Skip to content

Commit 87781a4

Browse files
authored
Merge pull request #101999 from MicrosoftDocs/master
1/22 PM Publish
2 parents 5e37847 + ca3eaf5 commit 87781a4

File tree

167 files changed

+2445
-2260
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

167 files changed

+2445
-2260
lines changed

.openpublishing.redirection.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4248,7 +4248,7 @@
42484248
},
42494249
{
42504250
"source_path": "articles/billing-how-to-create-billing-support-ticket.md",
4251-
"redirect_url": "/azure/azure-supportability/how-to-create-azure-support-request",
4251+
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
42524252
"redirect_document_id": false
42534253
},
42544254
{
@@ -4258,7 +4258,7 @@
42584258
},
42594259
{
42604260
"source_path": "articles/billing-how-to-use-file-uploader.md",
4261-
"redirect_url": "/azure/azure-supportability/how-to-use-file-uploader",
4261+
"redirect_url": "/azure/azure-portal/supportability/how-to-use-file-uploader",
42624262
"redirect_document_id": false
42634263
},
42644264
{
@@ -17349,7 +17349,7 @@
1734917349
},
1735017350
{
1735117351
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-use-low-priority.md",
17352-
"redirect_url": "/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-use-spot",
17352+
"redirect_url": "/azure/virtual-machine-scale-sets/use-spot",
1735317353
"redirect_document_id": true
1735417354
},
1735517355
{
@@ -46619,6 +46619,16 @@
4661946619
"source_path": "articles/load-balancer/load-balancer-arm.md",
4662046620
"redirect_url": "/azure/load-balancer/load-balancer-overview",
4662146621
"redirect_document_id": true
46622+
},
46623+
{
46624+
"source_path": "articles/healthcare-apis/tutorial-2-setup-environment.md",
46625+
"redirect_url": "/azure/healthcare-apis/tutorial-web-app-fhir-server",
46626+
"redirect_document_id": false
46627+
},
46628+
{
46629+
"source_path": "articles/healthcare-apis/tutorial-3-connect-to-endpoint.md",
46630+
"redirect_url": "/azure/healthcare-apis/tutorial-web-app-fhir-server",
46631+
"redirect_document_id": false
4662246632
}
4662346633
]
4662446634
}

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
6464
For **Resource group**, select **Create new**. Enter a **Name** for the resource group that will contain the tenant, select the **Resource group location**, and then select **Create**.
6565

6666
![Link subscription settings form in Azure portal](media/tutorial-create-tenant/portal-06-link-subscription-settings.png)
67+
68+
You can link multiple Azure AD B2C tenants to a single Azure subscription for billing purposes.
6769

6870
## Select your B2C tenant directory
6971

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: overview
12-
ms.date: 10/30/2019
12+
ms.date: 01/22/2020
1313
ms.author: iainfou
1414

1515
#Customer intent: As an IT administrator or decision maker, I want to understand the differences between Active Directory Domain Services (AD DS), Azure AD, and Azure AD DS so I can choose the most appropriate identity solution for my organization.
@@ -25,8 +25,8 @@ Although the three Active Directory-based identity solutions share a common name
2525
* AD DS is a central component in many organizations with an on-premises IT environment, and provides core user account authentication and computer management features.
2626
* **Azure Active Directory (Azure AD)** - Cloud-based identity and mobile device management that provides user account and authentication services for resources such as Office 365, the Azure portal, or SaaS applications.
2727
* Azure AD can be synchronized with an on-premises AD DS environment to provide a single identity to users that works natively in the cloud.
28-
* **Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
29-
* Azure AD DS integrates with Azure AD, which itself can synchronize with an on-premises AD DS environment, to extend central identity use cases to traditional web applications that run in Azure as part of a lift-and-shift strategy.
28+
* **Azure Active Directory Domain Services (Azure AD DS)** - Provides managed domain services with a subset of fully-compatible traditional AD DS features such as domain join, group policy, LDAP, and Kerberos / NTLM authentication.
29+
* Azure AD DS integrates with Azure AD, which itself can synchronize with an on-premises AD DS environment. This ability extends central identity use cases to traditional web applications that run in Azure as part of a lift-and-shift strategy.
3030

