You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md
+29Lines changed: 29 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,6 +98,7 @@ Run the following steps in each domain and forest in your organization that cont
98
98
1. Open a PowerShell prompt using the Run as administrator option.
99
99
1. Run the following PowerShell commands to create a new Azure AD Kerberos Server object both in your on-premises Active Directory domain and in your Azure Active Directory tenant.
100
100
101
+
### Example 1 prompt for all credentials
101
102
> [!NOTE]
102
103
> Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
103
104
@@ -117,6 +118,7 @@ Run the following steps in each domain and forest in your organization that cont
> If you're working on a domain-joined machine with an account that has domain administrator privileges, you can skip the "-DomainCredential" parameter. If the "-DomainCredential" parameter isn't provided, the current Windows login credential is used to access your on-premises Active Directory Domain Controller.
122
124
@@ -134,6 +136,7 @@ Run the following steps in each domain and forest in your organization that cont
### Example 3 prompt for all credentials using modern authentication
137
140
> [!NOTE]
138
141
> If your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator.
139
142
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
@@ -156,6 +159,26 @@ Run the following steps in each domain and forest in your organization that cont
### Example 4 prompt for cloud credentials using modern authentication
163
+
> [!NOTE]
164
+
> If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator. And you can skip the "-DomainCredential" parameter.
165
+
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
166
+
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
167
+
168
+
```powershell
169
+
# Specify the on-premises Active Directory domain. A new Azure AD
170
+
# Kerberos Server object will be created in this Active Directory domain.
171
+
$domain = "contoso.corp.com"
172
+
173
+
# Enter a UPN of an Azure Active Directory global administrator
You can view and verify the newly created Azure AD Kerberos Server by using the following command:
@@ -263,6 +286,12 @@ Make sure that enough DCs are patched to respond in time to service your resourc
263
286
> [!NOTE]
264
287
> The `/keylist` switch in the `nltest` command is available in client Windows 10 v2004 and later.
265
288
289
+
### What if I have a CloudTGT but it never gets exchange for a OnPremTGT when I am using Windows Hello for Business Cloud Trust?
290
+
291
+
Make sure that the user you are signed in as, is a member of the groups of users that can use FIDO2 as an authentication method, or enable it for all users.
292
+
293
+
> [!NOTE]
294
+
> Even if you are not explicitly using a security key to sign-in to your device, the underlying technology is dependent on the FIDO2 infrastructure requirements.
266
295
267
296
### Do FIDO2 security keys work in a Windows login with RODC present in the hybrid environment?
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/how-to-prerequisites.md
+45-22Lines changed: 45 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,28 +104,10 @@ Run the [IdFix tool](/office365/enterprise/prepare-directory-attributes-for-sync
104
104
105
105
2. The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
106
106
107
-
3. If there's a firewall between your servers and Azure AD, configure the following items:
108
-
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
109
-
110
-
| Port number | How it's used |
111
-
| --- | --- |
112
-
|**80**| Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
113
-
|**443**| Handles all outbound communication with the service. |
114
-
|**8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
115
-
116
-
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
117
-
- If your firewall or proxy allows you to specify safe suffixes, add connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
118
-
- If you are installing against the **US government** cloud, and your firewall or proxy allows you to specify safe suffixes, add connections to:
119
-
-*.microsoftonline.us
120
-
-*.microsoft.us
121
-
-*.msappproxy.us
122
-
-*.windowsazure.us
123
-
124
-
- Your agents need access to login.windows.net and login.microsoftonline.com for initial registration. Open your firewall for those URLs as well.
125
-
- For certificate validation, unblock the following URLs: mscrl.microsoft.com:80, crl.microsoft.com:80, ocsp.msocsp.com:80, and www\.microsoft.com:80. These URLs are used for certificate validation with other Microsoft products, so you might already have these URLs unblocked.
126
-
127
-
>[!NOTE]
128
-
> Installing the cloud provisioning agent on Windows Server Core is not supported.
107
+
3. If there's a firewall between your servers and Azure AD, configure see [Firewall and proxy requirements](#firewall-and-proxy-requirements) below.
108
+
109
+
>[!NOTE]
110
+
> Installing the cloud provisioning agent on Windows Server Core is not supported.
129
111
130
112
### Additional requirements
131
113
@@ -150,6 +132,47 @@ To enable TLS 1.2, follow these steps.
150
132
```
151
133
152
134
1. Restart the server.
135
+
136
+
## Firewall and Proxy requirements
137
+
If there's a firewall between your servers and Azure AD, configure the following items:
138
+
139
+
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
140
+
141
+
| Port number | How it's used |
142
+
| --- | --- |
143
+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
144
+
| **443** | Handles all outbound communication with the service. |
145
+
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
146
+
147
+
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
148
+
- If your firewall or proxy allows you to specify safe suffixes, add connections:
149
+
150
+
#### [Public Cloud](#tab/public-cloud)
151
+
152
+
153
+
|URL |How it's used|
154
+
|-----|-----|
155
+
|*.msappproxy.net</br>*.servicebus.windows.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
156
+
|*.microsoftonline.com</br>*.microsoft.com</br>*.msappproxy.com</br>*.windowsazure.com|The agent uses these URLs to communicate with the Azure AD cloud service. |
157
+
|`mscrl.microsoft.com:80` </br>`crl.microsoft.com:80` </br>`ocsp.msocsp.com:80` </br>`www.microsoft.com:80`| The agent uses these URLs to verify certificates.|
158
+
|login.windows.net</br>|The agent uses these URLs during the registration process.
