Skip to content

Commit 5420ec1

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into smallFix
2 parents 66470f7 + 50f3ffb commit 5420ec1

File tree

19 files changed

+319
-314
lines changed

19 files changed

+319
-314
lines changed

articles/active-directory/manage-apps/howto-saml-token-encryption.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,12 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 02/06/2019
16+
ms.date: 03/13/2020
1717
ms.author: mimart
1818
ms.reviewer: paulgarn
1919
ms.collection: M365-identity-device-management
2020
---
21-
# How to: Configure Azure AD SAML token encryption (Preview)
21+
# How to: Configure Azure AD SAML token encryption
2222

2323
> [!NOTE]
2424
> Token encryption is an Azure Active Directory (Azure AD) premium feature. To learn more about Azure AD editions, features, and pricing, see [Azure AD pricing](https://azure.microsoft.com/pricing/details/active-directory/).
@@ -118,9 +118,6 @@ When you configure a keyCredential using Graph, PowerShell, or in the applicatio
118118
119119
### To configure token encryption using PowerShell
120120
121-
This functionality is coming soon.
122-
123-
<!--
124121
1. Use the latest Azure AD PowerShell module to connect to your tenant.
125122
126123
1. Set the token encryption settings using the **[Set-AzureApplication](https://docs.microsoft.com/powershell/module/azuread/set-azureadapplication?view=azureadps-2.0-preview)** command.
@@ -137,8 +134,6 @@ This functionality is coming soon.
137134
$app.TokenEncryptionKeyId
138135
```
139136
140-
-->
141-
142137
### To configure token encryption using the application manifest
143138
144139
1. From the Azure portal, go to **Azure Active Directory > App registrations**.

articles/active-directory/manage-apps/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
href: manage-certificates-for-federated-single-sign-on.md
6969
- name: Tenant restrictions
7070
href: tenant-restrictions.md
71-
- name: Configure SAML token encryption (Preview)
71+
- name: Configure SAML token encryption
7272
href: howto-saml-token-encryption.md
7373
- name: End-user portals
7474
href: end-user-experiences.md

articles/azure-functions/functions-create-function-app-portal.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,6 @@ This topic shows you how to use Azure Functions to create a function app in the
1414

1515
[!INCLUDE [functions-create-function-app-portal](../../includes/functions-create-function-app-portal.md)]
1616

17-
When you create a function app, supply a valid **App name**, which can contain only letters, numbers, and hyphens. Underscore (**_**) is not an allowed character.
18-
19-
Storage account names must be between 3 and 24 characters in length and may contain numbers and lowercase letters only. Your storage account name must be unique within Azure.
20-
2117
After the function app is created, you can create individual functions in one or more different languages. Create functions [by using the portal](functions-create-first-azure-function.md#create-function), [continuous deployment](functions-continuous-deployment.md), or by [uploading with FTP](https://github.com/projectkudu/kudu/wiki/Accessing-files-via-ftp).
2218

2319
## Service plans

articles/bastion/bastion-create-host-portal.md

Lines changed: 6 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Create an Azure Bastion host | Microsoft Docs'
3-
description: In this article, learn how to create an Azure Bastion host
2+
title: 'Create an Azure Bastion host: portal'
3+
description: In this article, learn how to create an Azure Bastion host using the portal
44
services: bastion
55
author: cherylmc
66

@@ -12,19 +12,19 @@ ms.author: cherylmc
1212

1313
---
1414

15-
# Create an Azure Bastion host
15+
# Create an Azure Bastion host using the portal
1616

1717
This article shows you how to create an Azure Bastion host using the Azure portal. Once you provision the Azure Bastion service in your virtual network, the seamless RDP/SSH experience is available to all of the VMs in the same virtual network. Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine.
1818

19-
