Skip to content

Commit 7002431

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050ck
2 parents 799fdee + 7081f88 commit 7002431

File tree

338 files changed

+5393
-2604
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

338 files changed

+5393
-2604
lines changed

.openpublishing.redirection.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50474,6 +50474,14 @@
5047450474
{
5047550475
"source_path": "articles/sql-database/sql-database-paas-index.yml",
5047650476
"redirect_url": "/azure/sql-database/sql-database-technical-overview"
50477+
},
50478+
{
50479+
"source_path": "articles/sql-database/sql-database-scalability-index.yml",
50480+
"redirect_url": "/azure/sql-database/sql-database-scale-resources"
50481+
},
50482+
{
50483+
"source_path": "articles/sql-database/sql-database-features-index.yml",
50484+
"redirect_url": "/azure/sql-database/sql-database-features"
5047750485
}
5047850486
]
5047950487
}

articles/active-directory-b2c/saml-technical-profile.md

Lines changed: 27 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/13/2020
12+
ms.date: 03/30/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -86,11 +86,32 @@ The **Name** attribute of the Protocol element needs to be set to `SAML2`.
8686

8787
The **OutputClaims** element contains a list of claims returned by the SAML identity provider under the `AttributeStatement` section. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as you set the `DefaultValue` attribute.
8888

89-
To read the SAML assertion **NamedId** in **Subject** as a normalized claim, set the claim **PartnerClaimType** to `assertionSubjectName`. Make sure the **NameId** is the first value in assertion XML. When you define more than one assertion, Azure AD B2C picks the subject value from the last assertion.
89+
### Subject name output claim
90+
91+
To read the SAML assertion **NameId** in the **Subject** as a normalized claim, set the claim **PartnerClaimType** to value of the `SPNameQualifier` attribute. If the `SPNameQualifier`attribute is not presented, set the claim **PartnerClaimType** to value of the `NameQualifier` attribute.
9092

91-
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
9293

93-
The following example shows the claims returned by the Facebook identity provider:
94+
SAML assertion:
95+
96+
```XML
97+
<saml:Subject>
98+
<saml:NameID SPNameQualifier="http://your-idp.com/unique-identifier" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">[email protected]</saml:NameID>
99+
<SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
100+
<SubjectConfirmationData InResponseTo="_cd37c3f2-6875-4308-a9db-ce2cf187f4d1" NotOnOrAfter="2020-02-15T16:23:23.137Z" Recipient="https://your-tenant.b2clogin.com/your-tenant.onmicrosoft.com/B2C_1A_TrustFrameworkBase/samlp/sso/assertionconsumer" />
101+
</SubjectConfirmation>
102+
</saml:SubjectConfirmation>
103+
</saml:Subject>
104+
```
105+
106+
Output claim:
107+
108+
```XML
109+
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="http://your-idp.com/unique-identifier" />
110+
```
111+
112+
If both `SPNameQualifier` or `NameQualifier` attributes are not presented in the SAML assertion, set the claim **PartnerClaimType** to `assertionSubjectName`. Make sure the **NameId** is the first value in assertion XML. When you define more than one assertion, Azure AD B2C picks the subject value from the last assertion.
113+
114+
The following example shows the claims returned by a SAML identity provider:
94115

