Skip to content

Commit 806d8e9

Browse files
committed
2 parents 77e546a + 9d22ce3 commit 806d8e9

File tree

2,546 files changed

+82126
-73530
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,546 files changed

+82126
-73530
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,11 @@
163163
"url": "https://github.com/Azure/azure-functions-templates",
164164
"branch": "dev"
165165
},
166+
{
167+
"path_to_root": "azure-functions-samples-java",
168+
"url": "https://github.com/Azure-Samples/azure-functions-samples-java",
169+
"branch": "master"
170+
},
166171
{
167172
"path_to_root": "functions-quickstart-java",
168173
"url": "https://github.com/Azure-Samples/functions-quickstarts-java",

.openpublishing.redirection.json

Lines changed: 1840 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/configure-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ You can configure the token lifetime on any user flow.
5050

5151
## Next steps
5252

53-
Learn more about how to [use access tokens](access-tokens.md).
53+
Learn more about how to [request access tokens](access-tokens.md).
5454

5555

5656

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@
4747
href: synchronization.md
4848
- name: How password hash synchronization works
4949
href: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
50+
- name: Classic deployment migration benefits
51+
href: concepts-migration-benefits.md
5052
- name: What is Azure Active Directory?
5153
href: ../active-directory/fundamentals/active-directory-whatis.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
5254
- name: Azure Active Directory architecture
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Benefits of Classic deployment migration in Azure AD Domain Services | Microsoft Docs
3+
description: Learn more about the benefits of migrating a Classic deployment of Azure Active Directory Domain Services to the Resource Manager deployment model
4+
services: active-directory-ds
5+
author: iainfoulds
6+
manager: daveba
7+
8+
ms.service: active-directory
9+
ms.subservice: domain-services
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 05/26/2020
13+
ms.author: iainfou
14+
---
15+
16+
# Benefits of migration from the Classic to Resource Manager deployment model in Azure Active Directory Domain Services
17+
18+
Azure Active Directory Domain Services (AD DS) lets you migrate an existing managed domain that uses the Classic deployment model to the Resource Manager deployment model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
19+
20+
This article outlines the benefits for migration. To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager][howto-migrate].
21+
22+
> [!NOTE]
23+
> In 2017, Azure AD Domain Services became available to host in an Azure Resource Manager network. Since then, we have been able to build a more secure service using the Azure Resource Manager's modern capabilities. Because Azure Resource Manager deployments fully replace classic deployments, Azure AD DS classic virtual network deployments will be retired on March 1, 2023.
24+
>
25+
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/)
26+
27+
## Migration benefits
28+
29+
The migration process takes an existing Azure AD DS instance that uses the Classic deployment model and moves to use the Resource Manager deployment model. When you migrate an Azure AD DS managed domain from the Classic to Resource Manager deployment model, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
30+
31+
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager deployment model, such as the following:
32+
33+
* [Fine-grained password policy support][password-policy].
34+
* Faster synchronization speeds between Azure AD and Azure AD Domain Services.
35+
* Two new [attributes that synchronize from Azure AD][attributes] - *manager* and *employeeID*.
36+
* Access to higher-powered domain controllers when you [upgrade the SKU][skus].
37+
* AD account lockout protection.
38+
* [Email notifications for alerts on your managed domain][email-alerts].
39+
* [Use Azure Workbooks and Azure monitor to view audit logs and sign-in activity][workbooks].
40+
* In supported regions, [Azure Availability Zones][availability-zones].
41+
* Integrations with other Azure products such as [Azure Files][azure-files], [HD Insights][hd-insights], and [Windows Virtual Desktop][wvd].
42+
* Support has access to more telemetry and can help troubleshoot more effectively.
43+
* Encryption at rest using [Azure Managed Disks][managed-disks] for the data on the managed domain controllers.
44+
45+
Azure AD DS managed domains that use a Resource Manager deployment model help you stay up-to-date with the latest new features. New features aren't available for Azure AD DS managed domains that use the Classic deployment model.
46+
47+
## Next steps
48+
49+
To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager][howto-migrate].
50+
51+
<!-- LINKS - INTERNAL -->
52+
[password-policy]: password-policy.md
53+
[skus]: change-sku.md
54+
[email-alerts]: notifications.md
55+
[workbooks]: use-azure-monitor-workbooks.md
56+
[azure-files]: ../storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md
57+
[hd-insights]: ../hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds.md
58+
[wvd]: ../virtual-desktop/overview.md
59+
[availability-zones]: ../availability-zones/az-overview.md
60+
[howto-migrate]: migrate-from-classic-vnet.md
61+
[attributes]: synchronization.md#attribute-synchronization-and-mapping-to-azure-ad-ds
62+
[managed-disks]: ../virtual-machines/windows/managed-disks-overview.md

