Skip to content

Commit 946e3ba

Browse files
committed
2 parents b55b33c + 03f0bae commit 946e3ba

File tree

381 files changed

+6455
-3664
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

381 files changed

+6455
-3664
lines changed

.openpublishing.redirection.json

Lines changed: 23 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/communication-services/tutorials/file-sharing-tutorial.md",
5+
"redirect_URL": "/azure/communication-services/tutorials/file-sharing-tutorial-acs-chat",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/azure-resource-manager/bicep/bicep-import-providers.md",
510
"redirect_URL": "bicep-import",
@@ -24477,9 +24482,9 @@
2447724482
"redirect_document_id": false
2447824483
},
2447924484
{
24480-
"source_path": "articles/azure-cache-for-redis/cache-how-to-functions.md",
24481-
"redirect_url": "/azure/azure-functions/functions-bindings-cache",
24482-
"redirect_document_id": false
24485+
"source_path": "articles/azure-cache-for-redis/cache-how-to-functions.md",
24486+
"redirect_url": "/azure/azure-functions/functions-bindings-cache",
24487+
"redirect_document_id": false
2448324488
},
2448424489
{
2448524490
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md",
@@ -24511,6 +24516,21 @@
2451124516
"redirect_url": "/azure/bastion/bastion-connect-vm-ssh-linux",
2451224517
"redirect_document_id": false
2451324518
},
24519+
{
24520+
"source_path_from_root": "/articles/app-service/overview-disaster-recovery.md",
24521+
"redirect_url": "/azure/reliability/reliability-app-service",
24522+
"redirect_document_id": false
24523+
},
24524+
{
24525+
"source_path_from_root": "/articles/azure-functions/functions-geo-disaster-recovery.md",
24526+
"redirect_url": "/azure/reliability/reliability-functions",
24527+
"redirect_document_id": false
24528+
},
24529+
{
24530+
"source_path_from_root": "/articles/hdinsight/hdinsight-business-continuity.md",
24531+
"redirect_url": "/azure/reliability/reliability-hdinsight",
24532+
"redirect_document_id": false
24533+
},
2451424534
{
2451524535
"source_path_from_root": "/articles/reliability/reliability-postgre-flexible.md",
2451624536
"redirect_url": "/azure/reliability/reliability-postgresql-flexible-server",
@@ -24531,8 +24551,5 @@
2453124551
"redirect_url": "/azure/orbital/overview",
2453224552
"redirect_document_id": false
2453324553
}
24534-
24535-
24536-
2453724554
]
2453824555
}

articles/active-directory-domain-services/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@
4949
href: concepts-replica-sets.md
5050
- name: Forests trusts
5151
href: concepts-forest-trust.md
52-
- name: How Microsoft Entra DS synchronization works
52+
- name: How Domain Services synchronization works
5353
href: synchronization.md
5454
- name: How password hash synchronization works
5555
href: ../active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
@@ -71,7 +71,7 @@
7171
href: create-ou.md
7272
- name: Create a group managed service account (gMSA)
7373
href: create-gmsa.md
74-
- name: Manage Microsoft Entra DS
74+
- name: Manage Domain Services
7575
items:
7676
- name: Administer Group Policy
7777
href: manage-group-policy.md
@@ -89,7 +89,7 @@
8989
href: change-sku.md
9090
- name: Retrieve data
9191
href: how-to-data-retrieval.md
92-
- name: Secure Microsoft Entra DS
92+
- name: Secure Domain Services
9393
items:
9494
- name: Secure your managed domain
9595
href: secure-your-domain.md

articles/active-directory-domain-services/deploy-sp-profile-sync.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Enable SharePoint User Profile service with Microsoft Entra DS | Microsoft Docs
2+
title: Enable SharePoint User Profile service with Domain Services | Microsoft Docs
33
description: Learn how to configure a Microsoft Entra Domain Services managed domain to support profile synchronization for SharePoint Server
44
services: active-directory-ds
55
author: justinha
@@ -16,9 +16,9 @@ ms.author: justinha
1616
---
1717
# Configure Microsoft Entra Domain Services to support user profile synchronization for SharePoint Server
1818

19-
SharePoint Server includes a service to synchronize user profiles. This feature allows user profiles to be stored in a central location and accessible across multiple SharePoint sites and farms. To configure the SharePoint Server user profile service, the appropriate permissions must be granted in a Microsoft Entra Domain Services (Microsoft Entra DS) managed domain. For more information, see [user profile synchronization in SharePoint Server](/SharePoint/administration/user-profile-service-administration).
19+
SharePoint Server includes a service to synchronize user profiles. This feature allows user profiles to be stored in a central location and accessible across multiple SharePoint sites and farms. To configure the SharePoint Server user profile service, the appropriate permissions must be granted in a Microsoft Entra Domain Services managed domain. For more information, see [user profile synchronization in SharePoint Server](/SharePoint/administration/user-profile-service-administration).
2020

