Skip to content

Commit 766fc75

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into entraadmin
2 parents 549077c + 004eda3 commit 766fc75

File tree

648 files changed

+1726
-1259
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

648 files changed

+1726
-1259
lines changed

articles/active-directory-domain-services/join-centos-linux-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ If you have an existing CentOS Linux VM in Azure, connect to it using SSH, then
3939

4040
If you need to create a CentOS Linux VM, or want to create a test VM for use with this article, you can use one of the following methods:
4141

42-
* [Azure portal](../virtual-machines/linux/quick-create-portal.md)
42+
* [Microsoft Entra admin center](../virtual-machines/linux/quick-create-portal.md)
4343
* [Azure CLI](../virtual-machines/linux/quick-create-cli.md)
4444
* [Azure PowerShell](../virtual-machines/linux/quick-create-powershell.md)
4545

articles/active-directory-domain-services/join-coreos-linux-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ If you have an existing CoreOS Linux VM in Azure, connect to it using SSH, then
3939

4040
If you need to create a CoreOS Linux VM, or want to create a test VM for use with this article, you can use one of the following methods:
4141

42-
* [Azure portal](../virtual-machines/linux/quick-create-portal.md)
42+
* [Microsoft Entra admin center](../virtual-machines/linux/quick-create-portal.md)
4343
* [Azure CLI](../virtual-machines/linux/quick-create-cli.md)
4444
* [Azure PowerShell](../virtual-machines/linux/quick-create-powershell.md)
4545

articles/active-directory-domain-services/join-rhel-linux-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ If you have an existing RHEL Linux VM in Azure, connect to it using SSH, then co
3939

4040
If you need to create a RHEL Linux VM, or want to create a test VM for use with this article, you can use one of the following methods:
4141

42-
* [Azure portal](../virtual-machines/linux/quick-create-portal.md)
42+
* [Microsoft Entra admin center](../virtual-machines/linux/quick-create-portal.md)
4343
* [Azure CLI](../virtual-machines/linux/quick-create-cli.md)
4444
* [Azure PowerShell](../virtual-machines/linux/quick-create-powershell.md)
4545

articles/active-directory-domain-services/join-suse-linux-vm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ If you have an existing SLE Linux VM in Azure, connect to it using SSH, then con
3838

3939
If you need to create a SLE Linux VM, or want to create a test VM for use with this article, you can use one of the following methods:
4040

41-
* [Azure portal](../virtual-machines/linux/quick-create-portal.md)
41+
* [Microsoft Entra admin center](../virtual-machines/linux/quick-create-portal.md)
4242
* [Azure CLI](../virtual-machines/linux/quick-create-cli.md)
4343
* [Azure PowerShell](../virtual-machines/linux/quick-create-powershell.md)
4444

@@ -86,7 +86,7 @@ To join the managed domain using **SSSD** and the *User Logon Management* module
8686

8787
In YaST, select **System > Network Settings**.
8888

89-
1. Select the *Hostname/DNS* tab, then enter the IP address(es) of the managed domain into the text box *Name Server 1*. These IP addresses are shown on the *Properties* window in the Azure portal for your managed domain, such as *10.0.2.4* and *10.0.2.5*.
89+
1. Select the *Hostname/DNS* tab, then enter the IP address(es) of the managed domain into the text box *Name Server 1*. These IP addresses are shown on the *Properties* window in the Microsoft Entra admin center for your managed domain, such as *10.0.2.4* and *10.0.2.5*.
9090

9191
Add your own managed domain IP addresses, then select **OK**.
9292

@@ -162,7 +162,7 @@ To join the managed domain using **winbind** and the *Windows Domain Membership*
162162

163163
1. If you want to change the UID and GID ranges for the Samba users and groups, select *Expert Settings*.
164164