3131
This overview article compares and contrasts how these identity solutions can work together, or would be used independently, depending on the needs of your organization.
3232

@@ -45,8 +45,8 @@ When you deploy and run a self-managed AD DS environment, you have to maintain a
4545

4646
Common deployment models for a self-managed AD DS environment that provides identity to applications and services in the cloud include the following:
4747

48-
* **Standalone cloud-only AD DS** - Azure VMs are configured as domain controllers and a separate cloud-only AD DS environment is created. This AD DS environment doesn't integrate with an on-premises AD DS environment. A different set of credentials is used to sign in to and administer VMs in the cloud.
49-
* **Resource forest deployment** - Azure VMs are configured as domain controllers and an AD DS domain as part of an existing forest is created. A trust relationship is then configured to an on-premises AD DS environment. Other Azure VMs can domain-join to this resource forest in the cloud. User authentication runs over a VPN / ExpressRoute connection to the on-premises AD DS environment.
48+
* **Standalone cloud-only AD DS** - Azure VMs are configured as domain controllers and a separate, cloud-only AD DS environment is created. This AD DS environment doesn't integrate with an on-premises AD DS environment. A different set of credentials is used to sign in and administer VMs in the cloud.
49+
* **Resource forest deployment** - Azure VMs are configured as domain controllers and an AD DS domain that's part of an existing forest is created. A trust relationship is then configured to an on-premises AD DS environment. Other Azure VMs can domain-join to this resource forest in the cloud. User authentication runs over a VPN / ExpressRoute connection to the on-premises AD DS environment.
5050
* **Extend on-premises domain to Azure** - An Azure virtual network connects to an on-premises network using a VPN / ExpressRoute connection. Azure VMs connect to this Azure virtual network, which lets them domain-join to the on-premises AD DS environment.
5151
* An alternative is to create Azure VMs and promote them as replica domain controllers from the on-premises AD DS domain. These domain controllers replicate over a VPN / ExpressRoute connection to the on-premises AD DS environment. The on-premises AD DS domain is effectively extended into Azure.
5252

@@ -64,15 +64,15 @@ The following table outlines some of the features you may need for your organiza
6464
| **Custom OU structure** | **✓** | **✓** |
6565
| **Group Policy** | **✓** | **✓** |
6666
| **Schema extensions** | **✕** | **✓** |
67-
| **AD domain / forest trusts** | **✕** | **✓** |
67+
| **AD domain / forest trusts** | **✓** (one-way outbound forest trusts only) | **✓** |
6868
| **Secure LDAP (LDAPS)** | **✓** | **✓** |
6969
| **LDAP read** | **✓** | **✓** |
7070
| **LDAP write** | **✓** (within the managed domain) | **✓** |
7171
| **Geo-distributed deployments** | **✕** | **✓** |
7272

7373
## Azure AD DS and Azure AD
7474

75-
Azure AD lets you manage the identity of devices used by the organization and control access to corporate resources from those devices. Users can also register their personal device (a bring-your-own, or BYO, model) with Azure AD, which provides the device with an identity. Azure AD then authenticates the device when a user signs in to Azure AD and uses the device to access secured resources. The device can be managed using Mobile Device Management (MDM) software like Microsoft Intune. This management ability lets you restrict access to sensitive resources to managed and policy-compliant devices.
75+
Azure AD lets you manage the identity of devices used by the organization and control access to corporate resources from those devices. Users can also register their personal device (a bring-your-own (BYO) model) with Azure AD, which provides the device with an identity. Azure AD then authenticates the device when a user signs in to Azure AD and uses the device to access secured resources. The device can be managed using Mobile Device Management (MDM) software like Microsoft Intune. This management ability lets you restrict access to sensitive resources to managed and policy-compliant devices.
7676

7777
Traditional computers and laptops can also join to Azure AD. This mechanism offers the same benefits of registering a personal device with Azure AD, such as to allow users to sign in to the device using their corporate credentials.
7878

