Skip to content

Commit 5f3ec10

Browse files
authored
Merge pull request #6496 from MicrosoftDocs/FromPrivateRepo
From private repo
2 parents 0eca127 + 546df61 commit 5f3ec10

File tree

681 files changed

+1486
-1064
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

681 files changed

+1486
-1064
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"source_path": "articles/search/search-howto-index-documentdb.md",
44
"redirect_url": "/azure/search/search-howto-index-cosmosdb",
55
"redirect_document_id": true
6-
},
6+
},
77
{
88
"source_path": "articles/machine-learning/preview/release-notes-sprint-0.md",
99
"redirect_url": "/azure/machine-learning/preview/release-notes-sprint-1",
@@ -1127,7 +1127,7 @@
11271127
"source_path": "articles/vs-azure-tools-remote-desktop-roles.md",
11281128
"redirect_url": "/azure/cloud-services/cloud-services-role-enable-remote-desktop-visual-studio",
11291129
"redirect_document_id": false
1130-
},
1130+
},
11311131
{
11321132
"source_path": "articles/xplat-cli-azure-resource-manager.md",
11331133
"redirect_url": "/azure/azure-resource-manager/xplat-cli-azure-resource-manager",
@@ -8934,7 +8934,7 @@
89348934
"redirect_url": "migrate-overview",
89358935
"redirect_document_id": false
89368936
},
8937-
{
8937+
{
89388938
"source_path": "articles/site-recovery/site-recovery-physical-servers-to-azure.md",
89398939
"redirect_url": "physical-azure-disaster-recovery",
89408940
"redirect_document_id": false
@@ -9001,7 +9001,7 @@
90019001
},
90029002
{
90039003
"source_path": "articles/site-recovery/physical-walkthrough-source-target.md",
9004-
"redirect_url": "physical-azure-disaster-recovery",
9004+
"redirect_url": "physical-azure-disaster-recovery",
90059005
"redirect_document_id": false
90069006
},
90079007
{
@@ -9106,7 +9106,7 @@
91069106
},
91079107
{
91089108
"source_path": "articles/site-recovery/site-recovery-failback-azure-to-vmware.md",
9109-
"redirect_url": "vmware-azure-failback",
9109+
"redirect_url": "vmware-azure-failback",
91109110
"redirect_document_id": false
91119111
},
91129112
{
@@ -9134,7 +9134,7 @@
91349134
"redirect_url": "vmware-azure-set-up-process-server-azure",
91359135
"redirect_document_id": false
91369136
},
9137-
{
9137+
{
91389138
"source_path": "articles/site-recovery/site-recovery-architecture-vmware-to-azure.md",
91399139
"redirect_url": "vmware-azure-architecture",
91409140
"redirect_document_id": false
@@ -9898,7 +9898,7 @@
98989898
"source_path": "articles/active-directory/active-directory-app-registration.md",
98999899
"redirect_url": "/azure/active-directory/develop/active-directory-integrating-applications",
99009900
"redirect_document_id": false
9901-
},
9901+
},
99029902
{
99039903
"source_path": "articles/active-directory/active-directory-java-authenticate-users-access-control-eclipse.md",
99049904
"redirect_url": "/azure/active-directory/develop/active-directory-java-authenticate-users-access-control-eclipse",
@@ -12983,7 +12983,7 @@
1298312983
"source_path": "articles/storage/storage-resource-manager-cannot-delete-storage-account-container-vhd.md",
1298412984
"redirect_url": "/azure/storage/common/storage-resource-manager-cannot-delete-storage-account-container-vhd",
1298512985
"redirect_document_id": false
12986-
},
12986+
},
1298712987
{
1298812988
"source_path": "articles/storage/common/storage-resource-manager-cannot-delete-storage-account-container-vhd.md",
1298912989
"redirect_url": "/azure/storage/common/storage-monitoring-diagnosing-troubleshooting",
@@ -16268,7 +16268,7 @@
1626816268
"source_path": "articles/hdinsight/domain-joined/apache-domain-joined-configure.md",
1626916269
"redirect_url": "/azure/hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds",
1627016270
"redirect_document_id": false
16271-
},
16271+
},
1627216272
{
1627316273
"source_path": "articles/hdinsight/hdinsight-domain-joined-introduction.md",
1627416274
"redirect_url": "/azure/hdinsight/domain-joined/apache-domain-joined-introduction",
@@ -17477,7 +17477,7 @@
1747717477
"source_path": "articles/billing/billing-enterprise-mgmt-grp-find.md",
1747817478
"redirect_url": "/azure/azure-resource-manager/management-groups-overview",
1747917479
"redirect_document_id": false
17480-
},
17480+
},
1748117481
{
1748217482
"source_path": "articles/active-directory/active-directory-saas-facebook-at-work-provisioning-tutorial.md",
1748317483
"redirect_url": "/azure/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial",
@@ -17497,11 +17497,6 @@
1749717497
"source_path": "articles/app-service/containers/quickstart-custom-docker-image.md",
1749817498
"redirect_url": "/azure/app-service/containers/quickstart-docker-go",
1749917499
"redirect_document_id": false
17500-
},
17501-
{
17502-
"source_path": "articles/azure-policy/policy-insights.md",
17503-
"redirect_url": "/azure/azure-policy/create-manage-policy",
17504-
"redirect_document_id": false
1750517500
},
1750617501
{
1750717502
"source_path": "articles/app-service/containers/quickstart-go.md",
@@ -17737,7 +17732,7 @@
1773717732
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-backups.md",
1773817733
"redirect_url": "/azure/sql-data-warehouse/backup-and-restore",
1773917734
"redirect_document_id": false
17740-
},
17735+
},
1774117736
{
1774217737
"source_path": "articles/data-factory/tutorial-create-azure-ssis-runtime-portal.md",
1774317738
"redirect_url": "/azure/data-factory/tutorial-deploy-ssis-packages-azure",
@@ -17786,4 +17781,3 @@
1778617781

