Skip to content

Commit 51540b8

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ga-sentinel
2 parents ac4ffcd + f3bea3d commit 51540b8

File tree

210 files changed

+2732
-887
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

210 files changed

+2732
-887
lines changed

articles/active-directory-b2c/active-directory-b2c-reference-audit-logs.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Audit logs samples and definitions in Azure Active Directory B2C | Microsoft Docs
3-
description: Guide and samples on accessing the Azure AD B2C Audit logs.
2+
title: Audit logs samples and definitions in Azure Active Directory B2C
3+
description: Guide and samples on accessing the Azure AD B2C audit logs.
44
services: active-directory-b2c
55
author: mmacy
66
manager: celestedg
77

88
ms.service: active-directory
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 08/04/2017
11+
ms.date: 09/14/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -25,6 +25,7 @@ Azure Active Directory B2C (Azure AD B2C) emits audit logs containing activity i
2525
> You cannot see user sign-ins for individual Azure AD B2C applications under the **Users** section of the **Azure Active Directory** or **Azure AD B2C** blades. The sign-ins there will show user activity, but cannot be correlated back to the B2C application that the user signed in to. You must use the audit logs for that, as explained further in this article.
2626
2727
## Overview of activities available in the B2C category of audit logs
28+
2829
The **B2C** category in audit logs contains the following types of activities:
2930

3031
|Activity type |Description |
@@ -40,7 +41,8 @@ The **B2C** category in audit logs contains the following types of activities:
4041
> For user object CRUD activities, refer to the **Core Directory** category.
4142
4243
## Example activity
43-
The example below shows the data captured when a user signs in with an external identity provider:
44+
45+
The example below shows the data captured when a user signs in with an external identity provider:
4446
![Example of Audit Log Activity Details page in Azure portal](./media/active-directory-b2c-reference-audit-logs/audit-logs-example.png)
4547

4648
The activity details panel contains the following relevant information:
@@ -56,6 +58,7 @@ The activity details panel contains the following relevant information:
5658
| Additional Details | ApplicationId | The **Application ID** of the B2C application that the user is signing in to. |
5759

5860
## Accessing audit logs through the Azure portal
61+
5962
1. Go to the [Azure portal](https://portal.azure.com). Make sure you are in your B2C directory.
6063
2. Click on **Azure Active Directory** in the favorites bar on the left
6164

@@ -71,6 +74,7 @@ The activity details panel contains the following relevant information:
7174
![Category and Apply button highlighted in Audit Log filter](./media/active-directory-b2c-reference-audit-logs/audit-logs-portal-category.png)
7275

7376
You will see a list of activities logged over the last seven days.
77+
7478
- Use the **Activity Resource Type** dropdown to filter by the activity types outlined above
7579
- Use the **Date Range** dropdown to filter the date range of the activities shown
7680
- If you click on a specific row in the list, a contextual box on the right will show you additional attributes associated with the activity
@@ -80,28 +84,34 @@ You will see a list of activities logged over the last seven days.
8084
> You can also see the audit logs by navigating to **Azure AD B2C** rather than **Azure Active Directory** in the favorites bar on the left. Under **Activities**, click on **Audit logs**, where you will find the same logs with similar filtering capabilities.
8185
8286
## Accessing audit logs through the Azure AD reporting API
83-
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](https://docs.microsoft.com/azure/active-directory/active-directory-reporting-api-audit-reference).
87+
88+
Audit logs are published to the same pipeline as other activities for Azure Active Directory, so they can be accessed through the [Azure Active Directory reporting API](https://docs.microsoft.com/graph/api/directoryaudit-list). For more information, see [Get started with the Azure Active Directory reporting API](../active-directory/reports-monitoring/concept-reporting-api.md).
8489

8590
### Prerequisites
91+
8692
To authenticate to the Azure AD reporting API you first need to register an application. Make sure to follow the steps in [Prerequisites to access the Azure AD reporting APIs](https://azure.microsoft.com/documentation/articles/active-directory-reporting-api-getting-started/).
8793

8894
### Accessing the API
95+
8996
To download the Azure AD B2C audit logs via the API, you'll want to filter the logs to the **B2C** category. To filter by category, use the query string parameter when calling the Azure AD reporting API endpoint, as shown below:
9097

91-
`https://graph.windows.net/your-b2c-tentant.onmicrosoft.com/activities/audit?api-version=beta&$filter=category eq 'B2C'`
98+
```HTTP
99+
https://graph.microsoft.com/v1.0/auditLogs/directoryAudits?filter=loggedByService eq 'B2C' and activityDateTime gt 2019-09-10T02:28:17Z
100+
```
92101

93102
### PowerShell script
94-
The following script provides an example of using PowerShell to query the Azure AD reporting API and store the results as a JSON file:
103+
104+
The following script provides an example of using PowerShell to query the Azure AD reporting API and outputting the results to a JSON file:
95105