@@ -89,8 +89,8 @@ Devices can be joined to Azure AD with or without a hybrid deployment that inclu
8989
| **Type of device** | **Device platforms** | **Mechanism** |
9090
|:----------------------------------------------------------| -------------------------------- | ---------------------- |
9191
| Personal devices | Windows 10, iOS, Android, Mac OS | Azure AD registered |
92-
| Organization owned device not joined to on-premises AD DS | Windows 10 | Azure AD joined |
93-
| Organization owned device joined to an on-premises AD DS | Windows 10 | Hybrid Azure AD joined |
92+
| Organization-owned device not joined to on-premises AD DS | Windows 10 | Azure AD joined |
93+
| Organization-owned device joined to an on-premises AD DS | Windows 10 | Hybrid Azure AD joined |
9494

9595
On an Azure AD-joined or registered device, user authentication happens using modern OAuth / OpenID Connect based protocols. These protocols are designed to work over the internet, so are great for mobile scenarios where users access corporate resources from anywhere.
9696

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 18 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,16 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 10/15/2019
11+
ms.date: 01/22/2020
1212
ms.author: iainfou
1313

1414
---
1515

1616
# Preview - Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager
1717

18-
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model.
18+
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
1919

20-
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. This feature is currently in preview.
20+
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. This migration feature is currently in preview.
2121

2222
## Overview of the migration process
2323

@@ -103,7 +103,7 @@ As you prepare and then migrate an Azure AD DS managed domain, there are some co
103103
104104
### IP addresses
105105

106-
The domain controller IP addresses for an Azure AD DS managed domain change after migration. This includes the public IP address for the secure LDAP endpoint. The new IP addresses are inside the address range for the new subnet in the Resource Manager virtual network.
106+
The domain controller IP addresses for an Azure AD DS managed domain change after migration. This change includes the public IP address for the secure LDAP endpoint. The new IP addresses are inside the address range for the new subnet in the Resource Manager virtual network.
107107

108108
In the case of rollback, the IP addresses may change after rolling back.
109109

@@ -119,13 +119,13 @@ Azure AD DS managed domains that run on Classic virtual networks don't have AD a
119119

120120
By default, 5 bad password attempts in 2 minutes lock out an account for 30 minutes.
121121

122-
A locked out account can't be signed in to, which may interfere with the ability to manage the Azure AD DS managed domain or applications managed by the account. After an Azure AD DS managed domain is migrated, accounts can experience what feels like a permanent lockout due to repeated failed attempts to sign in. Two common scenarios after migration include the following:
122+
A locked out account can't be used to sign in, which may interfere with the ability to manage the Azure AD DS managed domain or applications managed by the account. After an Azure AD DS managed domain is migrated, accounts can experience what feels like a permanent lockout due to repeated failed attempts to sign in. Two common scenarios after migration include the following:
123123

124124
* A service account that's using an expired password.
125125
* The service account repeatedly tries to sign in with an expired password, which locks out the account. To fix this, locate the application or VM with expired credentials and update the password.
126126
* A malicious entity is using brute-force attempts to sign in to accounts.
127127
* When VMs are exposed to the internet, attackers often try common username and password combinations as they attempt to sign. These repeated failed sign-in attempts can lock out the accounts. It's not recommended to use administrator accounts with generic names such as *admin* or *administrator*, for example, to minimize administrative accounts from being locked out.
128-
* Minimize the number of VMs that are exposed to the internet. You can use [Azure Bastion (currently in preview)][azure-bastion] to securely connect to VMs using the Azure portal.
128+
* Minimize the number of VMs that are exposed to the internet. You can use [Azure Bastion][azure-bastion] to securely connect to VMs using the Azure portal.
129129

130130
If you suspect that some accounts may be locked out after migration, the final migration steps outline how to enable auditing or change the fine-grained password policy settings.
131131

@@ -161,11 +161,11 @@ The migration to the Resource Manager deployment model and virtual network is sp
161161
162162
## Update and verify virtual network settings
163163