1778717782
]
1778817783
}
17789-

articles/active-directory/active-directory-licensing-whatis-azure-portal.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
ms.topic: article
1616
ms.tgt_pltfrm: na
1717
ms.workload: identity
18-
ms.date: 03/20/2018
18+
ms.date: 03/29/2018
1919
ms.author: curtand
2020
ms.reviewer: piotrci
2121

@@ -31,6 +31,9 @@ Until now, licenses could only be assigned at the individual user level, which c
3131

3232
To address those challenges, Azure AD now includes group-based licensing. You can assign one or more product licenses to a group. Azure AD ensures that the licenses are assigned to all members of the group. Any new members who join the group are assigned the appropriate licenses. When they leave the group, those licenses are removed. This eliminates the need for automating license management via PowerShell to reflect changes in the organization and departmental structure on a per-user basis.
3333

34+
>[!NOTE]
35+
>This feature currently is in public preview. Be prepared to revert or remove any changes. The feature is available in any Azure Active Directory (Azure AD) subscription during public preview. However, when the feature becomes generally available, some aspects of the feature might require one or more Azure Active Directory Premium licenses.
36+
3437
## Features
3538

3639
Here are the main features of group-based licensing:

articles/active-directory/active-directory-saas-adpfederatedsso-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 03/22/2018
16+
ms.date: 03/29/2018
1717
ms.author: jeedes
1818

1919
---
@@ -208,23 +208,23 @@ Upon receipt of confirmation from your ADP representative, configure your ADP se
208208

209209
* **ADP Workforce Now**
210210
211-
`<User access URL>?Relay State=https://fed.adp.com/saml/fedlanding.html?WFN`
211+
`<User access URL>?relaystate=https://fed.adp.com/saml/fedlanding.html?WFN`
212212

213213
* **ADP Workforce Now Enhanced Time**
214214
215-
`<User access URL>?Relay State=https://fed.adp.com/saml/fedlanding.html?EETDC2`
215+
`<User access URL>?relaystate=https://fed.adp.com/saml/fedlanding.html?EETDC2`
216216

217217
* **ADP Vantage HCM**
218218
219-
`<User access URL>?Relay State=https://fed.adp.com/saml/fedlanding.html?ADPVANTAGE`
219+
`<User access URL>?relaystate=https://fed.adp.com/saml/fedlanding.html?ADPVANTAGE`
220220

221221
* **ADP Enterprise HR**
222222

223-
`<User access URL>?Relay State=https://fed.adp.com/saml/fedlanding.html?PORTAL`
223+
`<User access URL>?relaystate=https://fed.adp.com/saml/fedlanding.html?PORTAL`
224224

225225
* **MyADP**
226226

227-
`<User access URL>?Relay State=https://fed.adp.com/saml/fedlanding.html?REDBOX`
227+
`<User access URL>?relaystate=https://fed.adp.com/saml/fedlanding.html?REDBOX`
228228

229229
9. **Save** your changes.
230230

articles/active-directory/active-directory-saas-slack-tutorial.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 02/28/2018
15+
ms.date: 03/29/2018
1616
ms.author: jeedes
1717

1818
---
@@ -41,7 +41,7 @@ To configure Azure AD integration with Slack, you need the following items:
4141
To test the steps in this tutorial, you should follow these recommendations:
4242

4343
- Do not use your production environment, unless it is necessary.
44-
- If you don't have an Azure AD trial environment, you can get a one-month trial [here](https://azure.microsoft.com/pricing/free-trial/).
44+
- If you don't have an Azure AD trial environment, you can [get a one-month trial](https://azure.microsoft.com/pricing/free-trial/).
4545