95116
- The **issuerUserId** claim is mapped to the **assertionSubjectName** claim.
96117
- The **first_name** claim is mapped to the **givenName** claim.
@@ -115,6 +136,8 @@ The technical profile also returns claims that aren't returned by the identity p
115136
</OutputClaims>
116137
```
117138

139+
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
140+
118141
## Metadata
119142

120143
| Attribute | Required | Description |

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,8 @@
9393
href: security-audit-events.md
9494
- name: Analyze audit events with Azure Monitor Workbooks
9595
href: use-azure-monitor-workbooks.md
96+
- name: Secure remote access to VMs
97+
href: secure-remote-vm-access.md
9698
- name: Domain-join VMs
9799
items:
98100
- name: Windows Server VM from template
26.1 KB
Loading

articles/active-directory-domain-services/network-considerations.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,11 @@ services: active-directory-ds
55
author: iainfoulds
66
manager: daveba
77

8-
ms.assetid: 23a857a5-2720-400a-ab9b-1ba61e7b145a
98
ms.service: active-directory
109
ms.subservice: domain-services
1110
ms.workload: identity
1211
ms.topic: conceptual
13-
ms.date: 01/21/2020
12+
ms.date: 03/30/2020
1413
ms.author: iainfou
1514

1615
---
@@ -72,7 +71,7 @@ You can connect a virtual network to another virtual network (VNet-to-VNet) in t
7271

7372
![Virtual network connectivity using a VPN Gateway](./media/active-directory-domain-services-design-guide/vnet-connection-vpn-gateway.jpg)
7473

75-
For more information on using virtual private networking, read [Configure a VNet-to-VNet VPN gateway connection by using the Azure portal](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-howto-vnet-vnet-resource-manager-portal).
74+
For more information on using virtual private networking, read [Configure a VNet-to-VNet VPN gateway connection by using the Azure portal](../vpn-gateway/vpn-gateway-howto-vnet-vnet-resource-manager-portal.md).
7675

7776
## Name resolution when connecting virtual networks
7877

@@ -93,11 +92,11 @@ An Azure AD DS managed domain creates some networking resources during deploymen
9392
| Load balancer rules | When an Azure AD DS managed domain is configured for secure LDAP on TCP port 636, three rules are created and used on a load balancer to distribute the traffic. |
9493

9594
> [!WARNING]
96-
> Don't delete any of the network resource created by Azure AD DS. If you delete any of the network resources, an Azure AD DS service outage occurs.
95+
> Don't delete or modify any of the network resource created by Azure AD DS, such as manually configuring the load balancer or rules. If you delete or modify any of the network resources, an Azure AD DS service outage may occur.
9796
9897
## Network security groups and required ports
9998

100-
A [network security group (NSG)](https://docs.microsoft.com/azure/virtual-network/virtual-networks-nsg) contains a list of rules that allow or deny network traffic to traffic in an Azure virtual network. A network security group is created when you deploy Azure AD DS that contains a set of rules that let the service provide authentication and management functions. This default network security group is associated with the virtual network subnet your Azure AD DS managed domain is deployed into.
99+
A [network security group (NSG)](../virtual-network/virtual-networks-nsg.md) contains a list of rules that allow or deny network traffic to traffic in an Azure virtual network. A network security group is created when you deploy Azure AD DS that contains a set of rules that let the service provide authentication and management functions. This default network security group is associated with the virtual network subnet your Azure AD DS managed domain is deployed into.
101100

102101
The following network security group rules are required for Azure AD DS to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your Azure AD DS managed domain is deployed into.
103102

Lines changed: 120 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,120 @@
1+
---
2+
title: Secure remote VM access in Azure AD Domain Services | Microsoft Docs
3+
description: Learn how to secure remote access to VMs using Network Policy Server (NPS) and Azure Multi-Factor Authentication with a Remote Desktop Services deployment in an Azure Active Directory Domain Services managed domain.
4+
services: active-directory-ds
5+
author: iainfoulds
6+
manager: daveba
7+
8+
ms.service: active-directory
9+
ms.subservice: domain-services
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 03/30/2020
13+
ms.author: iainfou
14+
15+
---
16+
# Secure remote access to virtual machines in Azure Active Directory Domain Services
17+
18+