96106
```powershell
97-
# This script will require registration of a Web Application in Azure Active Directory (see https://azure.microsoft.com/documentation/articles/active-directory-reporting-api-getting-started/)
107+
# This script requires the registration of a Web Application in Azure Active Directory (see https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-reporting-api)
98108
99109
# Constants
100-
$ClientID = "your-client-application-id-here" # Insert your application's Client ID, a Globally Unique ID (registered by Global Admin)
101-
$ClientSecret = "your-client-application-secret-here" # Insert your application's Client Key/Secret string
110+
$ClientID = "your-client-application-id-here" # Insert your application's Client ID, a GUID (registered by Global Admin)
111+
$ClientSecret = "your-client-application-secret-here" # Insert your application's Client secret/key
112+
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # Insert your Azure AD B2C tenant; for example, contoso.onmicrosoft.com
102113
$loginURL = "https://login.microsoftonline.com"
103-
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # AAD B2C Tenant; for example, contoso.onmicrosoft.com
104-
$resource = "https://graph.windows.net" # Azure AD Graph API resource URI
114+
$resource = "https://graph.microsoft.com" # Microsoft Graph API resource URI
105115
$7daysago = "{0:s}" -f (get-date).AddDays(-7) + "Z" # Use 'AddMinutes(-5)' to decrement minutes, for example
106116
Write-Output "Searching for events starting $7daysago"
107117
@@ -113,7 +123,7 @@ $oauth = Invoke-RestMethod -Method Post -Uri $loginURL/$tenantdomain/oauth2
113123
if ($oauth.access_token -ne $null) {
114124
$i=0
115125
$headerParams = @{'Authorization'="$($oauth.token_type) $($oauth.access_token)"}
116-
$url = 'https://graph.windows.net/' + $tenantdomain + '/activities/audit?api-version=beta&$filter=category eq ''B2C''and activityDate gt ' + $7daysago
126+
$url = "https://graph.microsoft.com/v1.0/auditLogs/directoryAudits?`$filter=loggedByService eq 'B2C' and activityDateTime gt " + $7daysago
117127
118128
# loop through each query page (1 through n)
119129
Do {

articles/active-directory-domain-services/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@
8989
items:
9090
- name: Deploy Azure AD Application Proxy
9191
href: deploy-azure-app-proxy.md
92-
- name: Configure support for profile synchronization for SharePoint Server
92+
- name: Enable profile synchronization for SharePoint Server
9393
href: deploy-sp-profile-sync.md
9494
- name: Troubleshoot
9595
items:
Lines changed: 53 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,51 +1,79 @@
11
---
2-
title: 'Azure Active Directory Domain Services: Enable SharePoint User Profile service | Microsoft Docs'
3-
description: Configure Azure Active Directory Domain Services managed domains to support profile synchronization for SharePoint Server
2+
title: Enable SharePoint User Profile service with Azure AD DS | Microsoft Docs
3+
description: Learn how to configure an Azure Active Directory Domain Services managed domain to support profile synchronization for SharePoint Server
44
services: active-directory-ds
5-
documentationcenter: ''
65
author: iainfoulds
76
manager: daveba
8-
editor: curtand
97

108
ms.assetid: 938a5fbc-2dd1-4759-bcce-628a6e19ab9d
119
ms.service: active-directory
1210
ms.subservice: domain-services
1311
ms.workload: identity
14-
ms.tgt_pltfrm: na
15-
ms.devlang: na
1612
ms.topic: conceptual
17-
ms.date: 06/22/2018
13+
ms.date: 09/12/2019
1814
ms.author: iainfou
1915

2016
---
17+
# Configure Azure Active Directory Domain Services to support user profile synchronization for SharePoint Server
2118

22-
# Configure a managed domain to support profile synchronization for SharePoint Server
23-
SharePoint Server includes a User Profile Service that is used for user profile synchronization. To set up the User Profile Service, appropriate permissions need to be granted on an Active Directory domain. For more information, see [grant Active Directory Domain Services permissions for profile synchronization in SharePoint Server 2013](https://technet.microsoft.com/library/hh296982.aspx).
19+
SharePoint Server includes a service to synchronize user profiles. This feature lets user profiles be stored in a central location and accessible across multiple SharePoint sites and farms. To configure the SharePoint Server user profile service, the appropriate permissions must be granted in an Azure Active Directory Domain Services (Azure AD DS) managed domain. For more information, see [user profile synchronization in SharePoint Server](https://technet.microsoft.com/library/hh296982.aspx).
2420

25-
This article explains how you can configure Azure AD Domain Services managed domains to deploy the SharePoint Server User Profile Sync service.
21+
This article shows you how to configure Azure AD DS to allow the SharePoint Server user profile sync service.
2622

27-
[!INCLUDE [active-directory-ds-prerequisites.md](../../includes/active-directory-ds-prerequisites.md)]
23+
## Before you begin
2824

29-
## The 'AAD DC Service Accounts' group
30-
A security group called '**AAD DC Service Accounts**' is available within the 'Users' organizational unit on your managed domain. You can see this group in the **Active Directory Users and Computers** MMC snap-in on your managed domain.
25+
