You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By default, all the replicas are configured in synchronous mode. This means any updates on the primary instance will be synchronously replicated to each of the secondary instances.
131
131
132
-
## View and monitor availability group status
132
+
## View and monitor high availability status
133
133
134
134
Once the deployment is complete, connect to the primary endpoint from SQL Server Management Studio.
135
135
@@ -147,7 +147,7 @@ kubectl get sqlmi -A
147
147
148
148
### Get the primary and secondary endpoints and AG status
149
149
150
-
Use the `kubectl describe sqlmi` or `az sql mi-arc show` commands to view the primary and secondary endpoints, and availability group status.
150
+
Use the `kubectl describe sqlmi` or `az sql mi-arc show` commands to view the primary and secondary endpoints, and high availability status.
Copy file name to clipboardExpand all lines: articles/defender-for-iot/organizations/integrate-with-active-directory.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,8 @@ You can associate Active Directory groups defined here with specific permission
44
44
|--|--|
45
45
| Domain controller FQDN | Set the fully qualified domain name (FQDN) exactly as it appears on your LDAP server. For example, enter `host1.subdomain.domain.com`. |
46
46
| Domain controller port | Define the port on which your LDAP is configured. |
47
-
| Primary domain | Set the domain name (for example, `subdomain.domain.com`) and the connection type according to your LDAP configuration. |
47
+
| Primary domain | Set the domain name (for example, `subdomain.domain.com`) |
48
+
| Connection type | Set the authentication type: LDAPS/NTLMv3 (Recommended), LDAP/NTLMv3 or LDAP/SASL-MD5 |
48
49
| Active Directory groups | Enter the group names that are defined in your Active Directory configuration on the LDAP server. You can enter a group name that you'll associate with Admin, Security Analyst and Read-only permission levels. Use these groups when creating new sensor users.|
49
50
| Trusted endpoints | To add a trusted domain, add the domain name and the connection type of a trusted domain. <br />You can configure trusted endpoints only for users who were defined under users. |
50
51
@@ -59,4 +60,4 @@ You can associate Active Directory groups defined here with specific permission
59
60
60
61
## Next steps
61
62
62
-
For more information, see [how to create and manage users](./how-to-create-and-manage-users.md).
63
+
For more information, see [how to create and manage users](./how-to-create-and-manage-users.md).
0 commit comments