Skip to content

Commit 586ae4c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into lb-qs-cli
2 parents 0d94574 + 5348174 commit 586ae4c

17 files changed

+724
-30
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,7 @@ Run the following steps in each domain and forest in your organization that cont
9898
1. Open a PowerShell prompt using the Run as administrator option.
9999
1. Run the following PowerShell commands to create a new Azure AD Kerberos Server object both in your on-premises Active Directory domain and in your Azure Active Directory tenant.
100100

101+
### Example 1 prompt for all credentials
101102
> [!NOTE]
102103
> Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
103104
@@ -117,6 +118,7 @@ Run the following steps in each domain and forest in your organization that cont
117118
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
118119
```
119120

121+
### Example 2 prompt for cloud credential
120122
> [!NOTE]
121123
> If you're working on a domain-joined machine with an account that has domain administrator privileges, you can skip the "-DomainCredential" parameter. If the "-DomainCredential" parameter isn't provided, the current Windows login credential is used to access your on-premises Active Directory Domain Controller.
122124
@@ -134,6 +136,7 @@ Run the following steps in each domain and forest in your organization that cont
134136
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred
135137
```
136138

139+
### Example 3 prompt for all credentials using modern authentication
137140
> [!NOTE]
138141
> If your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator.
139142
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
@@ -156,6 +159,26 @@ Run the following steps in each domain and forest in your organization that cont
156159
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName -DomainCredential $domainCred
157160
```
158161

162+
### Example 4 prompt for cloud credentials using modern authentication
163+
> [!NOTE]
164+
> If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator. And you can skip the "-DomainCredential" parameter.
165+
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
166+
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
167+
168+
```powershell
169+
# Specify the on-premises Active Directory domain. A new Azure AD
170+
# Kerberos Server object will be created in this Active Directory domain.
171+
$domain = "contoso.corp.com"
172+
173+
# Enter a UPN of an Azure Active Directory global administrator
174+
$userPrincipalName = "[email protected]"
175+
176+
# Create the new Azure AD Kerberos Server object in Active Directory
177+
# and then publish it to Azure Active Directory.
178+
# Open an interactive sign-in prompt with given username to access the Azure AD.
179+
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName
180+
```
181+
159182
### View and verify the Azure AD Kerberos Server
160183

161184
You can view and verify the newly created Azure AD Kerberos Server by using the following command:
@@ -263,6 +286,12 @@ Make sure that enough DCs are patched to respond in time to service your resourc
263286
> [!NOTE]
264287
> The `/keylist` switch in the `nltest` command is available in client Windows 10 v2004 and later.
265288
289+
### What if I have a CloudTGT but it never gets exchange for a OnPremTGT when I am using Windows Hello for Business Cloud Trust?
290+
291+
Make sure that the user you are signed in as, is a member of the groups of users that can use FIDO2 as an authentication method, or enable it for all users.
292+
293+
> [!NOTE]
294+
> Even if you are not explicitly using a security key to sign-in to your device, the underlying technology is dependent on the FIDO2 infrastructure requirements.
266295
267296
### Do FIDO2 security keys work in a Windows login with RODC present in the hybrid environment?
268297

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 45 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -104,28 +104,10 @@ Run the [IdFix tool](/office365/enterprise/prepare-directory-attributes-for-sync
104104

105105
2. The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
106106

107-
