Skip to content

Commit 8a1c7f5

Browse files
authored
Merge pull request #113223 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 595f0fb + 62ce503 commit 8a1c7f5

11 files changed

+34
-24
lines changed

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,6 @@ This setting applies to the following iOS and Android apps:
8080
- Microsoft Kaizala
8181
- Microsoft Launcher
8282
- Microsoft Office
83-
- Microsoft Office Hub
8483
- Microsoft OneDrive
8584
- Microsoft OneNote
8685
- Microsoft Outlook

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-kcd.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,11 +97,13 @@ The Active Directory configuration varies, depending on whether your Application
9797

9898
## SSO for non-Windows apps
9999

100-
The Kerberos delegation flow in Azure AD Application Proxy starts when Azure AD authenticates the user in the cloud. Once the request arrives on-premises, the Azure AD Application Proxy connector issues a Kerberos ticket on behalf of the user by interacting with the local Active Directory. This process is referred to as Kerberos Constrained Delegation (KCD). In the next phase, a request is sent to the backend application with this Kerberos ticket.
100+
The Kerberos delegation flow in Azure AD Application Proxy starts when Azure AD authenticates the user in the cloud. Once the request arrives on-premises, the Azure AD Application Proxy connector issues a Kerberos ticket on behalf of the user by interacting with the local Active Directory. This process is referred to as Kerberos Constrained Delegation (KCD).
101101

102-
There are several protocols that define how to send such requests. Most non-Windows servers expect to negotiate with SPNEGO. This protocol is supported on Azure AD Application Proxy, but is disabled by default. A server can be configured for SPNEGO or standard KCD, but not both.
102+
In the next phase, a request is sent to the backend application with this Kerberos ticket.
103103

104-
If you configure a connector machine for SPNEGO, make sure that all other connectors in that Connector group are also configured with SPNEGO. Applications expecting standard KCD should be routed through other connectors that are not configured for SPNEGO.
104+
There are several mechanisms that define how to send the Kerberos ticket in such requests. Most non-Windows servers expect to receive it in form of SPNEGO token. This mechanism is supported on Azure AD Application Proxy, but is disabled by default. A connector can be configured for SPNEGO or standard Kerberos token, but not both.
105+
106+
If you configure a connector machine for SPNEGO, make sure that all other connectors in that Connector group are also configured with SPNEGO. Applications expecting standard Kerberos token should be routed through other connectors that are not configured for SPNEGO.
105107

106108

107109
To enable SPNEGO:

articles/active-directory/manage-apps/application-proxy-connectors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ For more information about optimizing your network, see [Network topology consid
131131
132132
Connectors can run on a machine that is not domain-joined. However, if you want single sign-on (SSO) to applications that use Integrated Windows Authentication (IWA), you need a domain-joined machine. In this case, the connector machines must be joined to a domain that can perform [Kerberos](https://web.mit.edu/kerberos) Constrained Delegation on behalf of the users for the published applications.
133133
134-
Connectors can also be joined to domains or forests that have a partial trust, or to read-only domain controllers.
134+
Connectors can also be joined to domains in forests that have a partial trust, or to read-only domain controllers.
135135
136136
## Connector deployments on hardened environments
137137

articles/active-directory/manage-apps/application-proxy-faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,10 @@ If the connector servers and the web application service account are in the same
9292
If the connector servers and the web application service account are in different domains, Resource-based delegation is used. The delegation permissions are configured on the target web server and web application service account. This method of Constrained Delegation is relatively new. The method was introduced in Windows Server 2012, which supports cross-domain delegation by allowing the resource (web service) owner to control which machine and service accounts can delegate to it. There's no UI to assist with this configuration, so you'll need to use PowerShell.
9393
For more information, see the whitepaper [Understanding Kerberos Constrained Delegation with Application Proxy](https://aka.ms/kcdpaper).
9494

95+
### Does NTLM authentication work with Azure AD Application Proxy?
96+
97+
NTLM authentication can’t be used as a pre-authentication or single sign-on method. NTLM authentication can be used only when it can be negotiated directly between the client and the published web application. Using NTLM authentication usually causes a sign-in prompt to appear in the browser.
98+
9599
## Pass-through authentication
96100

97101
### Can I use Conditional Access Policies for applications published with pass-through authentication?

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-cosmos-db.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Tutorial`:` Use a managed identity to access Azure Cosmos DB - Windows - Azure AD
2+
title: 'Tutorial: Use a managed identity to access Azure Cosmos DB - Windows - Azure AD'
33
description: A tutorial that walks you through the process of using a system-assigned managed identity on a Windows VM, to access Azure Cosmos DB.
44
services: active-directory
55
documentationcenter: ''

articles/azure-monitor/insights/vminsights-enable-at-scale-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ provisioningState : Succeeded
166166

167167
## Enable with PowerShell
168168

169-
To enable Azure Monitor for VMs for multiple VMs or virtual machine scale sets, use the PowerShell script [Install-VMInsights.ps1](https://www.powershellgallery.com/packages/Install-VMInsights/1.0). It's available from the Azure PowerShell Gallery. This script iterates through:
169+
To enable Azure Monitor for VMs for multiple VMs or virtual machine scale sets, use the PowerShell script [Install-VMInsights.ps1](https://www.powershellgallery.com/packages/Install-VMInsights). It's available from the Azure PowerShell Gallery. This script iterates through:
170170

171171
- Every virtual machine and virtual machine scale set in your subscription.
172172
- The scoped resource group that's specified by *ResourceGroup*.

