You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -71,13 +71,13 @@ If you're not going to continue to use this application, you can delete the tena
71
71
- Ensure that you're signed in to the directory that you want to delete through the **Directory + subscription** filter in the Azure portal. Switch to the target directory if needed.
72
72
- Select **Azure Active Directory**, and then on the **Contoso - Overview** page, select **Delete directory**.
73
73
74
-
The tenant and its associated information is deleted.
74
+
The tenant and its associated information are deleted.
75
75
76
76

77
77
78
78
## Next steps
79
79
80
-
- Change or add additional domain names, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md)
80
+
- Change or add other domain names, see [How to add a custom domain name to Azure Active Directory](add-custom-domain.md)
81
81
82
82
- Add users, see [Add or delete a new user](add-users-azure-active-directory.md)
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-accessmanagement-managing-group-owners.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,22 +3,23 @@ title: Add or remove group owners - Azure Active Directory | Microsoft Docs
3
3
description: Instructions about how to add or remove group owners using Azure Active Directory.
4
4
services: active-directory
5
5
author: barclayn
6
-
manager: rkarlin
6
+
manager: amycolannino
7
7
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.subservice: fundamentals
11
11
ms.topic: how-to
12
-
ms.date: 09/11/2018
12
+
ms.date: 08/17/2022
13
13
ms.author: barclayn
14
14
ms.custom: "it-pro, seodec18"
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
18
18
# Add or remove group owners in Azure Active Directory
19
+
19
20
Azure Active Directory (Azure AD) groups are owned and managed by group owners. Group owners can be users or service principals, and are able to manage the group including membership. Only existing group owners or group-managing administrators can assign group owners. Group owners aren't required to be members of the group.
20
21
21
-
When a group has no owner, group-managing administrators are still able to manage the group. It is recommended for every group to have at least one owner. Once owners are assigned to a group, the last owner of the group cannot be removed. Please make sure to select another owner before removing the last owner from the group.
22
+
When a group has no owner, group-managing administrators are still able to manage the group. It is recommended for every group to have at least one owner. Once owners are assigned to a group, the last owner of the group can't be removed. Make sure to select another owner before removing the last owner from the group.
22
23
23
24
## Add an owner to a group
24
25
Below are instructions for adding a user as an owner to a group using the Azure AD portal. To add a service principal as an owner of a group, follow the instructions to do so using [PowerShell](/powershell/module/Azuread/Add-AzureADGroupOwner).
@@ -54,7 +55,7 @@ Remove an owner from a group using Azure AD.
54
55
55
56

56
57
57
-
After you remove the owner, you can return to the **Owners** page and see the name has been removed from the list of owners.
58
+
After you remove the owner, you can return to the **Owners** page, and see the name has been removed from the list of owners.
58
59
59
60
## Next steps
60
61
-[Managing access to resources with Azure Active Directory groups](active-directory-manage-groups.md)
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-architecture.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,13 +3,13 @@ title: Architecture overview - Azure Active Directory | Microsoft Docs
3
3
description: Learn what an Azure Active Directory tenant is and how to manage Azure using Azure Active Directory.
4
4
services: active-directory
5
5
author: barclayn
6
-
manager: rkarlin
6
+
manager: amycolannino
7
7
8
8
ms.service: active-directory
9
9
ms.subservice: fundamentals
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 07/08/2022
12
+
ms.date: 08/17/2022
13
13
ms.author: barclayn
14
14
ms.reviewer: jeffsta
15
15
ms.custom: "it-pro, seodec18"
@@ -55,7 +55,7 @@ All directory *reads* are serviced from *secondary replicas*, which are at datac
55
55
56
56
Scalability is the ability of a service to expand to meet increasing performance demands. Write scalability is achieved by partitioning the data. Read scalability is achieved by replicating data from one partition to multiple secondary replicas distributed throughout the world.
57
57
58
-
Requests from directory applications are routed to the datacenter that they are physically closest to. Writes are transparently redirected to the primary replica to provide read-write consistency. Secondary replicas significantly extend the scale of partitions because the directories are typically serving reads most of the time.
58
+
Requests from directory applications are routed to the closest datacenter. Writes are transparently redirected to the primary replica to provide read-write consistency. Secondary replicas significantly extend the scale of partitions because the directories are typically serving reads most of the time.
59
59
60
60
Directory applications connect to the nearest datacenters. This connection improves performance, and therefore scaling out is possible. Since a directory partition can have many secondary replicas, secondary replicas can be placed closer to the directory clients. Only internal directory service components that are write-intensive target the active primary replica directly.
61
61
@@ -67,13 +67,13 @@ Azure AD’s partition design is simplified compared to the enterprise AD design
67
67
68
68
#### Fault tolerance
69
69
70
-
A system is more available if it is tolerant to hardware, network, and software failures. For each partition on the directory, a highly available master replica exists: The primary replica. Only writes to the partition are performed at this replica. This replica is being continuously and closely monitored, and writes can be immediately shifted to another replica (which becomes the new primary) if a failure is detected. During failover, there could be a loss of write availability typically of 1-2 minutes. Read availability is not affected during this time.