To secure remote access to virtual machines (VMs) that run in an Azure Active Directory Domain Services (Azure AD DS) managed domain, you can use Remote Desktop Services (RDS) and Network Policy Server (NPS). Azure AD DS authenticates users as they request access through the RDS environment. For enhanced security, you can integrate Azure Multi-Factor Authentication to provide an additional authentication prompt during sign-in events. Azure Multi-Factor Authentication uses an extension for NPS to provide this feature.
19+
20+
> [!IMPORTANT]
21+
> The recommended way to securely connect to your VMs in an Azure AD DS managed domain is using Azure Bastion, a fully platform-managed PaaS service that you provision inside your virtual network. A bastion host provides secure and seamless Remote Desktop Protocol (RDP) connectivity to your VMs directly in the Azure portal over SSL. When you connect via a bastion host, your VMs don't need a public IP address, and you don't need to use network security groups to expose access to RDP on TCP port 3389.
22+
>
23+
> We strongly recommend that you use Azure Bastion in all regions where it's supported. In regions without Azure Bastion availability, follow the steps detailed in this article until Azure Bastion is available. Take care with assigning public IP addresses to VMs joined to Azure AD DS where all incoming RDP traffic is allowed.
24+
>
25+
> For more information, see [What is Azure Bastion?][bastion-overview].
26+
27+
This article shows you how to configure RDS in Azure AD DS and optionally use the Azure Multi-Factor Authentication NPS extension.
28+
29+
![Remote Desktop Services (RDS) overview](./media/enable-network-policy-server/remote-desktop-services-overview.png)
30+
31+
## Prerequisites
32+
33+
To complete this article, you need the following resources:
34+
35+
* An active Azure subscription.
36+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37+
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
38+
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
39+
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
40+
* If needed, [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
41+
* A *workloads* subnet created in your Azure Active Directory Domain Services virtual network.
42+
* If needed, [Configure virtual networking for an Azure Active Directory Domain Services managed domain][configure-azureadds-vnet].
43+
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
44+
45+
## Deploy and configure the Remote Desktop environment
46+
47+
To get started, create a minimum of two Azure VMs that run Windows Server 2016 or Windows Server 2019. For redundancy and high availability of your Remote Desktop (RD) environment, you can add and load balance additional hosts later.
48+
49+
A suggested RDS deployment includes the following two VMs:
50+
51+
* *RDGVM01* - Runs the RD Connection Broker server, RD Web Access server, and RD Gateway server.
52+
* *RDSHVM01* - Runs the RD Session Host server.
53+
54+
Make sure that VMs are deployed into a *workloads* subnet of your Azure AD DS virtual network, then join the VMs to Azure AD DS managed domain. For more information, see how to [create and join a Windows Server VM to an Azure AD DS managed domain][tutorial-create-join-vm].
55+
56+
The RD environment deployment contains a number of steps. The existing RD deployment guide can be used without any specific changes to use in an Azure AD DS managed domain:
57+
58+
1. Sign in to VMs created for the RD environment with an account that's part of the *Azure AD DC Administrators* group, such as *contosoadmin*.
59+
1. To create and configure RDS, use the existing [Remote Desktop environment deployment guide][deploy-remote-desktop]. Distribute the RD server components across your Azure VMs as desired.
60+
1. If you want to provide access using a web browser, [set up the Remote Desktop web client for your users][rd-web-client].
61+
62+
With RD deployed into the Azure AD DS managed domain, you can manage and use the service as you would with an on-premises AD DS domain.
63+
64+
## Deploy and configure NPS and the Azure MFA NPS extension
65+
66+
If you want to increase the security of the user sign-in experience, you can optionally integrate the RD environment with Azure Multi-Factor Authentication. With this configuration, users receive an additional prompt during sign-in to confirm their identity.
67+
68+
To provide this capability, an additional Network Policy Server (NPS) is installed in your environment along with the Azure Multi-Factor Authentication NPS extension. This extension integrates with Azure AD to request and return the status of multi-factor authentication prompts.
69+
70+
Users must be [registered to use Azure Multi-Factor Authentication][user-mfa-registration], which may require additional Azure AD licenses.
71+
72+