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,16 @@ ms.author: iainfou
1717

1818
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
1919

20-
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance.
20+
This article outlines considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. For some of the benefits, see [Benefits of migration from the Classic to Resource Manager deployment model in Azure AD DS][migration-benefits].
2121

2222
> [!NOTE]
2323
> In 2017, Azure AD Domain Services became available to host in an Azure Resource Manager network. Since then, we have been able to build a more secure service using the Azure Resource Manager's modern capabilities. Because Azure Resource Manager deployments fully replace classic deployments, Azure AD DS classic virtual network deployments will be retired on March 1, 2023.
2424
>
25-
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/)
25+
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/).
2626
2727
## Overview of the migration process
2828

29-
The migration process takes an existing Azure AD DS instance that runs in a Classic virtual network and moves it to an existing Resource Manager virtual network. The migration is performed using PowerShell, and has two main stages of execution - *preparation* and *migration*.
29+
The migration process takes an existing Azure AD DS instance that runs in a Classic virtual network and moves it to an existing Resource Manager virtual network. The migration is performed using PowerShell, and has two main stages of execution: *preparation* and *migration*.
3030

3131
![Overview of the migration process for Azure AD DS](media/migrate-from-classic-vnet/migration-overview.png)
3232

@@ -38,21 +38,6 @@ In the *migration* stage, the underlying virtual disks for the domain controller
3838

3939
![Migration of Azure AD DS](media/migrate-from-classic-vnet/migration-process.png)
4040

41-
## Migration benefits
42-
43-
When you move an Azure AD DS managed domain using this migration process, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
44-
45-
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager virtual networks, such as:
46-
47-
* Fine-grained password policy support.
48-
* AD account lockout protection.
49-
* Email notifications of alerts on the Azure AD DS managed domain.
50-
* Audit logs using Azure Monitor.
51-
* Azure Files integration
52-
* HD Insights integration
53-
54-
Azure AD DS managed domains that use a Resource Manager virtual network help you stay up-to-date with the latest new features. Support for Azure AD DS using Classic virtual networks is to be deprecated in the future.
55-
5641
## Example scenarios for migration
5742

5843
Some common scenarios for migrating an Azure AD DS managed domain include the following examples.
@@ -364,6 +349,7 @@ With your Azure AD DS managed domain migrated to the Resource Manager deployment
364349
[troubleshoot-sign-in]: troubleshoot-sign-in.md
365350
[tshoot-ldaps]: tshoot-ldaps.md
366351
[get-credential]: /powershell/module/microsoft.powershell.security/get-credential
352+
[migration-benefits]: concepts-migration-benefits.md
367353

368354
<!-- EXTERNAL LINKS -->
369355
[powershell-script]: https://www.powershellgallery.com/packages/Migrate-Aadds/

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,11 @@ You also need a valid Azure AD Premium P1 or higher subscription license for eve
7676

7777
### Prerequisites
7878

79-
- Azure AD global administrator access to configure the Azure AD Connect provisioning agent.
79+
- Azure AD [hybrid identity administrator](../users-groups-roles/directory-assign-admin-roles.md#hybrid-identity-administrator) to configure the Azure AD Connect provisioning agent.
80+
- Azure AD [application administrator](../users-groups-roles/directory-assign-admin-roles.md#application-administrator) role to configure the provisioning app in the Azure portal
8081
- A test and production instance of the cloud HR app.
8182
- Administrator permissions in the cloud HR app to create a system integration user and make changes to test employee data for testing purposes.
82-
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the [Azure AD Connect provisioning agent](https://go.microsoft.com/fwlink/?linkid=847801).
83+
- For user provisioning to Active Directory, a server running Windows Server 2012 or greater with .NET 4.7.1+ runtime is required to host the Azure AD Connect provisioning agent
8384
- [Azure AD Connect](../hybrid/whatis-azure-ad-connect.md) for synchronizing users between Active Directory and Azure AD.
8485