165-
1. Configure Network Time Protocol (NTP) time synchronization for your managed domain by selecting *NTP Configuration*. Enter the IP addresses of the managed domain. These IP addresses are shown on the *Properties* window in the Azure portal for your managed domain, such as *10.0.2.4* and *10.0.2.5*.
165+
1. Configure Network Time Protocol (NTP) time synchronization for your managed domain by selecting *NTP Configuration*. Enter the IP addresses of the managed domain. These IP addresses are shown on the *Properties* window in the Microsoft Entra admin center for your managed domain, such as *10.0.2.4* and *10.0.2.5*.
166166

167167
1. Select **OK** and confirm the domain join when prompted for it.
168168

articles/active-directory-domain-services/join-ubuntu-linux-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ If you have an existing Ubuntu Linux VM in Azure, connect to it using SSH, then
3939

4040
If you need to create an Ubuntu Linux VM, or want to create a test VM for use with this article, you can use one of the following methods:
4141

42-
* [Azure portal](../virtual-machines/linux/quick-create-portal.md)
42+
* [Microsoft Entra admin center](../virtual-machines/linux/quick-create-portal.md)
4343
* [Azure CLI](../virtual-machines/linux/quick-create-cli.md)
4444
* [Azure PowerShell](../virtual-machines/linux/quick-create-powershell.md)
4545

articles/active-directory-domain-services/join-windows-vm.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 06/22/2023
11+
ms.date: 09/15/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an server administrator, I want to learn how to join a Windows Server VM to an Azure Active Directory Domain Services managed domain to provide centralized identity and policy.
@@ -43,21 +43,21 @@ To complete this tutorial, you need the following resources:
4343

4444
If you already have a VM that you want to domain-join, skip to the section to [join the VM to the managed domain](#join-the-vm-to-the-managed-domain).
4545

46-
## Sign in to the Azure portal
46+
## Sign in to the Microsoft Entra admin center
4747

48-
In this tutorial, you create a Windows Server VM to join to your managed domain using the Azure portal. To get started, first sign in to the [Azure portal](https://portal.azure.com).
48+
In this tutorial, you create a Windows Server VM to join to your managed domain using the Microsoft Entra admin center. To get started, first sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
4949

5050
## Create a Windows Server virtual machine
5151

5252
To see how to join a computer to a managed domain, let's create a Windows Server VM. This VM is connected to an Azure virtual network that provides connectivity to the managed domain. The process to join a managed domain is the same as joining a regular on-premises Active Directory Domain Services domain.
5353

5454
If you already have a VM that you want to domain-join, skip to the section to [join the VM to the managed domain](#join-the-vm-to-the-managed-domain).
5555

56-
1. From the Azure portal menu or from the **Home** page, select **Create a resource**.
56+
1. From the Microsoft Entra admin center menu or from the **Home** page, select **Create a resource**.
5757

5858
1. From **Get started**, choose **Windows Server 2016 Datacenter**.
5959

60-
![Choose to create a Windows Server 2016 Datacenter VM in the Azure portal](./media/join-windows-vm/select-vm-image.png)
60+
![Choose to create a Windows Server 2016 Datacenter VM](./media/join-windows-vm/select-vm-image.png)
6161

6262
1. In the **Basics** window, configure the core settings for the virtual machine. Leave the defaults for *Availability options*, *Image*, and *Size*.
6363

@@ -71,7 +71,7 @@ If you already have a VM that you want to domain-join, skip to the section to [j
7171

7272
1. By default, VMs created in Azure are accessible from the Internet using RDP. When RDP is enabled, automated sign-in attacks are likely to occur, which may disable accounts with common names such as *admin* or *administrator* due to multiple failed successive sign-in attempts.
7373

74-
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over TLS. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
74+
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Microsoft Entra admin center over TLS. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
7575