To integrate Azure Multi-Factor Authentication in to your Azure AD DS Remote Desktop environment, create an NPS Server and install the extension:
73+
74+
1. Create an additional Windows Server 2016 or 2019 VM, such as *NPSVM01*, that's connected to a *workloads* subnet in your Azure AD DS virtual network. Join the VM to the Azure AD DS managed domain.
75+
1. Sign in to NPS VM as account that's part of the *Azure AD DC Administrators* group, such as *contosoadmin*.
76+
1. From **Server Manager**, select **Add Roles and Features**, then install the *Network Policy and Access Services* role.
77+
1. Use the existing how-to article to [install and configure the Azure MFA NPS extension][nps-extension].
78+
79+
With the NPS server and Azure Multi-Factor Authentication NPS extension installed, complete the next section to configure it for use with the RD environment.
80+
81+
## Integrate Remote Desktop Gateway and Azure Multi-Factor Authentication
82+
83+
To integrate the Azure Multi-Factor Authentication NPS extension, use the existing how-to article to [integrate your Remote Desktop Gateway infrastructure using the Network Policy Server (NPS) extension and Azure AD][azure-mfa-nps-integration].
84+
85+
The following additional configuration options are needed to integrate with an Azure AD DS managed domain:
86+
87+
1. Don't [register the NPS server in Active Directory][register-nps-ad]. This step fails in an Azure AD DS managed domain.
88+
1. In [step 4 to configure network policy][create-nps-policy], also check the box to **Ignore user account dial-in properties**.
89+
1. If you use Windows Server 2019 for the NPS server and Azure Multi-Factor Authentication NPS extension, run the following command to update the secure channel to allow the NPS server to communicate correctly:
90+
91+
```powershell
92+
sc sidtype IAS unrestricted
93+
```
94+
95+
Users are now prompted for an additional authentication factor when they sign in, such as a text message or prompt in the Microsoft Authenticator app.
96+
97+
## Next steps
98+
99+
For more information on improving resiliency of your deployment, see [Remote Desktop Services - High availability][rds-high-availability].
100+
101+
For more information about securing user sign-in, see [How it works: Azure Multi-Factor Authentication][concepts-mfa].
102+
103+
<!-- INTERNAL LINKS -->
104+
[bastion-overview]: ../bastion/bastion-overview.md
105+
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
106+
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
107+
[create-azure-ad-ds-instance]: tutorial-create-instance.md
108+
[configure-azureadds-vnet]: tutorial-configure-networking.md
109+
[tutorial-create-join-vm]: join-windows-vm.md
110+
[user-mfa-registration]: ../active-directory/authentication/howto-mfa-nps-extension.md#register-users-for-mfa
111+
[nps-extension]: ../active-directory/authentication/howto-mfa-nps-extension.md
112+
[azure-mfa-nps-integration]: ../active-directory/authentication/howto-mfa-nps-extension-rdg.md
113+
[register-nps-ad]:../active-directory/authentication/howto-mfa-nps-extension-rdg.md#register-server-in-active-directory
114+
[create-nps-policy]: ../active-directory/authentication/howto-mfa-nps-extension-rdg.md#configure-network-policy
115+
[concepts-mfa]: ../active-directory/authentication/concept-mfa-howitworks.md
116+
117+
<!-- EXTERNAL LINKS -->
118+
[deploy-remote-desktop]: https://docs.microsoft.com/windows-server/remote/remote-desktop-services/rds-deploy-infrastructure
119+
[rd-web-client]: https://docs.microsoft.com/windows-server/remote/remote-desktop-services/clients/remote-desktop-web-client-admin
120+
[rds-high-availability]: https://docs.microsoft.com/windows-server/remote/remote-desktop-services/rds-plan-high-availability

articles/active-directory/develop/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@
2626
- name: Single-page apps
2727
displayName: SPA
2828
items:
29+
- name: Angular
30+
href: quickstart-v2-angular.md
2931
- name: JavaScript
3032
href: quickstart-v2-javascript.md
3133
- name: Web apps
@@ -69,6 +71,8 @@
6971
- name: Single-page apps
7072
displayName: SPA
7173
items:
74+
- name: Angular
75+
href: tutorial-v2-angular.md
7276
- name: JavaScript
7377
href: tutorial-v2-javascript-spa.md
7478
- name: Web apps
@@ -581,4 +585,4 @@
581585
href: https://docs.microsoft.com/azure/active-directory/managed-service-identity/overview
582586
- name: Getting help
583587
displayName: support, help options
584-
href: developer-support-help-options.md
588+
href: developer-support-help-options.md

articles/active-directory/develop/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@ landingContent:
4747
links:
4848
- text: JavaScript
4949
url: quickstart-v2-javascript.md
50+
- text: Angular
51+
url: quickstart-v2-angular.md
5052
- linkListType: tutorial
5153
links:
5254
- text: JavaScript

0 commit comments

Comments
 (0)