4646
## Scenario description
4747
In this tutorial, you test Azure AD single sign-on in a test environment.
@@ -113,14 +113,14 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
113113
b. In the **Identifier** textbox, type the URL: `https://slack.com`
114114

115115
> [!NOTE]
116-
> The value is not real. You have to update the value with the actual Sign On URL. Contact [Slack support team](https://slack.com/help/contact) to get the value
116+
> The value is not real. You have to update the value with the actual Sign On URL. Contact [Slack support team](https://slack.com/help/contact) to get the value.
117117
118118
4. Slack application expects the SAML assertions in a specific format. Configure the following claims for this application. You can manage the values of these attributes from the "**User Attributes**" section on application integration page. The following screenshot shows an example for this.
119119

120120
![Configure Single Sign-On](./media/active-directory-saas-slack-tutorial/tutorial_slack_attribute.png)
121121

122122
> [!NOTE]
123-
> If the user has **email address** assigned using the Office365 then only it will be populated, otherwise the **email address** claim will not appear in the SAML Token.
123+
> If you have users who’s assigned **email address** is not on a Office365 license, the **User.Email** claim will not appear in the SAML Token. In these cases, we suggest using **user.userprincipalname** as the **User.Email** attribute value to map as **Unique Identifier** instead.
124124

125125
5. In the **User Attributes** section on the **Single sign-on** dialog, select **user.mail** as **User Identifier** and for each row shown in the table below, perform the following steps:
126126

@@ -178,12 +178,6 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
178178
d. Configure the above three settings as appropriate for your Slack team. For more information about the settings, please find the **Slack's SSO configuration guide** here. `https://get.slack.help/hc/articles/220403548-Guide-to-single-sign-on-with-Slack%60`
179179

180180
e. Click **Save Configuration**.
181-
182-
<!-- Deselect **Allow users to change their email address**.
183-
184-
e. Select **Allow users to choose their own username**.
185-
186-
f. As **Authentication for your team must be used by**, select **It’s optional**. -->
187181

188182
> [!TIP]
189183
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985)
@@ -227,7 +221,7 @@ The objective of this section is to create a user called Britta Simon in Slack.
227221
There is no action item for you in this section. A new user is created during an attempt to access Slack if it doesn't exist yet.
228222

229223
> [!NOTE]
230-
> If you need to create a user manually, you need to Contact [Slack support team](https://slack.com/help/contact).
224+
> If you need to create a user manually, you need to contact [Slack support team](https://slack.com/help/contact).
231225
232226
### Assigning the Azure AD test user
233227

@@ -270,8 +264,6 @@ When you click the Slack tile in the Access Panel, you should get automatically
270264
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md)
271265
* [What is application access and single sign-on with Azure Active Directory?](active-directory-appssoaccess-whatis.md)
272266

273-
274-
275267
<!--Image references-->
276268

277269
[1]: ./media/active-directory-saas-slack-tutorial/tutorial_general_01.png

articles/active-directory/connect-health/active-directory-aadconnect-health-alert-catalog.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,12 @@ Azure AD Connect Health service send alerts indicate that your identity infrastr
2121
Error, Warning, and Prewarning are three stages of alerts that are generated from Connect Health service. We highly recommend you take immediate actions on triggered alerts. <br />
2222
Azure AD Connect Health alerts get resolved on a success condition. Azure AD Connect Health Agents detect and report the success conditions to the service periodically. For a few alerts, the suppression is time-based. In other words, if the same error condition is not observed within 72 hours from alert generation, the alert is automatically resolved.
2323

24+
## General Alerts
25+
26+
| Alert Name | Description | Remediation |
27+
| --- | --- | ----- |
28+
| Health service data is not up to date | The Health Agent(s) running on one or more servers is not connected to the Health Service and the Health Service is not receiving the latest data from this server. The last data processed by the Health Service is older than 2 Hours. | Ensure that the health agents have outbound connectivity to the following service end points. [Read More](active-directory-aadconnect-health-data-freshness.md) |
29+
2430
## Alerts for Azure AD Connect (Sync)
2531