3. If there's a firewall between your servers and Azure AD, configure the following items:
108-
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
109-
110-
| Port number | How it's used |
111-
| --- | --- |
112-
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
113-
| **443** | Handles all outbound communication with the service. |
114-
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
115-
116-
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
117-
- If your firewall or proxy allows you to specify safe suffixes, add connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
118-
- If you are installing against the **US government** cloud, and your firewall or proxy allows you to specify safe suffixes, add connections to:
119-
- *.microsoftonline.us
120-
- *.microsoft.us
121-
- *.msappproxy.us
122-
- *.windowsazure.us
123-
124-
- Your agents need access to login.windows.net and login.microsoftonline.com for initial registration. Open your firewall for those URLs as well.
125-
- For certificate validation, unblock the following URLs: mscrl.microsoft.com:80, crl.microsoft.com:80, ocsp.msocsp.com:80, and www\.microsoft.com:80. These URLs are used for certificate validation with other Microsoft products, so you might already have these URLs unblocked.
126-
127-
>[!NOTE]
128-
> Installing the cloud provisioning agent on Windows Server Core is not supported.
107+
3. If there's a firewall between your servers and Azure AD, configure see [Firewall and proxy requirements](#firewall-and-proxy-requirements) below.
108+
109+
>[!NOTE]
110+
> Installing the cloud provisioning agent on Windows Server Core is not supported.
129111
130112
### Additional requirements
131113

@@ -150,6 +132,47 @@ To enable TLS 1.2, follow these steps.
150132
```
151133
152134
1. Restart the server.
135+
136+
## Firewall and Proxy requirements
137+
If there's a firewall between your servers and Azure AD, configure the following items:
138+
139+
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
140+
141+
| Port number | How it's used |
142+
| --- | --- |
143+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
144+
| **443** | Handles all outbound communication with the service. |
145+
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
146+
147+
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
148+
- If your firewall or proxy allows you to specify safe suffixes, add connections:
149+
150+
#### [Public Cloud](#tab/public-cloud)
151+
152+
153+
|URL |How it's used|
154+
|-----|-----|
155+
|&#42;.msappproxy.net</br>&#42;.servicebus.windows.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
156+
|&#42;.microsoftonline.com</br>&#42;.microsoft.com</br>&#42;.msappproxy.com</br>&#42;.windowsazure.com|The agent uses these URLs to communicate with the Azure AD cloud service. |
157+
|`mscrl.microsoft.com:80` </br>`crl.microsoft.com:80` </br>`ocsp.msocsp.com:80` </br>`www.microsoft.com:80`| The agent uses these URLs to verify certificates.|
158+
|login.windows.net</br>|The agent uses these URLs during the registration process.
159+
160+
161+
162+
#### [U.S. Government Cloud](#tab/us-government-cloud)
163+
164+
|URL |How it's used|
165+
|-----|-----|
166+
|&#42;.msappproxy.us</br>&#42;.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
167+
|`mscrl.microsoft.us:80` </br>`crl.microsoft.us:80` </br>`ocsp.msocsp.us:80` </br>`www.microsoft.us:80`| The agent uses these URLs to verify certificates.|
168+
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>&#42;.microsoftonline.us </br>&#42;.microsoftonline-p.us </br>&#42;.msauth.net </br>&#42;.msauthimages.net </br>&#42;.msecnd.net</br>&#42;.msftauth.net </br>&#42;.msftauthimages.net</br>&#42;.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctldl.windowsupdate.us:80| The agent uses these URLs during the registration process.
169+
170+
171+
172+
173+
- If you are unable to add connections, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
174+
175+
---
153176
## NTLM requirement
154177
155178
You should not enable NTLM on the Windows Server that is running the Azure AD Connect Provisioning Agent and if it is enabled you should make sure you disable it.

