Skip to content

Commit 8bd8551

Browse files
authored
Merge pull request #98170 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents 2179823 + 2cc3c64 commit 8bd8551

File tree

246 files changed

+1804
-1547
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

246 files changed

+1804
-1547
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -567,6 +567,11 @@
567567
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
568568
"redirect_document_id": false
569569
},
570+
{
571+
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-primary-and-secondary-data.md",
572+
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",
573+
"redirect_document_id": false
574+
},
570575
{
571576
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-list-entity.md",
572577
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-list-entity",
@@ -10032,6 +10037,11 @@
1003210037
"redirect_url": "/azure-stack/user/azure-stack-vpn-gateway-about-vpn-gateways",
1003310038
"redirect_document_id": false
1003410039
},
10040+
{
10041+
"source_path": "articles/virtual-wan/virtual-wan-office365-overview.md",
10042+
"redirect_url": "/azure/virtual-wan/virtual-wan-about",
10043+
"redirect_document_id": false
10044+
},
1003510045
{
1003610046
"source_path": "articles/azure-stack/azure-stack-vpn-gateway-settings.md",
1003710047
"redirect_url": "/azure-stack/user/azure-stack-vpn-gateway-settings",

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -303,13 +303,14 @@ Azure AD DS needs a network security group to secure the ports needed for the ma
303303

304304
If there's an error when you run the PowerShell cmdlet to prepare for migration in step 2 or for the migration itself in step 3, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
305305

306-
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*:
306+
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*, and the Classic virtual network name, such as *myClassicVnet*:
307307

308308
```powershell
309309
Migrate-Aadds `
310310
-Abort `
311311
-ManagedDomainFqdn contoso.com `
312-
-Credentials $creds​
312+
-ClassicVirtualNetworkName myClassicVnet `
313+
-Credentials $creds
313314
```
314315

315316
### Restore
@@ -357,4 +358,4 @@ With your Azure AD DS managed domain migrated to the Resource Manager deployment
357358
[get-credential]: /powershell/module/microsoft.powershell.security/get-credential
358359

359360
<!-- EXTERNAL LINKS -->
360-
[powershell-script]: https://www.powershellgallery.com/packages/Migrate-Aadds/1.0
361+
[powershell-script]: https://www.powershellgallery.com/packages/Migrate-Aadds/

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,8 +64,6 @@
6464
href: howto-conditional-access-policy-compliant-device.md
6565
- name: Block legacy authentication
6666
href: block-legacy-authentication.md
67-
- name: Conditional Access for MFA registration
68-
href: ../authentication/howto-registration-mfa-sspr-combined.md#conditional-access-policies-for-combined-registration
6967
- name: Require approved client apps
7068
href: app-based-conditional-access.md
7169
- name: Require app protection policy

articles/active-directory/conditional-access/howto-conditional-access-policy-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Conditional Access: Require trusted location for MFA registration
1919

20-
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This preview feature is available to organizations who have enabled the [combined registration preview](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want users to register for Azure Multi-Factor Authentication and SSPR from a central location such as a trusted network location during HR onboarding. For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
20+
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This preview feature is available to organizations who have enabled the [combined registration preview](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want to use conditions like trusted network location to restrict access to register for Azure Multi-Factor Authentication and SSPR. For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
2121

2222
## Create a policy to require registration from a trusted location
2323

articles/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,11 @@ Before configuring device identities in Azure AD for your VDI environment, famil
4343
| Device identity type | Identity infrastructure | Windows devices | VDI platform version | Supported |
4444
| --- | --- | --- | --- | --- |
4545
| Hybrid Azure AD joined | Federated* | Windows current*** and Windows down-level**** | Persistent | Yes |
46-
| | | | Non-Persistent | Yes |
47-
| | Managed** | Windows current and Windows down-level | Persistent | Yes |
46+
| | | Windows current | Non-Persistent | No |
4847
| | | Windows down-level | Non-Persistent | Yes |
48+
| | Managed** | Windows current and Windows down-level | Persistent | Yes |
4949
| | | Windows current | Non-Persistent | No |
50+
| | | Windows down-level | Non-Persistent | Yes |
5051
| Azure AD joined | Federated | Windows current | Persistent | No |
5152
| | | | Non-Persistent | No |
5253
| | Managed | Windows current | Persistent | No |
@@ -79,7 +80,6 @@ When deploying non-persistent VDI, IT administrators should pay close attention
7980

8081
- Create and use a prefix for the display name of the computer that indicates the desktop as VDI-based.
8182
- Implement the following commands as part of logoff script. These commands will trigger a best effort call to Azure AD to delete the device.
82-
- For Windows current devices – dsregcmd.exe /leave
8383
- For Windows down-level devices – autoworkplace.exe /leave
8484
- Define and implement process for [managing stale devices](manage-stale-devices.md).
8585
- Once you have a strategy to identify your non-persistent Hybrid Azure AD joined devices, you can be more aggressive on the clean-up of these devices to ensure your directory does not get consumed with lots of stale devices.

articles/active-directory/hybrid/how-to-connect-sync-feature-directory-extensions.md

Lines changed: 35 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,17 +13,19 @@ ms.devlang: na
1313
ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 10/05/2018
16+
ms.date: 11/12/2019
1717
ms.subservice: hybrid
1818
ms.author: billmath
1919