2632
| Alert Name | Description | Remediation |
@@ -31,10 +37,10 @@ Azure AD Connect Health alerts get resolved on a success condition. Azure AD Con
3137
| Export to Active Directory failed | The export operation to Active Directory Connector has failed. | Investigate the event log errors of export operation for further details. |
3238
| Import from Active Directory failed | Import from Active Directory failed. As a result, objects from some domains from this forest may not be imported. | <li>Verify DC connectivity</li> <li>Rerun import manually</li> <li> Investigate event log errors of the import operation for further details. |
3339
| Export to Azure Active Directory failed | The export operation to Azure Active Directory Connector has failed. As a result, some objects may not be exported successfully to Azure Active Directory. | Investigate the event log errors of export operation for further details. |
34-
| Password Synchronization heartbeat was skipped in last 120 minutes | Password Synchronization has not connected with Azure Active Directory in the last 120 minutes. As a result, passwords will not be synchronized with Azure Active Directory. | Restart Microsoft Azure Active Directory Sync Services:</b><br> Any synchronization operations that are currently running will be interrupted. You can choose to perform below steps when no synchronization operation is in progress.<br> 1. Click <b>Start</b>, click <b>Run</b>, type <b>Services.msc</b>, and then click <b>OK</b>.<br> 2. Locate <b>Microsoft Azure AD Sync</b>, right-click it, and then click <b>Restart</b>. |
40+
| Password Hash Synchronization heartbeat was skipped in last 120 minutes | Password Hash Synchronization has not connected with Azure Active Directory in the last 120 minutes. As a result, passwords will not be synchronized with Azure Active Directory. | Restart Microsoft Azure Active Directory Sync Services:</b><br> Any synchronization operations that are currently running will be interrupted. You can choose to perform below steps when no synchronization operation is in progress.<br> 1. Click <b>Start</b>, click <b>Run</b>, type <b>Services.msc</b>, and then click <b>OK</b>.<br> 2. Locate <b>Microsoft Azure AD Sync</b>, right-click it, and then click <b>Restart</b>. |
3541
| High CPU Usage detected | The percentage of CPU consumption crossed the recommended threshold on this server. | <li>This could be a temporary spike in CPU consumption. Check the CPU usage trend from the Monitoring section.</li><li>Inspect the top processes consuming the highest CPU usage on the server.<ol type="a"><li>You may use the Task Manager or execute the following PowerShell Command: <br> <i>get-process \| Sort-Object -Descending CPU \| Select-Object -First 10</i></li><li>If there are unexpected processes consuming high CPU usage, stop the processes using the following PowerShell command: <br> <i>stop-process -ProcessName [name of the process]</i></li></li></ol><li>If the processes seen in the above list are the intended processes running on the server and the CPU consumption is continuously near the threshold please consider re-evaluating the deployment requirements of this server.</li><li>As a fail-safe option you may consider restarting the server. |
3642
| High Memory Consumption Detected | The percentage of memory consumption of the server is beyond the recommended threshold on this server. | Inspect the top processes consuming the highest memory on the server. You may use the Task Manager or execute the following PowerShell Command:<br> <i>get-process \| Sort-Object -Descending WS \| Select-Object -First 10</i> </br> If there are unexpected processes consuming high memory, stop the processes using the following PowerShell command:<br><i>stop-process -ProcessName [name of the process] </i></li><li> If the processes seen in the above list are the intended processes running on the server, please consider re-evaluating the deployment requirements of this server.</li><li>As a failsafe option, you may consider restarting the server. |
37-
| Password Synchronization has stopped working | The Password Synchronization has stopped. As a result passwords will not be synchronized with Azure Active Directory. | Restart Microsoft Azure Active Directory Sync Services: <br /> Any synchronization operations that are currently running will be interrupted. You can choose to perform below steps when no synchronization operation is in progress. <br /> <ol> <li>Click <b>Start</b>, click <b>Run</b>, type <b>Services.msc</b>, and then click <b>OK</b>.</li> <li>Locate the <b>Microsoft Azure AD Sync</b>, right-click it, and then click <b>Restart</b>.</li> </ol> </p> |
43+
| Password Hash Synchronization has stopped working | Password Hash Synchronization has stopped. As a result passwords will not be synchronized with Azure Active Directory. | Restart Microsoft Azure Active Directory Sync Services: <br /> Any synchronization operations that are currently running will be interrupted. You can choose to perform below steps when no synchronization operation is in progress. <br /> <ol> <li>Click <b>Start</b>, click <b>Run</b>, type <b>Services.msc</b>, and then click <b>OK</b>.</li> <li>Locate the <b>Microsoft Azure AD Sync</b>, right-click it, and then click <b>Restart</b>.</li> </ol> </p> |
3844
| Export to Azure Active Directory was Stopped. Accidental delete threshold was reached | The export operation to Azure Active Directory has failed. There were more objects to be deleted than the configured threshold. As a result, no objects were exported. | <li> The number of objects are marked for deletion are greater than the set threshold. Ensure this outcome is desired.</li> <li> To allow the export to continue, please perform the following steps: <ol type="a"> <li>Disable Threshold by running Disable-ADSyncExportDeletionThreshold</li> <li>Start Sychronization Service Manager</li> <li>Run Export on Connector with type = Azure Active Directory</li> <li>After successfully exporting the objects, enable Threshold by running : Enable-ADSyncExportDeletionThreshold</li> </ol> </li> |
3945

4046
## Alerts for Active Directory Federation Services

0 commit comments

Comments
 (0)