159
+
160
+
161
+
162
+
#### [U.S. Government Cloud](#tab/us-government-cloud)
163
+
164
+
|URL |How it's used|
165
+
|-----|-----|
166
+
|*.msappproxy.us</br>*.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
167
+
|`mscrl.microsoft.us:80` </br>`crl.microsoft.us:80` </br>`ocsp.msocsp.us:80` </br>`www.microsoft.us:80`| The agent uses these URLs to verify certificates.|
168
+
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>*.microsoftonline.us </br>*.microsoftonline-p.us </br>*.msauth.net </br>*.msauthimages.net </br>*.msecnd.net</br>*.msftauth.net </br>*.msftauthimages.net</br>*.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctldl.windowsupdate.us:80| The agent uses these URLs during the registration process.
169
+
170
+
171
+
172
+
173
+
- If you are unable to add connections, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
174
+
175
+
---
153
176
## NTLM requirement
154
177
155
178
You should not enable NTLM on the Windows Server that is running the Azure AD Connect Provisioning Agent and if it is enabled you should make sure you disable it.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-government-cloud.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,8 +30,13 @@ The following information describes implementation of Pass-through Authenticatio
30
30
31
31
Before you deploy the Pass-through Authentication agent, verify whether a firewall exists between your servers and Azure AD. If your firewall or proxy allows Domain Name System (DNS) blocked or safe programs, add the following connections.
32
32
33
-
> [!NOTE]
34
-
> The following guidance also applies to installing the [Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md) for Azure Government environments.
33
+
> [!IMPORTANT]
34
+
> The following guidance applies only to the following:
35
+
> - the pass-through authentication agent
36
+
> -[Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md)
37
+
>
38
+
> For information on URLS for the Azure Active Directory Connect Provisioning Agent see the [installation pre-requisites](../cloud-sync/how-to-prerequisites.md) for cloud sync.
description: Learn about VM connections and features when connecting using Azure Bastion.
5
+
author: cherylmc
6
+
ms.service: bastion
7
+
ms.topic: conceptual
8
+
ms.date: 03/16/2022
9
+
ms.author: cherylmc
10
+
11
+
---
12
+
13
+
# About VM connections and features
14
+
15
+
The sections in this article show you various features and settings that are available when you connect to a VM using Azure Bastion.
16
+
17
+
## <aname="connect"></a>Connect to a VM
18
+
19
+
You can use a variety of different methods to connect to a target VM. Some connection types require Bastion to be configured with the Standard SKU. Use the following articles to connect.
For browsers that support the advanced Clipboard API access, you can copy and paste text between your local device and the remote session in the same way you copy and paste between applications on your local device. For other browsers, you can use the Bastion clipboard access tool palette. Only text copy/paste is supported.
26
+
27
+
For steps and more information, see [Copy and paste - Windows VMs](bastion-vm-copy-paste.md).
28
+
29
+
## <aname="full-screen"></a>Full screen view
30
+
31
+
You can change to full screen view and back using your browser. For steps and more information, see [Change to full screen view](bastion-vm-full-screen.md).
32
+
33
+
## <aname="upload-download"></a>Upload or download files
34
+
35
+
Azure Bastion offers support for file transfer between your target VM and local computer using Bastion and a native RDP or native SSH client. It may also be possible to use certain third-party clients and tools to upload and download files.
36
+
37
+
For steps and more information, see [Upload or download files to a VM using a native client](vm-upload-download-native.md).
38
+
39
+
## <aname="audio"></a>Remote audio
40
+
41
+
You can enable remote audio output for your VM. Some VMs automatically enable this setting, others require you to enable audio settings manually. The settings are changed on the VM itself. Your Bastion deployment doesn't need any special configuration settings to enable remote audio output.
42
+
43
+
For steps, see the [Deploy Bastion](tutorial-create-host-portal.md#audio) tutorial.
44
+
45
+
## Next steps
46
+
47
+
For frequently asked questions, see the VM section of the [Azure Bastion FAQ](bastion-faq.md).
Copy file name to clipboardExpand all lines: articles/event-grid/manage-event-delivery.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,7 @@ To set a dead letter location, you need a storage account for holding events tha
23
23
> [!NOTE]
24
24
> - Create a storage account and a blob container in the storage before running commands in this article.
25
25
> - The Event Grid service creates blobs in this container. The names of blobs will have the name of the Event Grid subscription with all the letters in upper case. For example, if the name of the subscription is My-Blob-Subscription, names of the dead letter blobs will have MY-BLOB-SUBSCRIPTION (myblobcontainer/MY-BLOB-SUBSCRIPTION/2019/8/8/5/111111111-1111-1111-1111-111111111111.json). This behavior is to protect against differences in case handling between Azure services.
26
+
> - The dead letter blobs created will contain one or more events in an array. An important behavior to consider when processing dead letters.
0 commit comments