For more information about public IP addresses, see [IP address types and allocation methods in Azure](../virtual-network/virtual-network-ip-addresses-overview-arm.md). |
91+
| Azure standard load balancer | Azure AD DS uses a standard SKU load balancer for network address translation (NAT) and load balancing (when used with secure LDAP). For more information about Azure load balancers, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md) |
9292
| Network address translation (NAT) rules | Azure AD DS creates and uses three NAT rules on the load balancer - one rule for secure HTTP traffic, and two rules for secure PowerShell remoting. |
9393
| Load balancer rules | When an Azure AD DS managed domain is configured for secure LDAP on TCP port 636, three rules are created and used on a load balancer to distribute the traffic. |
9494

articles/active-directory-domain-services/powershell-create-instance.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,12 @@ $Vnet= New-AzVirtualNetwork `
126126

127127
Now let's create an Azure AD DS managed domain. Set your Azure subscription ID, and then provide a name for the managed domain, such as *contoso.com*. You can get your subscription ID using the [Get-AzSubscription][Get-AzSubscription] cmdlet.
128128

129+
If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
130+
131+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
132+
133+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones].
134+
129135
```powershell
130136
$AzureSubscriptionId = "YOUR_AZURE_SUBSCRIPTION_ID"
131137
$ManagedDomainName = "contoso.com"
@@ -144,6 +150,8 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
144150

145151
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
146152
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
153+
* If you created an Azure AD DS managed domain in a region that supports Availability Zones, create a network security group to restrict traffic in the virtual network for the Azure AD DS managed domain. An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly.
154+
* To create the network security group and required rules, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically create and configure the network security group.
147155
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
148156

149157
## Complete PowerShell script
@@ -229,6 +237,8 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
229237

230238
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
231239
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
240+
* If you created an Azure AD DS managed domain in a region that supports Availability Zones, create a network security group to restrict traffic in the virtual network for the Azure AD DS managed domain. An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly.
241+
* To create the network security group and required rules, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically create and configure the network security group.
232242
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
233243

234244
## Next steps
@@ -254,3 +264,4 @@ To see the Azure AD DS managed domain in action, you can [domain-join a Windows
254264
[New-AzVirtualNetwork]: /powershell/module/Az.Network/New-AzVirtualNetwork
255265
[Get-AzSubscription]: /powershell/module/Az.Accounts/Get-AzSubscription
256266
[cloud-shell]: /azure/cloud-shell/cloud-shell-windows-users
267+
[availability-zones]: ../availability-zones/az-overview.md

articles/active-directory-domain-services/tutorial-configure-networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ To see this managed domain in action, create and join a virtual machine to the d
151151
> [!div class="nextstepaction"]
152152
> [Join a Windows Server virtual machine to your managed domain](join-windows-vm.md)
153153
154-
<!-- INTERNAL LINKS -->
154+
<!-- INTERNAL LINKS -->
155155
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
156156
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
157157
[create-azure-ad-ds-instance]: tutorial-create-instance.md

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/18/2019
11+
ms.date: 10/23/2019
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -86,7 +86,11 @@ The following DNS name restrictions also apply:
8686
Complete the fields in the *Basics* window of the Azure portal to create an Azure AD DS instance:
8787

8888
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
89-
1. Choose the Azure **Location** in which the managed domain should be created.
89+
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
90+
91+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
92+
93+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
9094

9195
![Configure basic settings for an Azure AD Domain Services instance](./media/tutorial-create-instance-advanced/basics-window.png)
9296

@@ -165,7 +169,7 @@ On the **Summary** page of the wizard, review the configuration settings for the
165169

166170
![Domain Services status once successfully provisioned](./media/tutorial-create-instance-advanced/successfully-provisioned.png)
167171

168-
During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in your directory. These Enterprise Applications are needed to service your managed domain. It's imperative that these applications are not deleted at any time.
172+
The managed domain is associated with your Azure AD tenant. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in the Azure AD tenant. These Enterprise Applications are needed to service your managed domain. Don't delete these applications.
169173

170174
## Update DNS settings for the Azure virtual network
171175

@@ -236,6 +240,7 @@ To see this managed domain in action, create and join a virtual machine to the d
236240
[on-prem-sync]: tutorial-configure-password-hash-sync.md
237241
[configure-sspr]: ../active-directory/authentication/quickstart-sspr.md
238242
[password-hash-sync-process]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
243+
[availability-zones]: ../availability-zones/az-overview.md
239244

240245
<!-- EXTERNAL LINKS -->
241246
[naming-prefix]: /windows-server/identity/ad-ds/plan/selecting-the-forest-root-domain#selecting-a-prefix

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/18/2019
11+
ms.date: 10/23/2019
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -85,7 +85,11 @@ The following DNS name restrictions also apply:
8585
Complete the fields in the *Basics* window of the Azure portal to create an Azure AD DS instance:
8686

8787
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
88-
1. Choose the Azure **Location** in which the managed domain should be created.
88+
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
89+
90+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
91+
92+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
8993

9094
![Configure basic settings for an Azure AD Domain Services instance](./media/tutorial-create-instance/basics-window.png)
9195

@@ -115,7 +119,7 @@ On the **Summary** page of the wizard, review the configuration settings for the
115119

116120
![Domain Services status once successfully provisioned](./media/tutorial-create-instance/successfully-provisioned.png)
117121

118-
We provision Azure AD Domain Services on the Azure Active Directory tenant and the Azure AD Domain Services resource for the service is created within the associated Azure subscription. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in your Azure Active directory instance where you have enabled the Azure AD domain services. These Enterprise Applications are needed to service your managed domain. It's imperative that these applications are not deleted at any time.
122+
The managed domain is associated with your Azure AD tenant. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in the Azure AD tenant. These Enterprise Applications are needed to service your managed domain. Don't delete these applications.
119123

120124
## Update DNS settings for the Azure virtual network
121125

@@ -186,6 +190,7 @@ Before you domain-join VMs and deploy applications that use the Azure AD DS mana
186190
[on-prem-sync]: tutorial-configure-password-hash-sync.md
187191
[configure-sspr]: ../active-directory/authentication/quickstart-sspr.md
188192
[password-hash-sync-process]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
193+
[availability-zones]: ../availability-zones/az-overview.md
189194

190195
<!-- EXTERNAL LINKS -->
191196
[naming-prefix]: /windows-server/identity/ad-ds/plan/selecting-the-forest-root-domain#selecting-a-prefix

0 commit comments

Comments
 (0)