Skip to content

Commit 5ac7409

Browse files
committed
Merge branch 'main' into release-cred-free-java
2 parents 6ba0cd8 + 69fd1dd commit 5ac7409

File tree

154 files changed

+6352
-2640
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

154 files changed

+6352
-2640
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4178,12 +4178,12 @@
41784178
},
41794179
{
41804180
"source_path_from_root": "/articles/active-directory/active-directory-troubleshooting-support-howto.md",
4181-
"redirect_url": "/azure/active-directory/fundamentals/active-directory-troubleshooting-support-howto",
4181+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
41824182
"redirect_document_id": false
41834183
},
41844184
{
41854185
"source_path_from_root": "/articles/active-directory/b2b/get-support.md",
4186-
"redirect_url": "/azure/active-directory/fundamentals/active-directory-troubleshooting-support-howto",
4186+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
41874187
"redirect_document_id": false
41884188
},
41894189
{
@@ -10885,7 +10885,16 @@
1088510885
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/product-integrations.md",
1088610886
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management",
1088710887
"redirect_document_id": false
10888+
},
10889+
{
10890+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-troubleshooting-support-howto.md",
10891+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
10892+
"redirect_document_id": false
10893+
},
10894+
{
10895+
"source_path_from_root": "/articles/active-directory/fundamentals/support-help-options.md",
10896+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
10897+
"redirect_document_id": false
1088810898
}
10889-
1089010899
]
1089110900
}

.openpublishing.redirection.json

Lines changed: 5 additions & 610 deletions
Large diffs are not rendered by default.
75.4 KB
Loading

articles/active-directory-domain-services/network-considerations.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 06/20/2022
12+
ms.date: 09/21/2022
1313
ms.author: justinha
1414

1515
---
@@ -108,14 +108,21 @@ The following sections cover network security groups and Inbound and Outbound po
108108

109109
### Inbound connectivity
110110

111-
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
111+
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet for your managed domain.
112112

113113
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
114114
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
115115
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
116116
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
117117

118-
An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly. Don't delete this network security group. The load balancer won't work correctly without it.
118+
Azure AD DS also relies on the Default Security rules AllowVnetInBound and AllowAzureLoadBalancerInBound.
119+
120+
:::image type="content" border="true" source="./media/network-considerations/nsg.png" alt-text="Screenshot of network security group rules.":::
121+
122+
The AllowVnetInBound rule allows all traffic within the VNet which allows the DCs to properly communicate and replicate as well as allow domain join and other domain services to domain members. For more information about required ports for Windows, see [Service overview and network port requirements for Windows](/troubleshoot/windows-server/networking/service-overview-and-network-port-requirements).
123+
124+
125+
The AllowAzureLoadBalancerInBound rule is also required so that the service can properly communicate over the loadbalancer to manage the DCs. This network security group secures Azure AD DS and is required for the managed domain to work correctly. Don't delete this network security group. The load balancer won't work correctly without it.
119126

120127
If needed, you can [create the required network security group and rules using Azure PowerShell](powershell-create-instance.md#create-a-network-security-group).
121128

articles/active-directory/develop/app-resilience-continuous-access-evaluation.md

Lines changed: 24 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -105,11 +105,22 @@ When these conditions are met, the app can extract the claims challenge from the
105105

106106
```javascript
107107
const authenticateHeader = response.headers.get('www-authenticate');
108-
const claimsChallenge = authenticateHeader
109-
.split(' ')
110-
.find((entry) => entry.includes('claims='))
111-
.split('claims="')[1]
112-
.split('",')[0];
108+
const claimsChallenge = parseChallenges(authenticateHeader).claims;
109+
110+
// ...
111+
112+
function parseChallenges(header) {
113+
const schemeSeparator = header.indexOf(' ');
114+
const challenges = header.substring(schemeSeparator + 1).split(',');
115+
const challengeMap = {};
116+
117+
challenges.forEach((challenge) => {
118+
const [key, value] = challenge.split('=');
119+
challengeMap[key.trim()] = window.decodeURI(value.replace(/['"]+/g, ''));
120+
});
121+
122+
return challengeMap;
123+
}
113124
```
114125

115126
Your app would then use the claims challenge to acquire a new access token for the resource.
@@ -118,22 +129,19 @@ Your app would then use the claims challenge to acquire a new access token for t
118129
let tokenResponse;
119130

120131
try {
121-
122132
tokenResponse = await msalInstance.acquireTokenSilent({
123-
claims: window.atob(claimsChallenge), // decode the base64 string
124-
scopes: scopes, // e.g ['User.Read', 'Contacts.Read']
125-
account: account, // current active account
126-
});
133+
claims: window.atob(claimsChallenge), // decode the base64 string
134+
scopes: scopes, // e.g ['User.Read', 'Contacts.Read']
135+
account: account, // current active account
136+
});
127137

128138
} catch (error) {
129-
130139
if (error instanceof InteractionRequiredAuthError) {
131-
132140
tokenResponse = await msalInstance.acquireTokenPopup({
133-
claims: window.atob(claimsChallenge), // decode the base64 string
134-
scopes: scopes, // e.g ['User.Read', 'Contacts.Read']
135-
account: account, // current active account
136-
});
141+
claims: window.atob(claimsChallenge), // decode the base64 string
142+
scopes: scopes, // e.g ['User.Read', 'Contacts.Read']
143+
account: account, // current active account
144+
});
137145
}
138146

139147
}

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ To improve the security of Linux virtual machines (VMs) in Azure, you can integr
2222
This article shows you how to create and configure a Linux VM and log in with Azure AD by using OpenSSH certificate-based authentication.
2323

2424
> [!IMPORTANT]
25-
> This capability is now generally available. The previous version that made use of device code flow was [deprecated on August 15, 2021](../../virtual-machines/linux/login-using-aad.md). To migrate from the old version to this version, see the section [Migrate from the previous (preview) version](#migrate-from-the-previous-preview-version).
25+
> This capability is now generally available. The previous version that made use of device code flow was [deprecated on August 15, 2021](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad). To migrate from the old version to this version, see the section [Migrate from the previous (preview) version](#migrate-from-the-previous-preview-version).
2626
2727
There are many security benefits of using Azure AD with OpenSSH certificate-based authentication to log in to Linux VMs in Azure. They include:
2828

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ To configure role assignments for your Azure AD-enabled Windows Server 2019 Data
200200

201201
The following example uses [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) to assign the Virtual Machine Administrator Login role to the VM for your current Azure user. You obtain the username of your current Azure account by using [az account show](/cli/azure/account#az-account-show), and you set the scope to the VM created in a previous step by using [az vm show](/cli/azure/vm#az-vm-show).
202202

203-
You can also assign the scope at a resource group or subscription level. Normal Azure RBAC inheritance permissions apply. For more information, see [Log in to a Linux virtual machine in Azure by using Azure Active Directory authentication](../../virtual-machines/linux/login-using-aad.md).
203+
You can also assign the scope at a resource group or subscription level. Normal Azure RBAC inheritance permissions apply. For more information, see [Log in to a Linux virtual machine in Azure by using Azure Active Directory authentication](/azure-docs-archive-pr/virtual-machines/linux/login-using-aad).
204204

205205
```AzureCLI
206206
$username=$(az account show --query user.name --output tsv)

articles/active-directory/fundamentals/active-directory-troubleshooting-support-howto.md

Lines changed: 0 additions & 95 deletions
This file was deleted.

0 commit comments

Comments
 (0)