You can create a new bastion host resource in the portal either by specifying all of the settings manually, or by using the settings that correspond to an existing VM. Optionally, you can use [Azure Powershell](bastion-create-host-powershell.md) to create an Azure Bastion host.
19+
You can create a new bastion host resource in the portal either by specifying all of the settings manually, or by using the settings that correspond to an existing VM. To create a bastion host by using VM settings, see the [quickstart](quickstart-host-portal.md) article. Optionally, you can use [Azure PowerShell](bastion-create-host-powershell.md) to create an Azure Bastion host.
2020

2121
## Before you begin
2222

2323
Bastion is available in the following Azure public regions:
2424

2525
[!INCLUDE [available regions](../../includes/bastion-regions-include.md)]
2626

27-
## <a name="createhost"></a>Create a bastion host - specify settings
27+
## <a name="createhost"></a>Create a bastion host
2828

2929
This section helps you create a new Azure Bastion resource from the Azure portal.
3030

@@ -41,7 +41,7 @@ This section helps you create a new Azure Bastion resource from the Azure portal
4141
![create a bastion](./media/bastion-create-host-portal/settings.png)
4242

4343
* **Subscription**: The Azure subscription you want to use to create a new Bastion resource.
44-
* **Resource Group**: The Azure resource group in which the new Bastion resource will be created in. If you dont have an existing resource group, you can create a new one.
44+
* **Resource Group**: The Azure resource group in which the new Bastion resource will be created in. If you don't have an existing resource group, you can create a new one.
4545
* **Name**: The name of the new Bastion resource
4646
* **Region**: The Azure public region that the resource will be created in.
4747
* **Virtual network**: The virtual network in which the Bastion resource will be created in. You can create a new virtual network in the portal during this process, or use an existing virtual network. If you are using an existing virtual network, make sure the existing virtual network has enough free address space to accommodate the Bastion subnet requirements.
@@ -57,26 +57,6 @@ This section helps you create a new Azure Bastion resource from the Azure portal
5757
1. On the **Create a bastion** page, click **Create**.
5858
1. You will see a message letting you know that your deployment is underway. Status will display on this page as the resources are created. It takes about 5 minutes for the Bastion resource to be created and deployed.
5959

60-
## <a name="createvmset"></a>Create a bastion host - use VM settings
61-
62-
If you create a bastion host in the portal by using an existing VM, various settings will automatically default to correspond to your virtual machine and/or virtual network.
63-
64-
1. Open the [Azure portal](https://portal.azure.com). Go to your virtual machine, then click **Connect**.
65-
66-
![VM Connect](./media/bastion-create-host-portal/vmsettings.png)
67-
1. On the right sidebar, click **Bastion**, then **Use Bastion**.
68-
69-
![Bastion](./media/bastion-create-host-portal/vmbastion.png)
70-
1. On the Bastion page, fill out the following settings fields:
71-
72-
* **Name**: The name of the bastion host you want to create.
73-
* **Subnet**: The subnet inside your virtual network to which Bastion resource will be deployed. The subnet must be created with the name **AzureBastionSubnet**. This lets Azure know which subnet to deploy the Bastion resource to. This is different than a Gateway subnet. You must use a subnet of at least /27 or larger (/27, /26, and so on). Create the subnet without any Network Security Groups, route tables, or delegations. If you later choose to use Network Security Groups on the **AzureBastionSubnet**, see [Work with NSGs](bastion-nsg.md).
74-
75-
Click **Manage subnet configuration** to create the **AzureBastionSubnet**. Click **Create** to create the subnet, then proceed with the next settings.
76-
* **Public IP address**: The public IP of the Bastion resource on which RDP/SSH will be accessed (over port 443). Create a new public IP, or use an existing one. The public IP address must be in the same region as the Bastion resource you are creating.
