You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/migrate-from-classic-vnet.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -303,13 +303,14 @@ Azure AD DS needs a network security group to secure the ports needed for the ma
303
303
304
304
If there's an error when you run the PowerShell cmdlet to prepare for migration in step 2 or for the migration itself in step 3, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
305
305
306
-
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*:
306
+
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*, and the Classic virtual network name, such as *myClassicVnet*:
307
307
308
308
```powershell
309
309
Migrate-Aadds `
310
310
-Abort `
311
311
-ManagedDomainFqdn contoso.com `
312
-
-Credentials $creds
312
+
-ClassicVirtualNetworkName myClassicVnet `
313
+
-Credentials $creds
313
314
```
314
315
315
316
### Restore
@@ -357,4 +358,4 @@ With your Azure AD DS managed domain migrated to the Resource Manager deployment
# Conditional Access: Require trusted location for MFA registration
19
19
20
-
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This preview feature is available to organizations who have enabled the [combined registration preview](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want users to register for Azure Multi-Factor Authentication and SSPR from a central location such as a trusted network location during HR onboarding. For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
20
+
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This preview feature is available to organizations who have enabled the [combined registration preview](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want to use conditions like trusted network location to restrict access to register for Azure Multi-Factor Authentication and SSPR. For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
21
21
22
22
## Create a policy to require registration from a trusted location
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,10 +43,11 @@ Before configuring device identities in Azure AD for your VDI environment, famil
43
43
| Device identity type | Identity infrastructure | Windows devices | VDI platform version | Supported |
44
44
| --- | --- | --- | --- | --- |
45
45
| Hybrid Azure AD joined | Federated*| Windows current*** and Windows down-level****| Persistent | Yes |
46
-
|||| Non-Persistent | Yes |
47
-
|| Managed**| Windows current and Windows down-level | Persistent | Yes |
46
+
||| Windows current | Non-Persistent | No |
48
47
||| Windows down-level | Non-Persistent | Yes |
48
+
|| Managed**| Windows current and Windows down-level | Persistent | Yes |
49
49
||| Windows current | Non-Persistent | No |
50
+
||| Windows down-level | Non-Persistent | Yes |
50
51
| Azure AD joined | Federated | Windows current | Persistent | No |
51
52
|||| Non-Persistent | No |
52
53
|| Managed | Windows current | Persistent | No |
@@ -79,7 +80,6 @@ When deploying non-persistent VDI, IT administrators should pay close attention
79
80
80
81
- Create and use a prefix for the display name of the computer that indicates the desktop as VDI-based.
81
82
- Implement the following commands as part of logoff script. These commands will trigger a best effort call to Azure AD to delete the device.
82
-
- For Windows current devices – dsregcmd.exe /leave
83
83
- For Windows down-level devices – autoworkplace.exe /leave
84
84
- Define and implement process for [managing stale devices](manage-stale-devices.md).
85
85
- Once you have a strategy to identify your non-persistent Hybrid Azure AD joined devices, you can be more aggressive on the clean-up of these devices to ensure your directory does not get consumed with lots of stale devices.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sync-feature-directory-extensions.md
+35-5Lines changed: 35 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,17 +13,19 @@ ms.devlang: na
13
13
ms.topic: conceptual
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
-
ms.date: 10/05/2018
16
+
ms.date: 11/12/2019
17
17
ms.subservice: hybrid
18
18
ms.author: billmath
19
19
20
20
ms.collection: M365-identity-device-management
21
21
---
22
22
# Azure AD Connect sync: Directory extensions
23
-
You can use directory extensions to extend the schema in Azure Active Directory (Azure AD) with your own attributes from on-premises Active Directory. This feature enables you to build LOB apps by consuming attributes that you continue to manage on-premises. These attributes can be consumed through [Azure AD Graph API directory extensions](https://msdn.microsoft.com/Library/Azure/Ad/Graph/howto/azure-ad-graph-api-directory-schema-extensions) or [Microsoft Graph](https://developer.microsoft.com/graph/). You can see the available attributes by using [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net/) and [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), respectively.