164-
Before you begin the migration, complete the following initial checks and updates. These steps can happen at any time before the migration and don't affect the operation of the Azure AD DS managed domain.
164+
Before you begin the migration process, complete the following initial checks and updates. These steps can happen at any time before the migration and don't affect the operation of the Azure AD DS managed domain.
165165

166166
1. Update your local Azure PowerShell environment to the latest version. To complete the migration steps, you need at least version *2.3.2*.
167167

168-
For information on how to check and update, see [Azure PowerShell overview][azure-powershell].
168+
For information on how to check and update your PowerShell version, see [Azure PowerShell overview][azure-powershell].
169169

170170
1. Create, or choose an existing, Resource Manager virtual network.
171171

@@ -207,7 +207,8 @@ To prepare the Azure AD DS managed domain for migration, complete the following
207207
208208
```powershell
209209
Migrate-Aadds `
210-
-Prepare -ManagedDomainFqdn contoso.com `
210+
-Prepare `
211+
-ManagedDomainFqdn contoso.com `
211212
-Credentials $creds​
212213
```
213214
@@ -270,27 +271,27 @@ The second domain controller should be available 1-2 hours after the migration c
270271

271272
When the migration process is successfully complete, some optional configuration steps include enabling audit logs or e-mail notifications, or updating the fine-grained password policy.
272273

273-
#### Subscribe to audit logs using Azure Monitor
274+
### Subscribe to audit logs using Azure Monitor
274275

275276
Azure AD DS exposes audit logs to help troubleshoot and view events on the domain controllers. For more information, see [Enable and use audit logs][security-audits].
276277

277278
You can use templates to monitor important information exposed in the logs. For example, the audit log workbook template can monitor possible account lockouts on the Azure AD DS managed domain.
278279

279-
#### Configure Azure AD Domain Services email notifications
280+
### Configure Azure AD Domain Services email notifications
280281

281282
To be notified when a problem is detected on the Azure AD DS managed domain, update the email notification settings in the Azure portal. For more information, see [Configure notification settings][notifications].
282283

283-
#### Update fine-grained password policy
284+
### Update fine-grained password policy
284285

285286
If needed, you can update the fine-grained password policy to be less restrictive than the default configuration. You can use the audit logs to determine if a less restrictive setting makes sense, then configure the policy as needed. Use the following high-level steps to review and update the policy settings for accounts that are repeatedly locked out after migration:
286287

287288
1. [Configure password policy][password-policy] for fewer restrictions on the Azure AD DS managed domain and observe the events in the audit logs.
288289
1. If any service accounts are using expired passwords as identified in the audit logs, update those accounts with the correct password.
289-
1. If VM is exposed to the internet, review for generic account names like *administrator*, *user*, or *guest* with high sign-in attempts. Where possible, update those VMs to use less generically named accounts.
290-
1. Use a network trace on the VM to locate the source of the attacks and block those IP addresses for being able to attempt sign-ins.
290+
1. If a VM is exposed to the internet, review for generic account names like *administrator*, *user*, or *guest* with high sign-in attempts. Where possible, update those VMs to use less generically named accounts.
291+
1. Use a network trace on the VM to locate the source of the attacks and block those IP addresses from being able to attempt sign-ins.
291292
1. When there are minimal lockout issues, update the fine-grained password policy to be as restrictive as necessary.
292293

293-
#### Creating a network security group
294+
### Creating a network security group
294295

295296
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain, and isn't automatically created. To create the network security group and open the required ports, review the following steps:
296297

@@ -299,6 +300,8 @@ Azure AD DS needs a network security group to secure the ports needed for the ma
299300

300301
## Roll back and restore from migration
301302

303+
Up to a certain point in the migration process, you can choose to roll back or restore the Azure AD DS managed domain.
304+
302305
### Roll back
303306

304307
If there's an error when you run the PowerShell cmdlet to prepare for migration in step 2 or for the migration itself in step 3, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.

0 commit comments

Comments
 (0)