70
+
A system is more available if it is tolerant to hardware, network, and software failures. For each partition on the directory, a highly available master replica exists: The primary replica. Only writes to the partition are performed at this replica. This replica is being continuously and closely monitored, and writes can be immediately shifted to another replica (which becomes the new primary) if a failure is detected. During failover, there could be a loss of write availability typically of 1-2 minutes. Read availability isn't affected during this time.
71
71
72
72
Read operations (which outnumber writes by many orders of magnitude) only go to secondary replicas. Since secondary replicas are idempotent, loss of any one replica in a given partition is easily compensated by directing the reads to another replica, usually in the same datacenter.
73
73
74
74
#### Data durability
75
75
76
-
A write is durably committed to at least two datacenters prior to it being acknowledged. This happens by first committing the write on the primary, and then immediately replicating the write to at least one other datacenter. This write action ensures that a potential catastrophic loss of the datacenter hosting the primary does not result in data loss.
76
+
A write is durably committed to at least two datacenters prior to it being acknowledged. This happens by first committing the write on the primary, and then immediately replicating the write to at least one other datacenter. This write action ensures that a potential catastrophic loss of the datacenter hosting the primary doesn't result in data loss.
77
77
78
78
Azure AD maintains a zero [Recovery Time Objective (RTO)](https://en.wikipedia.org/wiki/Recovery_time_objective) to not lose data on failovers. This includes:
79
79
@@ -87,35 +87,35 @@ Azure AD’s replicas are stored in datacenters located throughout the world. Fo
87
87
Azure AD operates across datacenters with the following characteristics:
88
88
89
89
* Authentication, Graph, and other AD services reside behind the Gateway service. The Gateway manages load balancing of these services. It will fail over automatically if any unhealthy servers are detected using transactional health probes. Based on these health probes, the Gateway dynamically routes traffic to healthy datacenters.
90
-
* For *reads*, the directory has secondary replicas and corresponding front-end services in an active-active configuration operating in multiple datacenters. In case of a failure of an entire datacenter, traffic will be automatically routed to a different datacenter.
91
-
* For *writes*, the directory will fail over primary (master) replica across datacenters via planned (new primary is synchronized to old primary) or emergency failover procedures. Data durability is achieved by replicating any commit to at least two datacenters.
90
+
* For *reads*, the directory has secondary replicas and corresponding front-end services in an active-active configuration operating in multiple datacenters. If a datacenter fails, traffic is automatically routed to a different datacenter.
91
+
* For *writes*, the directory will fail over the primary replica across datacenters via planned (new primary is synchronized to old primary) or emergency failover procedures. Data durability is achieved by replicating any commit to at least two datacenters.
92
92
93
93
#### Data consistency
94
94
95
95
The directory model is one of eventual consistencies. One typical problem with distributed asynchronously replicating systems is that the data returned from a “particular” replica may not be up-to-date.
96
96
97
97
Azure AD provides read-write consistency for applications targeting a secondary replica by routing its writes to the primary replica, and synchronously pulling the writes back to the secondary replica.
98
98
99
-
Application writes using the Microsoft Graph API of Azure AD are abstracted from maintaining affinity to a directory replica for read-write consistency. The Microsoft Graph API service maintains a logical session, which has affinity to a secondary replica used for reads; affinity is captured in a “replica token” that the service caches using a distributed cache in the secondary replica datacenter. This token is then used for subsequent operations in the same logical session. To continue using the same logical session, subsequent requests must be routed to the same Azure AD datacenter. It is not possible to continue a logical session if the directory client requests are being routed to multiple Azure AD datacenters; if this happens then the client has multiple logical sessions which have independent read-write consistencies.
99
+
Application writes using the Microsoft Graph API of Azure AD are abstracted from maintaining affinity to a directory replica for read-write consistency. The Microsoft Graph API service maintains a logical session, which has affinity to a secondary replica used for reads; affinity is captured in a “replica token” that the service caches using a distributed cache in the secondary replica datacenter. This token is then used for subsequent operations in the same logical session. To continue using the same logical session, subsequent requests must be routed to the same Azure AD datacenter. It isn't possible to continue a logical session if the directory client requests are being routed to multiple Azure AD datacenters; if this happens then the client has multiple logical sessions that have independent read-write consistencies.
100
100
101
101
>[!NOTE]
102
102
>Writes are immediately replicated to the secondary replica to which the logical session's reads were issued.
103
103
104
104
#### Service-level backup
105
105
106
-
Azure AD implements daily backup of directory data and can use these backups to restore data in case of any service-wide issue.
106
+
Azure AD implements daily backup of directory data and can use these backups to restore data if there is any service-wide issue.
107
107
108
108
The directory also implements soft deletes instead of hard deletes for selected object types. The tenant administrator can undo any accidental deletions of these objects within 30 days. For more information, see the [API to restore deleted objects](/graph/api/directory-deleteditems-restore).