21-
This article shows you how to configure Microsoft Entra DS to allow the SharePoint Server user profile sync service.
21+
This article shows you how to configure Domain Services to allow the SharePoint Server user profile sync service.
2222

2323
## Before you begin
2424

@@ -30,7 +30,7 @@ To complete this article, you need the following resources and privileges:
3030
* If needed, [create a Microsoft Entra tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* A Microsoft Entra Domain Services managed domain enabled and configured in your Microsoft Entra tenant.
3232
* If needed, complete the tutorial to [create and configure a Microsoft Entra Domain Services managed domain][create-azure-ad-ds-instance].
33-
* A Windows Server management VM that is joined to the Microsoft Entra DS managed domain.
33+
* A Windows Server management VM that is joined to the Domain Services managed domain.
3434
* If needed, complete the tutorial to [create a management VM][tutorial-create-management-vm].
3535
* A user account that's a member of the *Microsoft Entra DC administrators* group in your Microsoft Entra tenant.
3636
* The SharePoint service account name for the user profile synchronization service. For more information about the *Profile Synchronization account*, see [Plan for administrative and service accounts in SharePoint Server][sharepoint-service-account]. To get the *Profile Synchronization account* name from the SharePoint Central Administration website, click **Application Management** > **Manage service applications** > **User Profile service application**. For more information, see [Configure profile synchronization by using SharePoint Active Directory Import in SharePoint Server](/SharePoint/administration/configure-profile-synchronization-by-using-sharepoint-active-directory-import).
@@ -50,7 +50,7 @@ When added to this security group, the service account for SharePoint Server use
5050

5151
The service account for SharePoint Server needs adequate privileges to replicate changes to the directory and let SharePoint Server user profile sync work correctly. To provide these privileges, add the service account used for SharePoint user profile synchronization to the *Microsoft Entra DC Service Accounts* group.
5252

53-
From your Microsoft Entra DS management VM, complete the following steps:
53+
From your Domain Services management VM, complete the following steps:
5454

5555
> [!NOTE]
5656
> To edit group membership in a managed domain, you must be signed in to a user account that's a member of the *AAD DC Administrators* group.

