Skip to content

Commit 9e002f7

Browse files
authored
Merge pull request #216326 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 10/28
2 parents 5434319 + 6f65214 commit 9e002f7

File tree

174 files changed

+1931
-1777
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+1931
-1777
lines changed

articles/active-directory/devices/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,13 +53,15 @@
5353
- name: Troubleshoot hybrid Azure AD joined Windows current version
5454
href: troubleshoot-hybrid-join-windows-current.md
5555
- name: Troubleshoot pending device state
56-
href: /troubleshoot/azure/active-directory/pending-devices
56+
href: /troubleshoot/azure/active-directory/pending-devices?toc=/azure/active-directory/fundamentals/toc.json
5757
- name: Troubleshoot using dsregcmd
5858
href: troubleshoot-device-dsregcmd.md
5959
- name: Troubleshoot hybrid Azure AD joined down level Windows devices
6060
href: troubleshoot-hybrid-join-windows-legacy.md
6161
- name: Manage device identities
6262
href: device-management-azure-portal.md
63+
- name: Troubleshooting Windows devices
64+
href: troubleshoot-device-windows-joined.md
6365
- name: Manage stale devices
6466
href: manage-stale-devices.md
6567
- name: Azure Linux VMs and Azure AD
Loading
217 KB
Loading
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Troubleshoot registered, hybrid, and Azure AD joined Windows machines
3+
description: This article helps you troubleshoot hybrid Azure Active Directory-joined Windows 10 and Windows 11 devices
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: devices
8+
ms.topic: troubleshooting
9+
ms.date: 08/29/2022
10+
11+
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: amycolannino
14+
ms.reviewer: jogro
15+
---
16+
# Troubleshooting Windows devices in Azure AD
17+
18+
If you have a Windows 11 or Windows 10 device that isn't working with Azure Active Directory (Azure AD) correctly, start your troubleshooting here.
19+
20+
1. Sign in to the **Azure portal**.
21+
1. Browse to **Azure Active Directory** > **Devices** > **Diagnose and solve problems**.
22+
1. Select **Troubleshoot** under the **Windows 10+ related issue** troubleshooter.
23+
:::image type="content" source="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows.png" alt-text="A screenshot showing the Windows troubleshooter located in the diagnose and solve pane of the Azure portal." lightbox="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows.png":::
24+
1. Select **instructions** and follow the steps to download, run, and collect the required logs for the troubleshooter to analyze.
25+
1. Return to the Azure portal when you've collected and zipped the `authlogs` folder and contents.
26+
1. Select **Browse** and choose the zip file you wish to upload.
27+
:::image type="content" source="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows-upload.png" alt-text="A screenshot showing how to browse to select the logs gathered in the previous step to allow the troubleshooter to make recommendations." lightbox="media/troubleshoot-device-windows-joined/devices-troubleshoot-windows-upload.png":::
28+
29+
The troubleshooter will review the contents of the file you uploaded and provide suggested next steps. These next steps may include links to documentation or contacting support for further assistance.
30+
31+
## Next steps
32+
33+
- [Troubleshoot devices by using the dsregcmd command](troubleshoot-device-dsregcmd.md)
34+
- [Troubleshoot hybrid Azure AD-joined devices](troubleshoot-hybrid-join-windows-current.md)
35+
- [Troubleshooting hybrid Azure Active Directory joined down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
36+
- [Troubleshoot pending device state](/troubleshoot/azure/active-directory/pending-devices)
37+
- [MDM enrollment of Windows 10-based devices](/windows/client-management/mdm/mdm-enrollment-of-windows-devices)
38+
- [Troubleshooting Windows device enrollment errors in Intune](/troubleshoot/mem/intune/troubleshoot-windows-enrollment-errors)

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: troubleshooting
9-
ms.date: 02/15/2022
9+
ms.date: 08/29/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -508,7 +508,7 @@ Use Event Viewer to look for the log entries that are logged by the Azure AD Clo
508508
> [!NOTE]
509509
> When you're collecting network traces, it's important to *not* use Fiddler during repro.
510510
511-
1. Run `netsh trace start scenario=internetClient_dbg capture=yes persistent=yes`.
511+
1. Run `netsh trace start scenario=internetClient_dbg capture=yes persistent=yes`.
512512
1. Lock and unlock the device. For hybrid-joined devices, wait a minute or more to allow the PRT acquisition task to finish.
513513
1. Run `netsh trace stop`.
514514
1. Share the *nettrace.cab* file with Support.

articles/active-directory/manage-apps/manage-self-service-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ To enable self-service application access to an application, follow the steps be
7878

7979
1. Select the **Save** button at the top of the pane to finish.
8080

81-
Once you complete self-service application configuration, users can navigate to their My Apps portal and select **Add self-service apps** to find the apps that are enabled with self-service access. Business approvers also see a notification in their My Apps portal. You can enable an email notifying them when a user has requested access to an application that requires their approval.
81+
Once you complete self-service application configuration, users can navigate to their My Apps portal and select **Request new apps** to find the apps that are enabled with self-service access. Business approvers also see a notification in their My Apps portal. You can enable an email notifying them when a user has requested access to an application that requires their approval.
8282

