Skip to content

Commit 7fdf0ae

Browse files
authored
Merge pull request #98216 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 854d28e + 3918a47 commit 7fdf0ae

File tree

4 files changed

+19
-3
lines changed

4 files changed

+19
-3
lines changed

articles/active-directory/hybrid/how-to-connect-sync-feature-preferreddatalocation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -246,7 +246,7 @@ Re-enable the built-in sync scheduler:
246246
1. Start a PowerShell session.
247247
2. Re-enable scheduled synchronization by running this cmdlet: `Set-ADSyncScheduler -SyncCycleEnabled $true`
248248

249-
## Step 8: Verify the result
249+
## Step 9: Verify the result
250250
It is now time to verify the configuration and enable it for your users.
251251

252252
1. Add the geo to the selected attribute on a user. The list of available geos can be found in this table.

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,23 @@ Download| [Download Azure AD Connect](https://go.microsoft.com/fwlink/?LinkId=61
3333
While we go through this process, the version number of the release will be shown with an "X" in the minor release number position, as in "1.3.X.0" - this indicates that the release notes in this document are valid for all versions beginning with "1.3.". As soon as we have finalized the release process the release version number will be updated to the most recently released version and the release status will be updated to "Released for download and auto upgrade".
3434
Not all releases of Azure AD Connect will be made available for auto upgrade. The release status will indicate whether a release is made available for auto upgrade or for download only. If auto upgrade was enabled on your Azure AD Connect server then that server will automatically upgrade to the latest version of Azure AD Connect that is released for auto upgrade. Note that not all Azure AD Connect configurations are eligible for auto upgrade. Please follow this link to read more about [auto upgrade](how-to-connect-install-automatic-upgrade.md)
3535

36+
## 1.4.38.0
37+
### Release status
38+
12/6/2019: Release for download. Not available through auto-upgrade.
39+
### New features and improvements
40+
- We updated Password Hash Sync for Azure AD Domain Services to properly account for padding in Kerberos hashes. This will provide a performance improvement during password synchronization from AAD to Azure AD Domain Services.
41+
- We added support for reliable sessions between the authentication agent and service bus.
42+
- This release enforces TLS 1.2 for communication between authentication agent and cloud services.
43+
- We added a DNS cache for websocket connections between authentication agent and cloud services.
44+
- We added the ability to target specific agent from cloud to test for agent connectivity.
45+
46+
### Fixed issues
47+
- Release 1.4.18.0 had a bug where the PowerShell cmdlet for DSSO was using the login windows credentials instead of the admin credentialss provided while running ps. As a result of which it was not possible to enable DSSO in multiple forest through the AADConnect user interface.
48+
- A fix was made to enable DSSO simultaneously in all forest through the AADConnect user interface
49+
3650
## 1.4.32.0
3751
### Release status
38-
11/08/2019: Released for download. Not available for auto-upgrade
52+
11/08/2019: Released for download. Not available through auto-upgrade.
3953

4054
>[!IMPORTANT]
4155
>Due to an internal schema change in this release of Azure AD Connect, if you manage ADFS trust relationship configuration settings using MSOnline PowerShell then you must update your MSOnline PowerShell module to version 1.1.183.57 or higher

articles/active-directory/users-groups-roles/groups-lifecycle.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The following are roles that can configure and use expiration for Office 365 gro
5959

6060
Role | Permissions
6161
-------- | --------
62-
Global administrator or User administrator | Can create, read, update, or delete the Office 365 groups expiration policy settings<br>Can renew any Office 365 group
62+
Global administrator, Group administrator, or User administrator | Can create, read, update, or delete the Office 365 groups expiration policy settings<br>Can renew any Office 365 group
6363
User | Can renew an Office 365 group that they own<br>Can restore an Office 365 group that they own<br>Can read the expiration policy settings
6464

6565
For more information on permissions to restore a deleted group, see [Restore a deleted Office 365 group in Azure Active Directory](groups-restore-deleted.md).

articles/service-bus-messaging/duplicate-detection.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,5 +65,7 @@ To learn more about Service Bus messaging, see the following topics:
6565
* [Get started with Service Bus queues](service-bus-dotnet-get-started-with-queues.md)
6666
* [How to use Service Bus topics and subscriptions](service-bus-dotnet-how-to-use-topics-subscriptions.md)
6767

68+
In scenarios where client code is unable to resubmit a message with the same *MessageId* as before, it is important to design messages which can be safely re-processed. This [blog post about idempotence](https://particular.net/blog/what-does-idempotent-mean) describes various techniques for how to do that.
69+
6870
[1]: ./media/duplicate-detection/create-queue.png
6971
[2]: ./media/duplicate-detection/queue-prop.png

0 commit comments

Comments
 (0)