articles/active-directory/develop/v2-saml-bearer-assertion.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,3 +95,5 @@ For more information about app registration and authentication flow, see:
9595

9696
- [Register an application with the Microsoft identity platform](quickstart-register-app.md)
9797
- [Authentication flows and application scenarios](authentication-flows-app-scenarios.md)
98+
99+
<!-- _This article was originally contributed by [Umesh Barapatre](https://github.com/umeshbarapatre)._ -->

articles/active-directory/hybrid/reference-connect-government-cloud.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,13 @@ The following information describes implementation of Pass-through Authenticatio
3030

3131
Before you deploy the Pass-through Authentication agent, verify whether a firewall exists between your servers and Azure AD. If your firewall or proxy allows Domain Name System (DNS) blocked or safe programs, add the following connections.
3232

33-
> [!NOTE]
34-
> The following guidance also applies to installing the [Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md) for Azure Government environments.
33+
> [!IMPORTANT]
34+
> The following guidance applies only to the following:
35+
> - the pass-through authentication agent
36+
> - [Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md)
37+
>
38+
> For information on URLS for the Azure Active Directory Connect Provisioning Agent see the [installation pre-requisites](../cloud-sync/how-to-prerequisites.md) for cloud sync.
39+
3540

3641
|URL |How it's used|
3742
|-----|-----|

articles/bastion/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,10 @@
2121
href: work-remotely-support.md
2222
- name: Bastion FAQ
2323
href: bastion-faq.md
24-
- name: Configuration settings
24+
- name: Bastion configuration settings
2525
href: configuration-settings.md
26+
- name: VM connections and features
27+
href: vm-about.md
2628
- name: Bastion and VNet peering
2729
href: vnet-peering.md
2830
- name: Work with NSGs

articles/bastion/vm-about.md

Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
title: 'About VM connections and features'
3+
titleSuffix: Azure Bastion
4+
description: Learn about VM connections and features when connecting using Azure Bastion.
5+
author: cherylmc
6+
ms.service: bastion
7+
ms.topic: conceptual
8+
ms.date: 03/16/2022
9+
ms.author: cherylmc
10+
11+
---
12+
13+
# About VM connections and features
14+
15+
The sections in this article show you various features and settings that are available when you connect to a VM using Azure Bastion.
16+
17+
## <a name="connect"></a>Connect to a VM
18+
19+
You can use a variety of different methods to connect to a target VM. Some connection types require Bastion to be configured with the Standard SKU. Use the following articles to connect.
20+
21+
[!INCLUDE [Connect articles list](../../includes/bastion-vm-connect-article-list.md)]
22+
23+
## <a name="copy-paste"></a>Copy and paste
24+
25+
For browsers that support the advanced Clipboard API access, you can copy and paste text between your local device and the remote session in the same way you copy and paste between applications on your local device. For other browsers, you can use the Bastion clipboard access tool palette. Only text copy/paste is supported.
26+
27+
For steps and more information, see [Copy and paste - Windows VMs](bastion-vm-copy-paste.md).
28+
29+
## <a name="full-screen"></a>Full screen view
30+
31+
You can change to full screen view and back using your browser. For steps and more information, see [Change to full screen view](bastion-vm-full-screen.md).
32+
33+
## <a name="upload-download"></a>Upload or download files
34+
35+
Azure Bastion offers support for file transfer between your target VM and local computer using Bastion and a native RDP or native SSH client. It may also be possible to use certain third-party clients and tools to upload and download files.
36+
37+
For steps and more information, see [Upload or download files to a VM using a native client](vm-upload-download-native.md).
38+
39+
## <a name="audio"></a>Remote audio
40+
41+
You can enable remote audio output for your VM. Some VMs automatically enable this setting, others require you to enable audio settings manually. The settings are changed on the VM itself. Your Bastion deployment doesn't need any special configuration settings to enable remote audio output.
42+
43+
For steps, see the [Deploy Bastion](tutorial-create-host-portal.md#audio) tutorial.
44+
45+
## Next steps
46+
47+
For frequently asked questions, see the VM section of the [Azure Bastion FAQ](bastion-faq.md).

articles/event-grid/manage-event-delivery.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ To set a dead letter location, you need a storage account for holding events tha
2323
> [!NOTE]
2424
> - Create a storage account and a blob container in the storage before running commands in this article.
2525
> - The Event Grid service creates blobs in this container. The names of blobs will have the name of the Event Grid subscription with all the letters in upper case. For example, if the name of the subscription is My-Blob-Subscription, names of the dead letter blobs will have MY-BLOB-SUBSCRIPTION (myblobcontainer/MY-BLOB-SUBSCRIPTION/2019/8/8/5/111111111-1111-1111-1111-111111111111.json). This behavior is to protect against differences in case handling between Azure services.
26+
> - The dead letter blobs created will contain one or more events in an array. An important behavior to consider when processing dead letters.
2627
2728

2829
### Azure CLI

articles/iot-central/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,8 @@
192192
href: core/howto-query-with-rest-api.md
193193
- name: Manage users and roles
194194
href: core/howto-manage-users-roles-with-rest-api.md
195+
- name: Manage organizations
196+
href: core/howto-manage-organizations-with-rest-api.md
195197
- name: Data export
196198
href: core/howto-manage-data-export-with-rest-api.md
197199
- name: Manage device templates

0 commit comments

Comments
 (0)