8586
### Training resources
@@ -243,7 +244,7 @@ By default, the attribute in the cloud HR app that represents the unique employe
243244

244245
You can set multiple matching attributes and assign matching precedence. They're evaluated on matching precedence. As soon as a match is found, no further matching attributes are evaluated.
245246

246-
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
247+
You can also [customize the default attribute mappings](../app-provisioning/customize-application-attributes.md#understanding-attribute-mapping-types), such as changing or deleting existing attribute mappings. You can also create new attribute mappings according to your business needs. For more information, see the cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#managing-your-configuration)) for a list of custom attributes to map.
247248

248249
### Determine user account status
249250

@@ -280,7 +281,7 @@ When you initiate the Joiners-Movers-Leavers process, gather the following requi
280281
| | What effective dates are considered for processing user termination? |
281282
| | How do employee and contingent worker conversions impact existing Active Directory accounts? |
282283

283-
Depending on your requirements, you can modify the mappings to meet your integration goals. For more information, see the specific cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#planning-workday-to-active-directory-user-attribute-mapping-and-transformations)) for a list of custom attributes to map.
284+
Depending on your requirements, you can modify the mappings to meet your integration goals. For more information, see the specific cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#part-4-configure-attribute-mappings)) for a list of custom attributes to map.
284285

285286
### Generate a unique attribute value
286287

@@ -360,7 +361,9 @@ The cloud HR user provisioning implementation might fail to work as desired in t
360361

361362
Choose the cloud HR app that aligns to your solution requirements.
362363

363-
**Workday**: To import worker profiles from Workday into Active Directory and Azure AD, see [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#planning-your-deployment). Optionally, you can write back the email address and username to Workday.
364+
**Workday**: To import worker profiles from Workday into Active Directory and Azure AD, see [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#planning-your-deployment). Optionally, you can write back the email address, username and phone number to Workday.
365+
366+
**SAP SuccessFactors**: To import worker profiles from SuccessFactors into Active Directory and Azure AD, see [Tutorial: Configure SAP SuccessFactors for automatic user provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md). Optionally, you can write back the email address and username to SuccessFactors.
364367

365368
## Manage your configuration
366369

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -744,6 +744,17 @@ TLS 1.2 Cipher Suites minimum bar:
744744
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
745745
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
746746

747+
### IP Ranges
748+
The Azure AD Provisionong service currently operates under the following IP ranges.
749+
750+
13.86.239.205; 52.188.178.195; 13.86.61.156; 40.67.254.206; 51.105.237.71; 20.44.38.166; 40.81.88.68; 52.184.94.250;
751+
20.43.180.59; 20.193.16.105; 20.40.167.232; 13.86.3.57; 52.188.72.113; 13.88.140.233; 52.142.121.156; 51.124.0.213;
752+
40.81.92.36; 20.44.39.175; 20.189.114.130; 20.44.193.163; 20.193.23.17; 20.40.173.237; 13.86.138.128; 52.142.29.23;
753+
13.86.2.238; 40.127.246.167; 51.136.72.4; 20.44.39.244; 40.81.92.186; 20.189.114.131; 20.44.193.210; 20.193.2.21; 20.40.174.46;
754+
13.86.219.18; 40.71.13.10; 20.44.16.38; 13.89.174.16; 13.69.66.182; 13.69.229.118; 104.211.147.176; 40.78.195.176;
755+
13.67.9.240; 13.75.38.48; 13.70.73.48; 13.77.52.176;
756+
757+
747758

748759
## Step 3: Build a SCIM endpoint
749760

0 commit comments

Comments
 (0)