109
109
110
110
#### Metrics and monitors
111
111
112
112
Running a high availability service requires world-class metrics and monitoring capabilities. Azure AD continually analyzes and reports key service health metrics and success criteria for each of its services. There is also continuous development and tuning of metrics and monitoring and alerting for each scenario, within each Azure AD service and across all services.
113
113
114
-
If any Azure AD service is not working as expected, action is immediately taken to restore functionality as quickly as possible. The most important metric Azure AD tracks is how quickly live site issues can be detected and mitigated for customers. We invest heavily in monitoring and alerts to minimize time to detect (TTD Target: <5 minutes) and operational readiness to minimize time to mitigate (TTM Target: <30 minutes).
114
+
If any Azure AD service isn't working as expected, action is immediately taken to restore functionality as quickly as possible. The most important metric Azure AD tracks is how quickly live site issues can be detected and mitigated for customers. We invest heavily in monitoring and alerts to minimize time to detect (TTD Target: <5 minutes) and operational readiness to minimize time to mitigate (TTM Target: <30 minutes).
115
115
116
116
#### Secure operations
117
117
118
-
Using operational controls such as multi-factor authentication (MFA) for any operation, as well as auditing of all operations. In addition, using a just-in-time elevation system to grant necessary temporary access for any operational task-on-demand on an ongoing basis. For more information, see [The Trusted Cloud](https://azure.microsoft.com/support/trust-center).
118
+
Using operational controls such as multi-factor authentication (MFA) for any operation, and auditing of all operations. In addition, using a just-in-time elevation system to grant necessary temporary access for any operational task-on-demand on an ongoing basis. For more information, see [The Trusted Cloud](https://azure.microsoft.com/support/trust-center).
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-data-storage-australia-newzealand.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,27 +3,27 @@ title: Customer data storage for Australian and New Zealand customers - Azure AD
3
3
description: Learn about where Azure Active Directory stores customer-related data for its Australian and New Zealand customers.
4
4
services: active-directory
5
5
author: barclayn
6
-
manager: rkarlin
6
+
manager: amycolannino
7
7
ms.author: barclayn
8
8
9
9
ms.service: active-directory
10
10
ms.subservice: fundamentals
11
11
ms.workload: identity
12
12
ms.topic: conceptual
13
-
ms.date: 01/12/2022
13
+
ms.date: 08/17/2022
14
14
ms.custom: "it-pro, seodec18, references_regions"
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
18
18
# Customer Data storage for Australian and New Zealand customers in Azure Active Directory
19
19
20
-
Azure Active Directory (Azure AD) stores its Customer Data in a geographical location based on the country you provided when you signed up for a Microsoft Online service. Microsoft Online services include Microsoft 365 and Azure.
20
+
Azure AD stores identity data in a location chosen based on the address provided by your organization when subscribing to a Microsoft service like Microsoft 365 or Azure. Microsoft Online services include Microsoft 365 and Azure.
21
21
22
22
For information about where Azure AD and other Microsoft services' data is located, see the [Where your data is located](https://www.microsoft.com/trust-center/privacy/data-location) section of the Microsoft Trust Center.
23
23
24
24
From February 26, 2020, Microsoft began storing Azure AD’s Customer Data for new tenants with an Australian or New Zealand billing address within the Australian datacenters.
25
25
26
-
Additionally, certain Azure AD features do not yet support storage of Customer Data in Australia. Please go to the [Azure AD data map](https://msit.powerbi.com/view?r=eyJrIjoiYzEyZTc5OTgtNTdlZS00ZTVkLWExN2ItOTM0OWU4NjljOGVjIiwidCI6IjcyZjk4OGJmLTg2ZjEtNDFhZi05MWFiLTJkN2NkMDExZGI0NyIsImMiOjV9), for specific feature information. For example, Microsoft Azure AD Multi-Factor Authentication stores Customer Data in the US and processes it globally. See [Data residency and customer data for Azure AD Multi-Factor Authentication](../authentication/concept-mfa-data-residency.md).
26
+
Additionally, certain Azure AD features don't yet support storage of Customer Data in Australia. Go to the [Azure AD data map](https://msit.powerbi.com/view?r=eyJrIjoiYzEyZTc5OTgtNTdlZS00ZTVkLWExN2ItOTM0OWU4NjljOGVjIiwidCI6IjcyZjk4OGJmLTg2ZjEtNDFhZi05MWFiLTJkN2NkMDExZGI0NyIsImMiOjV9), for specific feature information. For example, Microsoft Azure AD Multi-Factor Authentication stores Customer Data in the US and processes it globally. See [Data residency and customer data for Azure AD Multi-Factor Authentication](../authentication/concept-mfa-data-residency.md).
27
27
28
28
> [!NOTE]
29
29
> Microsoft products, services, and third-party applications that integrate with Azure AD have access to Customer Data. Evaluate each product, service, and application you use to determine how Customer Data is processed by that specific product, service, and application, and whether they meet your company's data storage requirements. For more information about Microsoft services' data residency, see the [Where your data is located](https://www.microsoft.com/trust-center/privacy/data-location) section of the Microsoft Trust Center.
0 commit comments