77-
* **Public IP address name**: The name of the public IP address resource.
78-
1. On the validation screen, click **Create**. Wait for about 5 minutes for the Bastion resource create and deploy.
79-
8060
## Next steps
8161

8262
* Read the [Bastion FAQ](bastion-faq.md) for additional information.

articles/vpn-gateway/vpn-gateway-howto-always-on-device-tunnel.md

Lines changed: 7 additions & 139 deletions
Original file line numberDiff line numberDiff line change
@@ -7,155 +7,23 @@ author: cherylmc
77

88
ms.service: vpn-gateway
99
ms.topic: conceptual
10-
ms.date: 12/11/2019
10+
ms.date: 03/12/2020
1111
ms.author: cherylmc
1212

1313
---
1414
# Configure an Always On VPN device tunnel
1515

16-
One of the new features of the Windows 10 Virtual Private Network (VPN) client is the ability to maintain a VPN connection. Always On is a Windows 10 feature that enables the active VPN profile to connect automatically and remain connected based on triggers — namely, user sign-in, network state change, or device screen active.
16+
[!INCLUDE [intro](../../includes/vpn-gateway-vwan-always-on-intro.md)]
1717

18-
Azure virtual network gateways can be used with Windows 10 Always On to establish persistent user tunnels as well as device tunnels to Azure. This article will help you configure an Always ON VPN device tunnel.
18+
## Configure the gateway
1919

20-
Always On VPN connections include two types of tunnels:
20+
Configure the VPN gateway to use IKEv2 and certificate-based authentication using the [Configure a Point-to-Site VPN connection](vpn-gateway-howto-point-to-site-resource-manager-portal.md) article.
2121

22-
* **Device tunnel** connects to specified VPN servers before users sign in the device. Pre-login connectivity scenarios and device management purposes use device tunnel.
22+
## Configure the device tunnel
2323

24-
* **User tunnel** connects only after a user sign in the device. User tunnel allows users to access organization resources through VPN servers.
24+
[!INCLUDE [device tunnel](../../includes/vpn-gateway-vwan-always-on-device.md)]
2525

26-
Both Device tunnel and User tunnel operate independently with their VPN profiles. They can be connected at the same time, and can use different authentication methods and other VPN configuration settings as appropriate.
27-
28-
## 1. Configure the gateway
29-
30-
Configure the VPN gateway to use IKEv2 and certificate-based authentication using this [point-to-site article](vpn-gateway-howto-point-to-site-resource-manager-portal.md).
31-
32-
## 2. Configure the device tunnel
33-
34-
The following requirements must be met in order to successfully establish a device tunnel:
35-
36-
* The device must be a domain joined computer running Windows 10 Enterprise or Education version 1809 or later.
37-
* The tunnel is only configurable for the Windows built-in VPN solution and is established using IKEv2 with computer certificate authentication.
38-
* Only one device tunnel can be configured per device.
39-
40-
1. Install client certificates on the Windows 10 client as shown in this [point-to-site VPN client article](point-to-site-how-to-vpn-client-install-azure-cert.md). The certificate needs to be in the Local Machine store.
41-
1. Use [these instructions](https://docs.microsoft.com/windows-server/remote/remote-access/vpn/vpn-device-tunnel-config#vpn-device-tunnel-configuration) to create a VPN Profile and configure device tunnel in the context of the LOCAL SYSTEM account.
42-
43-
### Configuration example for device tunnel
44-
45-
After you have configured the virtual network gateway and installed the client certificate in the Local Machine store on the Windows 10 client, use the following examples to configure a client device tunnel.
46-
47-
1. Copy the following text and save it as ***devicecert.ps1***.
48-
49-
```
50-
Param(
51-
[string]$xmlFilePath,
52-
[string]$ProfileName
53-
)
54-
55-
$a = Test-Path $xmlFilePath
56-
echo $a
57-
58-
$ProfileXML = Get-Content $xmlFilePath
59-
60-
echo $XML
61-
62-
$ProfileNameEscaped = $ProfileName -replace ' ', '%20'