23
+
You can use directory extensions to extend the schema in Azure Active Directory (Azure AD) with your own attributes from on-premises Active Directory. This feature enables you to build LOB apps by consuming attributes that you continue to manage on-premises. These attributes can be consumed through [Azure AD Graph API directory extensions](https://msdn.microsoft.com/Library/Azure/Ad/Graph/howto/azure-ad-graph-api-directory-schema-extensions) or [Microsoft Graph](https://developer.microsoft.com/graph/). You can see the available attributes by using [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net/) and [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer), respectively. You can also use this feature to create dynamic groups in Azure AD.
24
24
25
25
At present, no Office 365 workload consumes these attributes.
26
26
27
+
## Customize which attributes to synchronize with Azure AD
28
+
27
29
You configure which additional attributes you want to synchronize in the custom settings path in the installation wizard.
28
30
29
31
>[!NOTE]
@@ -45,11 +47,17 @@ The list of attributes is read from the schema cache that's created during insta
45
47
46
48
An object in Azure AD can have up to 100 attributes for directory extensions. The maximum length is 250 characters. If an attribute value is longer, the sync engine truncates it.
47
49
48
-
During installation of Azure AD Connect, an application is registered where these attributes are available. You can see this application in the Azure portal.
50
+
## Configuration changes in Azure AD made by the wizard
51
+
52
+
During installation of Azure AD Connect, an application is registered where these attributes are available. You can see this application in the Azure portal. Its name is always **Tenant Schema Extension App**.
The attributes are prefixed with the extension \_{AppClientId}\_. AppClientId has the same value for all attributes in your Azure AD tenant.
56
+
Make sure you select **All applications** to see this app.
57
+
58
+
The attributes are prefixed with **extension \_{ApplicationId}\_**. ApplicationId has the same value for all attributes in your Azure AD tenant. You will need this value for all other scenarios in this topic.
59
+
60
+
## Viewing attributes using Graph
53
61
54
62
These attributes are now available through the Azure AD Graph API. You can query them by using [Azure AD Graph Explorer](https://graphexplorer.azurewebsites.net/).
55
63
@@ -58,10 +66,32 @@ These attributes are now available through the Azure AD Graph API. You can query
58
66
Or you can query the attributes through the Microsoft Graph API, by using [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer#).
59
67
60
68
>[!NOTE]
61
-
> You need to ask for the attributes to be returned. Explicitly select the attributes like this: https\://graph.microsoft.com/beta/users/abbie.[email protected]?$select=extension_9d98ed114c4840d298fad781915f27e4_employeeID,extension_9d98ed114c4840d298fad781915f27e4_division.
69
+
> In Microsoft Graph, you need to ask for the attributes to be returned. Explicitly select the attributes like this: https\://graph.microsoft.com/beta/users/abbie.[email protected]?$select=extension_9d98ed114c4840d298fad781915f27e4_employeeID,extension_9d98ed114c4840d298fad781915f27e4_division.
62
70
>
63
71
> For more information, see [Microsoft Graph: Use query parameters](https://developer.microsoft.com/graph/docs/concepts/query_parameters#select-parameter).
64
72
73
+
## Use the attributes in dynamic groups
74
+
75
+
One of the more useful scenarios is to use these attributes in dynamic security or Office 365 groups.
76
+
77
+
1. Create a new group in Azure AD. Give it a good name and make sure the **Membership type** is **Dynamic User**.
78
+
79
+

80
+
81
+
2. Select to **Add dynamic query**. If you look at the properties, then you will not see these extended attributes. You need to add them first. Click **Get custom extension properties**, enter the Application ID, and click **Refresh properties**.
82
+
83
+

84
+
85
+
3. Open the property drop-down and note that the attributes you added are now visible.
86
+
87
+

88
+
89
+
Complete the expression to suit your requirements. In our example, the rule is set to **(user.extension_9d98ed114c4840d298fad781915f27e4_division -eq "Sales and marketing")**.
90
+
91
+
4. After the group has been created, give Azure AD some time to populate the members and then review the members.
92
+
93
+

94
+
65
95
## Next steps
66
96
Learn more about the [Azure AD Connect sync](how-to-connect-sync-whatis.md) configuration.
0 commit comments