8383
## Next steps
8484

articles/aks/cluster-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure a cluster in Azure Kubernetes Service (AKS)
44
services: container-service
55
ms.topic: article
66
ms.custom: ignite-2022
7-
ms.date: 10/04/2022
7+
ms.date: 10/28/2022
88
---
99

1010
# Configure an AKS cluster
@@ -369,7 +369,7 @@ This enables an OIDC Issuer URL of the provider which allows the API server to d
369369
370370
### Prerequisites
371371

372-
* The Azure CLI version 2.40.0 or higher. Run `az --version` to find your version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
372+
* The Azure CLI version 2.42.0 or higher. Run `az --version` to find your version. If you need to install or upgrade, see [Install Azure CLI][azure-cli-install].
373373
* AKS version 1.22 and higher. If your cluster is running version 1.21 and the OIDC Issuer preview is enabled, we recommend you upgrade the cluster to the minimum required version supported.
374374

375375
### Create an AKS cluster with OIDC Issuer

articles/aks/cluster-extensions.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,11 +36,13 @@ A conceptual overview of this feature is available in [Cluster extensions - Azur
3636
* [Azure CLI](/cli/azure/install-azure-cli) version >= 2.16.0 installed.
3737

3838
> [!NOTE]
39-
> If you have enabled [AAD-based pod identity][use-azure-ad-pod-identity] on your AKS cluster or are considering implementing it,
40-
> we recommend you first review [Migrate to workload identity][migrate-workload-identity] to understand our
39+
> If you have enabled [Azure AD pod-managed identity][use-azure-ad-pod-identity] on your AKS cluster or are considering implementing it,
40+
> we recommend you first review [Workload identity overview][workload-identity-overview] to understand our
4141
> recommendations and options to set up your cluster to use an Azure AD workload identity (preview).
4242
> This authentication method replaces pod-managed identity (preview), which integrates with the Kubernetes native capabilities
4343
> to federate with any external identity providers.
44+
>
45+
> The open source Azure AD pod-managed identity (preview) in Azure Kubernetes Service has been deprecated as of 10/24/2022.
4446
4547
### Set up the Azure CLI extension for cluster extensions
4648

@@ -189,7 +191,8 @@ az k8s-extension delete --name azureml --cluster-name <clusterName> --resource-g
189191
[gitops-overview]: ../azure-arc/kubernetes/conceptual-gitops-flux2.md
190192
[k8s-extension-reference]: /cli/azure/k8s-extension
191193
[use-managed-identity]: ./use-managed-identity.md
192-
[migrate-workload-identity]: workload-identity-overview.md
194+
[workload-identity-overview]: workload-identity-overview.md
195+
[use-azure-ad-pod-identity]: use-azure-ad-pod-identity.md
193196

194197
<!-- EXTERNAL -->
195198
[arc-k8s-regions]: https://azure.microsoft.com/global-infrastructure/services/?products=azure-arc&regions=all

articles/aks/csi-secrets-store-identity-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ The Secrets Store CSI Driver on Azure Kubernetes Service (AKS) provides a variet
1818
An [Azure AD workload identity][workload-identity] is an identity used by an application running on a pod that can authenticate itself against other Azure services that support it, such as Storage or SQL. It integrates with the capabilities native to Kubernetes to federate with external identity providers. In this security model, the AKS cluster acts as token issuer where Azure Active Directory uses OpenID Connect to discover public signing keys and verify the authenticity of the service account token before exchanging it for an Azure AD token. Your workload can exchange a service account token projected to its volume for an Azure AD token using the Azure Identity client library using the Azure SDK or the Microsoft Authentication Library (MSAL).
1919

2020
> [!NOTE]
21-
> This authentication method replaces pod-managed identity (preview).
21+
> This authentication method replaces Azure AD pod-managed identity (preview). The open source Azure AD pod-managed identity (preview) in Azure Kubernetes Service has been deprecated as of 10/24/2022.
2222
2323
### Prerequisites
2424

articles/aks/csi-secrets-store-nginx-tls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ helm install ingress-nginx/ingress-nginx --generate-name \
131131
The ingress controller’s deployment will reference the Secrets Store CSI Driver's Azure Key Vault provider.
132132

133133
> [!NOTE]
134-
> If not using Azure Active Directory (AAD) pod identity as your method of access, remove the line with `--set controller.podLabels.aadpodidbinding=$AAD_POD_IDENTITY_NAME`
134+
> If not using Azure Active Directory (Azure AD) pod-managed identity as your method of access, remove the line with `--set controller.podLabels.aadpodidbinding=$AAD_POD_IDENTITY_NAME`
135135
136136
```bash
137137
helm install ingress-nginx/ingress-nginx --generate-name \

0 commit comments

Comments
 (0)