7676
Under **Public inbound ports**, select *None*.
7777

@@ -89,21 +89,21 @@ If you already have a VM that you want to domain-join, skip to the section to [j
8989
In the **Networking** pane, select the virtual network in which your managed domain is deployed, such as *aaads-vnet*
9090
1. In this example, the existing *aaads-subnet* is shown that the managed domain is connected to. Don't connect your VM to this subnet. To create a subnet for the VM, select **Manage subnet configuration**.
9191

92-
![Choose to manage the subnet configuration in the Azure portal](./media/join-windows-vm/manage-subnet.png)
92+
![Choose to manage the subnet configuration](./media/join-windows-vm/manage-subnet.png)
9393

9494
1. In the left-hand menu of the virtual network window, select **Address space**. The virtual network is created with a single address space of *10.0.2.0/24*, which is used by the default subnet. Other subnets, such as for *workloads* or Azure Bastion may also already exist.
9595

9696
Add an additional IP address range to the virtual network. The size of this address range and the actual IP address range to use depends on other network resources already deployed. The IP address range shouldn't overlap with any existing address ranges in your Azure or on-premises environment. Make sure that you size the IP address range large enough for the number of VMs you expect to deploy into the subnet.
9797

9898
In the following example, an additional IP address range of *10.0.5.0/24* is added. When ready, select **Save**.
9999

100-
![Add an additional virtual network IP address range in the Azure portal](./media/join-windows-vm/add-vnet-address-range.png)
100+
![Add an additional virtual network IP address range](./media/join-windows-vm/add-vnet-address-range.png)
101101

102102
1. Next, in the left-hand menu of the virtual network window, select **Subnets**, then choose **+ Subnet** to add a subnet.
103103

104104
1. Select **+ Subnet**, then enter a name for the subnet, such as *management*. Provide an **Address range (CIDR block)**, such as *10.0.5.0/24*. Make sure that this IP address range doesn't overlap with any other existing Azure or on-premises address ranges. Leave the other options as their default values, then select **OK**.
105105

106-
![Create a subnet configuration in the Azure portal](./media/join-windows-vm/create-subnet.png)
106+
![Create a subnet configuration](./media/join-windows-vm/create-subnet.png)
107107

108108
1. It takes a few seconds to create the subnet. Once it's created, select the *X* to close the subnet window.
109109
1. Back in the **Networking** pane to create a VM, choose the subnet you created from the drop-down menu, such as *management*. Again, make sure you choose the correct subnet and don't deploy your VM in the same subnet as your managed domain.
@@ -112,23 +112,23 @@ If you already have a VM that you want to domain-join, skip to the section to [j
112112
1. Set **Boot diagnostics** to *Off*. Leave the other options as their default values, then select **Review + create**.
113113
1. Review the VM settings, then select **Create**.
114114

115-
It takes a few minutes to create the VM. The Azure portal shows the status of the deployment. Once the VM is ready, select **Go to resource**.
115+
It takes a few minutes to create the VM. The Microsoft Entra admin center shows the status of the deployment. Once the VM is ready, select **Go to resource**.
116116

117-
![Go to the VM resource in the Azure portal once it's successfully created](./media/join-windows-vm/vm-created.png)
117+
![Go to the VM resource once it's successfully created](./media/join-windows-vm/vm-created.png)
118118

119119
## Connect to the Windows Server VM
120120

121-
To securely connect to your VMs, use an Azure Bastion host. With Azure Bastion, a managed host is deployed into your virtual network and provides web-based RDP or SSH connections to VMs. No public IP addresses are required for the VMs, and you don't need to open network security group rules for external remote traffic. You connect to VMs using the Azure portal from your web browser. If needed, [create an Azure Bastion host][azure-bastion].
121+
To securely connect to your VMs, use an Azure Bastion host. With Azure Bastion, a managed host is deployed into your virtual network and provides web-based RDP or SSH connections to VMs. No public IP addresses are required for the VMs, and you don't need to open network security group rules for external remote traffic. You connect to VMs using the Microsoft Entra admin center from your web browser. If needed, [create an Azure Bastion host][azure-bastion].
122122

