Skip to content

Commit 58a2ffd

Browse files
authored
Merge pull request #106680 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 0c7f967 + d38dd0f commit 58a2ffd

File tree

3 files changed

+19
-12
lines changed

3 files changed

+19
-12
lines changed

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-kcd.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -63,17 +63,27 @@ The Active Directory configuration varies, depending on whether your Application
6363

6464
#### Connector and application server in different domains
6565
1. For a list of prerequisites for working with KCD across domains, see [Kerberos Constrained Delegation across domains](https://technet.microsoft.com/library/hh831477.aspx).
66-
2. Use the `principalsallowedtodelegateto` property on the Connector server to enable the Application Proxy to delegate for the Connector server. The application server is `sharepointserviceaccount` and the delegating server is `connectormachineaccount`. For Windows 2012 R2, use this code as an example:
66+
2. Use the `principalsallowedtodelegateto` property of the service account (computer or dedicated domain user account) of the web application to enable Kerberos authentication delegation from the Application Proxy (connector). The application server is running in the context of `webserviceaccount` and the delegating server is `connectorcomputeraccount`. Run the commands below on a Domain Controller (running Windows Server 2012 R2 or later) in the domain of `webserviceaccount`. Use flat names (non UPN) for both accounts.
6767

68-
```powershell
69-
$connector= Get-ADComputer -Identity connectormachineaccount -server dc.connectordomain.com
68+
If the `webserviceaccount` is a computer account, use these commands:
7069

71-
Set-ADComputer -Identity sharepointserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
70+
```powershell
71+
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
7272
73-
Get-ADComputer sharepointserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
74-
```
73+
Set-ADComputer -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
7574
76-
`sharepointserviceaccount` can be the SPS machine account or a service account under which the SPS app pool is running.
75+
Get-ADComputer webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
76+
```
77+
78+
If the `webserviceaccount` is a user account, use these commands:
79+
80+
```powershell
81+
$connector= Get-ADComputer -Identity connectorcomputeraccount -server dc.connectordomain.com
82+
83+
Set-ADUser -Identity webserviceaccount -PrincipalsAllowedToDelegateToAccount $connector
84+
85+
Get-ADUser webserviceaccount -Properties PrincipalsAllowedToDelegateToAccount
86+
```
7787

7888
## Configure single sign-on
7989
1. Publish your application according to the instructions described in [Publish applications with Application Proxy](application-proxy-add-on-premises-application.md). Make sure to select **Azure Active Directory** as the **Preauthentication Method**.
@@ -146,4 +156,3 @@ But, in some cases, the request is successfully sent to the backend application
146156
147157
148158
For the latest news and updates, check out the [Application Proxy blog](https://blogs.technet.com/b/applicationproxyblog/)
149-

articles/kinect-dk/multi-camera-sync.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ There are many reasons to use multiple Azure Kinect DK devices, including the fo
2525
Additional synchronized devices can provide the occluded data.
2626
- Scan objects in three dimensions.
2727
- Increase the effective frame rate to a value that's greater than 30 frames per second (FPS).
28-
- Capture multiple 4K color images of the same scene, all aligned within 100 microseconds (μs) of the start of exposure.
28+
- Capture multiple 4K color images of the same scene, all aligned within 100 microseconds (μs) of the center of exposure.
2929
- Increase camera coverage within the space.
3030

3131
## Plan your multi-device configuration
@@ -70,9 +70,6 @@ If you want to control the precise timing of each device, we recommend that you
7070

7171
In the image capture loop, avoid repeatedly setting the same exposure setting. Call the API only one time when it's needed.
7272

73-
#### Timestamp considerations
74-
Devices that are acting in master or subordinate roles report image timestamps in terms of *Start of Frame* instead of *Center of Frame*.
75-
7673
#### Avoiding interference between multiple depth cameras
7774

7875
When multiple depth cameras are imaging overlapping fields of view, each camera must image its own associated laser. To prevent the lasers from interfering with one another, the camera captures should be offset from one another by 160μs or more.

articles/virtual-machines/linux/disk-encryption.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ For now, customer-managed keys have the following restrictions:
6868
- All resources related to your customer-managed keys (Azure Key Vaults, disk encryption sets, VMs, disks, and snapshots) must be in the same subscription and region.
6969
- Disks, snapshots, and images encrypted with customer-managed keys cannot move to another subscription.
7070
- If you use the Azure portal to create your disk encryption set, you cannot use snapshots for now.
71+
- Managed disks encrypted using customer-managed keys cannot also be encrypted with Azure Disk Encryption.
7172

7273
### CLI
7374
#### Setting up your Azure Key Vault and DiskEncryptionSet

0 commit comments

Comments
 (0)