To complete this article, you need the following resources and privileges:
3126

32-
![AAD DC Service Accounts security group](./media/active-directory-domain-services-admin-guide/aad-dc-service-accounts.png)
27+
* An active Azure subscription.
28+
* If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29+
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
30+
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
31+
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
32+
* If needed, complete the tutorial to [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
33+
* A Windows Server management VM that is joined to the Azure AD DS managed domain.
34+
* If needed, complete the tutorial to [create a management VM][tutorial-create-management-vm].
35+
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
36+
* A SharePoint service account for the user profile synchronization service.
37+
* If needed, see [Plan for administrative and service accounts in SharePoint Server][sharepoint-service-account].
3338

34-
Members of this security group are delegated the following privileges:
35-
- The 'Replicate Directory Changes' privilege on the root DSE of the managed domain.
36-
- The 'Replicate Directory Changes' privilege on the Configuration naming context (cn=configuration container) of the managed domain.
39+
## Service accounts overview
3740

38-
This security group is also a member of the built-in group **Pre-Windows 2000 Compatible Access**.
41+
In an Azure AD DS managed domain, a security group named **AAD DC Service Accounts** exists as part of the *Users* organizational unit (OU). Members of this security group are delegated the following privileges:
3942

40-
![AAD DC Service Accounts security group](./media/active-directory-domain-services-admin-guide/aad-dc-service-accounts-properties.png)
43+
- **Replicate Directory Changes** privilege on the root DSE.
44+
- **Replicate Directory Changes** privilege on the *Configuration* naming context (`cn=configuration` container).
4145

46+
The **AAD DC Service Accounts** security group is also a member of the built-in group **Pre-Windows 2000 Compatible Access**.
4247

43-
## Enable your managed domain to support SharePoint Server user profile sync
44-
You can add the service account used for SharePoint user profile synchronization to the **AAD DC Service Accounts** group. As a result, the synchronization account gets adequate privileges to replicate changes to the directory. This configuration step enables SharePoint Server user profile sync to work correctly.
48+
When added to this security group, the service account for SharePoint Server user profile synchronization service is granted the required privileges to work correctly.
4549

46-
![AAD DC Service Accounts - add members](./media/active-directory-domain-services-admin-guide/aad-dc-service-accounts-add-member.png)
50+
## Enable support for SharePoint Server user profile sync
4751

48-
![AAD DC Service Accounts - add members](./media/active-directory-domain-services-admin-guide/aad-dc-service-accounts-add-member2.png)
52+
The service account for SharePoint Server needs adequate privileges to replicate changes to the directory and let SharePoint Server user profile sync work correctly. To provide these privileges, add the service account used for SharePoint user profile synchronization to the **AAD DC Service Accounts** group.
4953

50-
## Related Content
51-
* [Technical Reference - Grant Active Directory Domain Services permissions for profile synchronization in SharePoint Server 2013](https://technet.microsoft.com/library/hh296982.aspx)
54+
From your Azure AD DS management VM, complete the following steps:
55+
56+
> [!NOTE]
57+
> To edit group membership in an Azure AD DS managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.
58+
59+
1. From the Start screen, select **Administrative Tools**. A list of available management tools is shown that were installed in the tutorial to [create a management VM][tutorial-create-management-vm].
60+
1. To manage group membership, select **Active Directory Administrative Center** from the list of administrative tools.
61+
1. In the left pane, choose your Azure AD DS managed domain, such as *contoso.com*. A list of existing OUs and resources is shown.
62+
1. Select the **Users** OU, then choose the *AAD DC Service Accounts* security group.
63+
1. Select **Members**, then choose **Add...**.
64+
1. Enter the name of the SharePoint service account, then select **OK**. In the following example, the SharePoint service account is named *spadmin*:
65+
66+
![Add the SharePoint service account to the AAD DC Service Accounts security group](./media/deploy-sp-profile-sync/add-member-to-aad-dc-service-accounts-group.png)
67+
68+
## Next steps
69+
70+
For more information, see [Grant Active Directory Domain Services permissions for profile synchronization in SharePoint Server](https://technet.microsoft.com/library/hh296982.aspx)
71+
72+
<!-- INTERNAL LINKS -->
73+
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
74+
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
75+
[create-azure-ad-ds-instance]: tutorial-create-instance.md
76+
[tutorial-create-management-vm]: tutorial-create-management-vm.md
77+
78+
<!-- EXTERNAL LINKS -->
79+
[sharepoint-service-account]: /sharepoint/security-for-sharepoint-server/plan-for-administrative-and-service-accounts
Loading

0 commit comments

Comments
 (0)