123123
To use a Bastion host to connect to your VM, complete the following steps:
124124

125125
1. In the **Overview** pane for your VM, select **Connect**, then **Bastion**.
126126

127-
![Connect to Windows virtual machine using Bastion in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
127+
![Connect to Windows virtual machine using Bastion](./media/join-windows-vm/connect-to-vm.png)
128128

129129
1. Enter the credentials for your VM that you specified in the previous section, then select **Connect**.
130130

131-
![Connect through the Bastion host in the Azure portal](./media/join-windows-vm/connect-to-bastion.png)
131+
![Connect through the Bastion host](./media/join-windows-vm/connect-to-bastion.png)
132132

133133
If needed, allow your web browser to open pop-ups for the Bastion connection to be displayed. It takes a few seconds to make the connection to your VM.
134134

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/19/2023
9+
ms.date: 09/15/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -32,7 +32,7 @@ Most methods also have configuration parameters to more precisely control how th
3232

3333
Or let's say you want to enable passwordless authentication with Microsoft Authenticator. You can set extra parameters like showing the user sign-in location or the name of the app being signed into. These options provide more context for users when they sign-in and help prevent accidental MFA approvals.
3434

35-
To manage the Authentication methods policy in the Azure AD portal, click **Security** > **Authentication methods** > **Policies**.
35+
To manage the Authentication methods policy, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and browse to **Protection** > **Authentication methods** > **Policies**.
3636

3737
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/authentication-methods-policy.png" alt-text="Screenshot of Authentication methods policy.":::
3838

articles/active-directory/authentication/how-to-authentication-two-way-sms-unsupported.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 09/15/2023
1010

1111
ms.author: justinha
1212
author: rhicock
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Two-way SMS for Azure AD Multi-Factor Authentication (MFA) Server was originally deprecated in 2018, and no longer supported after February 24, 2021, except for organizations that received a support extension until August 2, 2021. Administrators should enable another method for users who still use two-way SMS.
2121

22-
Email notifications and Azure portal Service Health notifications (portal toasts) were sent to affected admins on December 8, 2020 and January 28, 2021. The alerts went to the Owner, Co-Owner, Admin, and Service Admin RBAC roles tied to the subscriptions. If you've already completed the following steps, no action is necessary.
22+
Email notifications and Service Health notifications (portal toasts) were sent to affected admins on December 8, 2020 and January 28, 2021. The alerts went to the Owner, Co-Owner, Admin, and Service Admin RBAC roles tied to the subscriptions. If you've already completed the following steps, no action is necessary.
2323

2424
## Required actions
2525

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -346,7 +346,7 @@ Once you've successfully migrated user data, you can validate the end-user exper
346346

347347
#### Enable Staged Rollout
348348

349-
1. Navigate to the following url: [Enable staged rollout features - Microsoft Azure](https://portal.azure.com/?mfaUIEnabled=true%2F#view/Microsoft_AAD_IAM/StagedRolloutEnablementBladeV2).
349+
1. Navigate to the following url: [Enable staged rollout features - Microsoft Azure](https://entra.microsoft.com/#view/Microsoft_AAD_IAM/StagedRolloutEnablementBladeV2).
350350

351351
1. Change **Azure multifactor authentication** to **On**, and then click **Manage groups**.
352352

articles/active-directory/authentication/howto-authentication-passwordless-faqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: troubleshooting
9-
ms.date: 01/29/2023
9+
ms.date: 09/15/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -49,7 +49,7 @@ For a list of supported providers, see [FIDO2 security keys providers](concept-a
4949

5050
### What if I lose my security key?
5151

52-
You can remove keys in the Azure portal by navigating to the **Security info** page and removing the FIDO2 security key.
52+
You can remove keys by navigating to the **Security info** page and removing the FIDO2 security key.
5353

5454
### How is the data protected on the FIDO2 security key?
5555

0 commit comments

Comments
 (0)