63-
64-
$Version = 201606090004
65-
66-
$ProfileXML = $ProfileXML -replace '<', '&lt;'
67-
$ProfileXML = $ProfileXML -replace '>', '&gt;'
68-
$ProfileXML = $ProfileXML -replace '"', '&quot;'
69-
70-
$nodeCSPURI = './Vendor/MSFT/VPNv2'
71-
$namespaceName = "root\cimv2\mdm\dmmap"
72-
$className = "MDM_VPNv2_01"
73-
74-
$session = New-CimSession
75-
76-
try
77-
{
78-
$newInstance = New-Object Microsoft.Management.Infrastructure.CimInstance $className, $namespaceName
79-
$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ParentID", "$nodeCSPURI", 'String', 'Key')
80-
$newInstance.CimInstanceProperties.Add($property)
81-
$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("InstanceID", "$ProfileNameEscaped", 'String', 'Key')
82-
$newInstance.CimInstanceProperties.Add($property)
83-
$property = [Microsoft.Management.Infrastructure.CimProperty]::Create("ProfileXML", "$ProfileXML", 'String', 'Property')
84-
$newInstance.CimInstanceProperties.Add($property)
85-
86-
$session.CreateInstance($namespaceName, $newInstance)
87-
$Message = "Created $ProfileName profile."
88-
Write-Host "$Message"
89-
}
90-
catch [Exception]
91-
{
92-
$Message = "Unable to create $ProfileName profile: $_"
93-
Write-Host "$Message"
94-
exit
95-
}
96-
$Message = "Complete."
97-
Write-Host "$Message"
98-
```
99-
1. Copy the following text and save it as ***VPNProfile.xml*** in the same folder as **devicecert.ps1**. Edit the following text to match your environment.
100-
101-
* `<Servers>azuregateway-1234-56-78dc.cloudapp.net</Servers> <= Can be found in the VpnSettings.xml in the downloaded profile zip file`
102-
* `<Address>192.168.3.5</Address> <= IP of resource in the vnet or the vnet address space`
103-
* `<Address>192.168.3.4</Address> <= IP of resource in the vnet or the vnet address space`
104-
105-
```
106-
<VPNProfile>
107-
<NativeProfile>
108-
<Servers>azuregateway-1234-56-78dc.cloudapp.net</Servers>
109-
<NativeProtocolType>IKEv2</NativeProtocolType>
110-
<Authentication>
111-
<MachineMethod>Certificate</MachineMethod>
112-
</Authentication>
113-
<RoutingPolicyType>SplitTunnel</RoutingPolicyType>
114-
<!-- disable the addition of a class based route for the assigned IP address on the VPN interface -->
115-
<DisableClassBasedDefaultRoute>true</DisableClassBasedDefaultRoute>
116-
</NativeProfile>
117-
<!-- use host routes(/32) to prevent routing conflicts -->
118-
<Route>
119-
<Address>192.168.3.5</Address>
120-
<PrefixSize>32</PrefixSize>
121-
</Route>
122-
<Route>
123-
<Address>192.168.3.4</Address>
124-
<PrefixSize>32</PrefixSize>
125-
</Route>
126-
<!-- need to specify always on = true -->
127-
<AlwaysOn>true</AlwaysOn>
128-
<!-- new node to specify that this is a device tunnel -->
129-
<DeviceTunnel>true</DeviceTunnel>
130-
<!--new node to register client IP address in DNS to enable manage out -->
131-
<RegisterDNS>true</RegisterDNS>
132-
</VPNProfile>
133-
```
134-
1. Download **PsExec** from [Sysinternals](https://docs.microsoft.com/sysinternals/downloads/psexec) and extract the files to **C:\PSTools**.
135-
1. From an Admin CMD prompt, launch PowerShell by running:
136-
137-
```
138-
PsExec.exe Powershell for 32-bit Windows
139-
PsExec64.exe Powershell for 64-bit Windows
140-
```
141-
142-
![powershell](./media/vpn-gateway-howto-always-on-device-tunnel/powershell.png)
143-
1. In PowerShell, switch to the folder where **devicecert.ps1** and **VPNProfile.xml** are located, and run the following command:
144-
145-
```powershell
146-
.\devicecert.ps1 .\VPNProfile.xml MachineCertTest
147-
```
148-
149-
![MachineCertTest](./media/vpn-gateway-howto-always-on-device-tunnel/machinecerttest.png)
150-
1. Run **rasphone**.
151-
152-
![rasphone](./media/vpn-gateway-howto-always-on-device-tunnel/rasphone.png)
153-
1. Look for the **MachineCertTest** entry and click **Connect**.
154-
155-
![Connect](./media/vpn-gateway-howto-always-on-device-tunnel/connect.png)
156-
1. If the connection succeeds, reboot the computer. The tunnel will connect automatically.
157-
158-
## Cleanup
26+
## To remove a profile
15927

16028
To remove the profile, run the following command:
16129

0 commit comments

Comments
 (0)