2020
ms.collection: M365-identity-device-management
2121
---
2222
# Azure AD Connect sync: Directory extensions
23-
You can use directory extensions to extend the schema in Azure Active Directory (Azure AD) with your own attributes from on-premises Active Directory. This feature enables you to build LOB apps by consuming attributes that you continue to manage on-premises. These attributes can be consumed through [Azure AD Graph API directory extensions](https://msdn.microsoft.com/Library/Azure/Ad/Graph/howto/azure-ad-graph-api-directory-schema-extensions) or [Microsoft Graph](https://developer.microsoft.com/graph/). You can see the available attributes by using [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net/) and [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), respectively.
23+
You can use directory extensions to extend the schema in Azure Active Directory (Azure AD) with your own attributes from on-premises Active Directory. This feature enables you to build LOB apps by consuming attributes that you continue to manage on-premises. These attributes can be consumed through [Azure AD Graph API directory extensions](https://msdn.microsoft.com/Library/Azure/Ad/Graph/howto/azure-ad-graph-api-directory-schema-extensions) or [Microsoft Graph](https://developer.microsoft.com/graph/). You can see the available attributes by using [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net/) and [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), respectively. You can also use this feature to create dynamic groups in Azure AD.
2424

2525
At present, no Office 365 workload consumes these attributes.
2626

27+
## Customize which attributes to synchronize with Azure AD
28+
2729
You configure which additional attributes you want to synchronize in the custom settings path in the installation wizard.
2830

2931
>[!NOTE]
@@ -45,11 +47,17 @@ The list of attributes is read from the schema cache that's created during insta
4547

4648
An object in Azure AD can have up to 100 attributes for directory extensions. The maximum length is 250 characters. If an attribute value is longer, the sync engine truncates it.
4749

48-
During installation of Azure AD Connect, an application is registered where these attributes are available. You can see this application in the Azure portal.
50+
## Configuration changes in Azure AD made by the wizard
51+
52+
During installation of Azure AD Connect, an application is registered where these attributes are available. You can see this application in the Azure portal. Its name is always **Tenant Schema Extension App**.
4953

5054
![Schema extension app](./media/how-to-connect-sync-feature-directory-extensions/extension3new.png)
5155

52-
The attributes are prefixed with the extension \_{AppClientId}\_. AppClientId has the same value for all attributes in your Azure AD tenant.
56+
Make sure you select **All applications** to see this app.
57+
58+
The attributes are prefixed with **extension \_{ApplicationId}\_**. ApplicationId has the same value for all attributes in your Azure AD tenant. You will need this value for all other scenarios in this topic.
59+
60+
## Viewing attributes using Graph
5361

5462
These attributes are now available through the Azure AD Graph API. You can query them by using [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net/).
5563

@@ -58,10 +66,32 @@ These attributes are now available through the Azure AD Graph API. You can query
5866
Or you can query the attributes through the Microsoft Graph API, by using [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer#).
5967

6068
>[!NOTE]
61-
> You need to ask for the attributes to be returned. Explicitly select the attributes like this: https\://graph.microsoft.com/beta/users/abbie.[email protected]?$select=extension_9d98ed114c4840d298fad781915f27e4_employeeID,extension_9d98ed114c4840d298fad781915f27e4_division.
69+
> In Microsoft Graph, you need to ask for the attributes to be returned. Explicitly select the attributes like this: https\://graph.microsoft.com/beta/users/abbie.[email protected]?$select=extension_9d98ed114c4840d298fad781915f27e4_employeeID,extension_9d98ed114c4840d298fad781915f27e4_division.
6270
>
6371
> For more information, see [Microsoft Graph: Use query parameters](https://developer.microsoft.com/graph/docs/concepts/query_parameters#select-parameter).
6472
73+
## Use the attributes in dynamic groups
74+
75+
One of the more useful scenarios is to use these attributes in dynamic security or Office 365 groups.
76+
77+
1. Create a new group in Azure AD. Give it a good name and make sure the **Membership type** is **Dynamic User**.
78+
79+
![Screenshot with a new group](./media/how-to-connect-sync-feature-directory-extensions/dynamicgroup1.png)
80+
81+
2. Select to **Add dynamic query**. If you look at the properties, then you will not see these extended attributes. You need to add them first. Click **Get custom extension properties**, enter the Application ID, and click **Refresh properties**.
82+
83+
![Screenshot where directory extensions have been added](./media/how-to-connect-sync-feature-directory-extensions/dynamicgroup2.png)
84+
85+
3. Open the property drop-down and note that the attributes you added are now visible.
86+
87+
![Screenshot with new attributes showing up in the UI](./media/how-to-connect-sync-feature-directory-extensions/dynamicgroup3.png)
88+
89+
Complete the expression to suit your requirements. In our example, the rule is set to **(user.extension_9d98ed114c4840d298fad781915f27e4_division -eq "Sales and marketing")**.
90+
91+
4. After the group has been created, give Azure AD some time to populate the members and then review the members.
92+
93+
![Screenshot with members in the dynamic group](./media/how-to-connect-sync-feature-directory-extensions/dynamicgroup4.png)
94+
6595
## Next steps
6696
Learn more about the [Azure AD Connect sync](how-to-connect-sync-whatis.md) configuration.
6797

0 commit comments

Comments
 (0)