articles/active-directory-domain-services/faqs.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 09/15/2023
14+
ms.date: 09/23/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Microsoft Entra Domain Services
1717
summary: This page answers frequently asked questions about Microsoft Entra Domain Services.
@@ -62,20 +62,20 @@ sections:
6262
- question: |
6363
Can I enable Microsoft Entra Domain Services using a Resource Manager Template?
6464
answer: |
65-
Yes, you can create a Microsoft Entra Domain Services managed domain using a Resource Manager template. A service principal and Microsoft Entra group for administration must be created using the Microsoft Entra admin center or Azure PowerShell before the template is deployed. For more information, see [Create a Microsoft Entra DS managed domain using an Azure Resource Manager template](template-create-instance.md). When you create a Microsoft Entra Domain Services managed domain in the Microsoft Entra admin center, there's also an option to export the template for use with additional deployments.
65+
Yes, you can create a Microsoft Entra Domain Services managed domain using a Resource Manager template. A service principal and Microsoft Entra group for administration must be created using the Microsoft Entra admin center or Azure PowerShell before the template is deployed. For more information, see [Create a Domain Services managed domain using an Azure Resource Manager template](template-create-instance.md). When you create a Microsoft Entra Domain Services managed domain in the Microsoft Entra admin center, there's also an option to export the template for use with other deployments.
6666
6767
- question: |
6868
Can I add domain controllers to a Microsoft Entra Domain Services managed domain?
6969
answer: |
70-
No. The domain provided by Microsoft Entra Domain Services is a managed domain. You don't need to provision, configure, or otherwise manage domain controllers for this domain. These management activities are provided as a service by Microsoft. Therefore, you can't add additional domain controllers (read-write or read-only) for the managed domain.
70+
No. The domain provided by Microsoft Entra Domain Services is a managed domain. You don't need to provision, configure, or otherwise manage domain controllers for this domain. These management activities are provided as a service by Microsoft. Therefore, you can't add more domain controllers (read-write or read-only) for the managed domain.
7171
7272
- question: |
7373
Can guest users be invited to my directory use Microsoft Entra Domain Services?
7474
answer: |
7575
No. Guest users invited to your Microsoft Entra directory using the [Microsoft Entra B2B](../active-directory/external-identities/what-is-b2b.md) invite process are synchronized into your Microsoft Entra Domain Services managed domain. However, passwords for these users aren't stored in your Microsoft Entra directory. Therefore, Microsoft Entra Domain Services has no way to synchronize NTLM and Kerberos hashes for these users into your managed domain. Such users can't sign in or join computers to the managed domain.
7676
7777
- question: |
78-
Can a two-way forest trust be created between Microsoft Entra DS and an on-premises forest?
78+
Can a two-way forest trust be created between Domain Services and an on-premises forest?
7979
answer: |
8080
No. A managed domain supports up to five one-way outbound forest trusts to on-premises forests.
8181
@@ -109,7 +109,7 @@ sections:
109109
- question: |
110110
Is there any quota for the number of machines that I can join to the domain?
111111
answer: |
112-
There's no quota in Microsoft Entra DS for domain-joined machines.
112+
There's no quota in Domain Services for domain-joined machines.
113113
114114
- question: |
115115
Do I have domain administrator privileges for the managed domain provided by Microsoft Entra Domain Services?
@@ -119,7 +119,7 @@ sections:
119119
- question: |
120120
Can I modify group memberships using LDAP or other AD administrative tools on managed domains?
121121
answer: |
122-
Users and groups that are synchronized from Microsoft Entra ID to Microsoft Entra Domain Services cannot be modified because their source of origin is Microsoft Entra ID. This includes moving users or groups from the AADDC Users managed organizational unit to a custom organizational unit. Any user or group originating in the managed domain may be modified.
122+
Users and groups that are synchronized from Microsoft Entra ID to Microsoft Entra Domain Services can't be modified because their source of origin is Microsoft Entra ID. This includes moving users or groups from the **AADDC Users** managed organizational unit to a custom organizational unit. Any user or group originating in the managed domain may be modified.
123123
124124
- question: |
125125
How long does it take for changes I make to my Microsoft Entra directory to be visible in my managed domain?
@@ -139,7 +139,7 @@ sections:
139139
- question: |
140140
What is the password lifetime policy on a managed domain?
141141
answer: |
142-
The default password lifetime on a Microsoft Entra Domain Services managed domain is 90 days. This password lifetime is not synchronized with the password lifetime configured in Microsoft Entra ID. Therefore, you may have a situation where users' passwords expire in your managed domain, but are still valid in Microsoft Entra ID. In such scenarios, users need to change their password in Microsoft Entra ID and the new password will synchronize to your managed domain. If you want to change the default password lifetime in a managed domain, you can [create and configure custom password policies.](password-policy.md).
142+
The default password lifetime on a Microsoft Entra Domain Services managed domain is 90 days. This password lifetime isn't synchronized with the password lifetime configured in Microsoft Entra ID. Therefore, you may have a situation where users' passwords expire in your managed domain, but are still valid in Microsoft Entra ID. In such scenarios, users need to change their password in Microsoft Entra ID and the new password will synchronize to your managed domain. If you want to change the default password lifetime in a managed domain, you can [create and configure custom password policies](password-policy.md).
143143
144144
Additionally, the Azure AD password policy for *DisablePasswordExpiration* is synchronized to a managed domain. When *DisablePasswordExpiration* is applied to a user in Microsoft Entra ID, the *UserAccountControl* value for the synchronized user in the managed domain has *DONT_EXPIRE_PASSWORD* applied.
145145
@@ -163,7 +163,7 @@ sections:
163163
- question: |
164164
Why do my domain controllers change names?
165165
answer: |
166-
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
166+
It's possible that during the maintenance of domain controllers, there is a change in their names. To avoid problems with this type of change, it's recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
167167
- question: |
168168
Is the password of the KRBTGT account in a managed domain rolled periodically? If so, what is the frequency?
169169
answer: |
@@ -189,7 +189,7 @@ sections:
189189
- question: |
190190
Can I fail over Microsoft Entra Domain Services to another region for a DR event?
191191
answer: |
192-
Yes, to provide geographical resiliency for a managed domain, you can create an additional [replica set](tutorial-create-replica-set.md) to a peered virtual network in any Azure region that supports Microsoft Entra DS. Replica sets share the same namespace and configuration with the managed domain.
192+
Yes, to provide geographical resiliency for a managed domain, you can create another [replica set](tutorial-create-replica-set.md) to a peered virtual network in any Azure region that supports Domain Services. Replica sets share the same namespace and configuration with the managed domain.
193193
194194
- question: |
195195
Can I get Microsoft Entra Domain Services as part of Enterprise Mobility Suite (EMS)? Do I need Microsoft Entra ID P1 or P2 to use Microsoft Entra Domain Services?

articles/active-directory-domain-services/feature-availability.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Microsoft Entra Domain Services (Microsoft Entra DS) feature availability in Azure Government
3-
description: Learn which Microsoft Entra DS features are available in Azure Government.
2+
title: Microsoft Entra Domain Services feature availability in Azure Government
3+
description: Learn which Domain Services features are available in Azure Government.
44

55
ms.service: active-directory
66
ms.subservice: domain-services
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
<!---Jeremy said there are additional features that don't fit nicely in this list that we need to add later--->
2121

22-
This following table lists Microsoft Entra Domain Services (Microsoft Entra DS) feature availability in Azure Government.
22+
This following table lists Microsoft Entra Domain Services feature availability in Azure Government.
2323

2424

2525
| Feature | Availability |

0 commit comments

Comments
 (0)