articles/azure-monitor/insights/vminsights-ga-release-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Set-AzureRmOperationalInsightsIntelligencePack -ResourceGroupName <resource-grou
4040

4141
## What should I do about the Performance counters in my workspace if I install the VMInsights solution?
4242

43-
The previous method of enabling Azure Monitor for VMs used performance counters in your workspace. The current version stores this data in a table named `InsightsMetrics`. You may choose to disable these performance countersin your workspace if you no longer need to use them.
43+
The previous method of enabling Azure Monitor for VMs used performance counters in your workspace. The current version stores this data in a table named `InsightsMetrics`. You may choose to disable these performance counters in your workspace if you no longer need to use them.
4444

4545
>[!NOTE]
4646
>If you have Alert Rules that reference these counters in the `Perf` table, you need to update them to reference new data stored in the `InsightsMetrics` table. Refer to our documentation for example log queries that you can use that refer to this table.

articles/migrate/tutorial-migrate-hyper-v.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Before you begin this tutorial, you should:
3333
1. [Review](hyper-v-migration-architecture.md) the Hyper-V migration architecture.
3434
2. [Review](migrate-support-matrix-hyper-v-migration.md#hyper-v-hosts) Hyper-V host requirements, and the Azure URLs that the Hyper-V hosts need to access.
3535
3. [Review](migrate-support-matrix-hyper-v-migration.md#hyper-v-vms) requirements for Hyper-V VMs that you want to migrate. Hyper-V VMs must conform with [Azure VM requirements](migrate-support-matrix-hyper-v-migration.md#azure-vm-requirements).
36-
2. We recommend that you complete the previous tutorials in this series. The [first tutorial](tutorial-prepare-hyper-v.md) shows you how to set up Azure and Hyper-V for migration. The second tutorial shows you how to [assess Hyper-V VMs](tutorial-assess-hyper-v.md before migration, using Azure Migrate:Server Assessment.
36+
2. We recommend that you complete the previous tutorials in this series. The [first tutorial](tutorial-prepare-hyper-v.md) shows you how to set up Azure and Hyper-V for migration. The second tutorial shows you how to [assess Hyper-V VMs](tutorial-assess-hyper-v.md) before migration, using Azure Migrate:Server Assessment.
3737
> [!NOTE]
3838
> Although we recommend that you try out an assessment, you don't have to run an assessment before you migrate VMs.
3939
> For migrating Hyper-V VMs, Azure Migrate:Server Migration runs software agents (Microsoft Azure Site Recovery provider and Microsoft Azure Recovery Service agent) on Hyper-V Hosts or cluster nodes, to orchestrate and replicate data to Azure Migrate. The [Azure Migrate appliance](migrate-appliance.md) isn't used for Hyper-V migration.

articles/private-link/create-private-endpoint-powershell.md

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ $subnet = $virtualNetwork `
133133
$privateEndpoint = New-AzPrivateEndpoint -ResourceGroupName "myResourceGroup" `
134134
-Name "myPrivateEndpoint" `
135135
-Location "westcentralus" `
136-
-Subnet $subnet`
136+
-Subnet $subnet `
137137
-PrivateLinkServiceConnection $privateEndpointConnection
138138
```
139139

@@ -194,9 +194,10 @@ mstsc /v:<publicIpAddress>
194194
## Access SQL Database Server privately from the VM
195195

196196
1. In the Remote Desktop of myVM, open PowerShell.
197-
2. Enter `nslookup myserver.database.windows.net`.
197+
2. Enter `nslookup myserver.database.windows.net`. Remember to replace `myserver` with your SQL server name.
198198

199199
You'll receive a message similar to this:
200+
200201
```azurepowershell
201202
Server: UnKnown
202203
Address: 168.63.129.16
@@ -205,17 +206,21 @@ mstsc /v:<publicIpAddress>
205206
Address: 10.0.0.5
206207
Aliases: myserver.database.windows.net
207208
```
208-
3. Install SQL Server Management Studio
209-
4. In Connect to server, enter or select this information:
210-
Setting Value
211-
Server type Select Database Engine.
212-
Server name Select myserver.database.windows.net
213-
Username Enter a username provided during creation.
214-
Password Enter a password provided during creation.
215-
Remember password Select Yes.
216-
5. Select Connect.
217-
6. Browse Databases from left menu.
218-
7. (Optionally) Create or query information from mydatabase
209+
210+
3. Install SQL Server Management Studio.
211+
4. In **Connect to server**, enter or select this information:
212+
213+
| Setting | Value |
214+
| --- | --- |
215+
| Server type | Database Engine |
216+
| Server name | myserver.database.windows.net |
217+
| Username | Enter the username provided during creation |
218+
| Password | Enter the password provided during creation |
219+
| Remember Password | Yes |
220+
221+
5. Select **Connect**.
222+
6. Browse **Databases** from the left menu.
223+
7. (Optionally) Create or query information from mydatabase.
219224
8. Close the remote desktop connection to *myVM*.
220225
221226
## Clean up resources

articles/storage/blobs/data-lake-storage-query-acceleration-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -362,6 +362,6 @@ static void QueryMysteryBooks(BlobClient blobClient)
362362

363363
## Next steps
364364

365-
- [Query acceleration enrollment form](https://aka.ms/adls/queryaccelerationpreview)
365+
- [Query acceleration enrollment form](https://aka.ms/adls/qa-preview-signup)
366366
- [Azure Data Lake Storage query acceleration (preview)](data-lake-storage-query-acceleration.md)
367367
- [Query acceleration SQL language reference (preview)](query-acceleration-sql-reference.md)

0 commit comments

Comments
 (0)