Skip to content

Commit a22cb7e

Browse files
authored
Merge pull request #95949 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents a107430 + 232205b commit a22cb7e

File tree

251 files changed

+4792
-3885
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

251 files changed

+4792
-3885
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2961,6 +2961,11 @@
29612961
"redirect_url": "/azure/sql-database/scripts/sql-database-add-single-db-to-failover-group-powershell",
29622962
"redirect_document_id": false
29632963
},
2964+
{
2965+
"source_path": "articles/sql-database/sql-database-develop-error-messages.md",
2966+
"redirect_url": "/azure/sql-database/troubleshoot-connectivity-issues-microsoft-azure-sql-database",
2967+
"redirect_document_id": false
2968+
},
29642969
{
29652970
"source_path": "articles/sql-database/sql-database-customer-implementations.md",
29662971
"redirect_url": "http://customers.microsoft.com",
@@ -4771,6 +4776,11 @@
47714776
"redirect_url": "/azure/app-service-mobile",
47724777
"redirect_document_id": false
47734778
},
4779+
{
4780+
"source_path": "articles/application-gateway/application-gateway-crs-rulegroups-rules.md",
4781+
"redirect_url": "/azure/web-application-firewall/ag/application-gateway-crs-rulegroups-rules",
4782+
"redirect_document_id": false
4783+
},
47744784
{
47754785
"source_path": "articles/application-gateway/application-gateway-web-application-firewall-portal.md",
47764786
"redirect_url": "/azure/web-application-firewall/ag/application-gateway-web-application-firewall-portal",

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -273,10 +273,11 @@ Inspect the `B2CGraphClient.SendGraphPatchRequest()` method for details on how t
273273

274274
### Search users
275275

276-
You can search for users in your B2C tenant in two ways:
276+
You can search for users in your B2C tenant in following ways:
277277

278278
* Reference the user's **object ID**.
279279
* Reference their sign-in identifer, the `signInNames` property.
280+
* Reference any of the valid OData parameters, e.g. givenName, surname, displayName etc.
280281

281282
Run one of the following commands to search for a user:
282283

@@ -290,6 +291,9 @@ For example:
290291
```cmd
291292
B2C Get-User 2bcf1067-90b6-4253-9991-7f16449c2d91
292293
B2C Get-User $filter=signInNames/any(x:x/value%20eq%20%27consumer@fabrikam.com%27)
294+
B2C get-user $filter=givenName%20eq%20%27John%27
295+
B2C get-user $filter=surname%20eq%20%27Doe%27
296+
B2C get-user $filter=displayName%20eq%20%27John%20Doe%27
293297
```
294298

295299
### Delete users

articles/active-directory-domain-services/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The service itself doesn't directly support this scenario. Your managed domain i
5858
Yes. For more information, see [how to enable Azure AD Domain Services using PowerShell](powershell-create-instance.md).
5959

6060
### Can I enable Azure AD Domain Services using a Resource Manager Template?
61-
No, it's not currently possible to enable Azure AD Domain Services using a template. For a scripted approach, see [how to enable Azure AD Domain Services using PowerShell](powershell-create-instance.md).
61+
Yes, you can create an Azure AD Domain Services managed domain using a Resource Manager template. A service principal and Azure AD group for administration must be created using the Azure portal or Azure PowerShell before the template is deployed. When you create an Azure AD Domain Services managed domain in the Azure portal, there's an option to export the template for use with additional deployments. There's also an [example template in the GitHub templates sample repo](https://github.com/Azure/azure-quickstart-templates/tree/master/101-AAD-DomainServices).
6262

6363
### Can I add domain controllers to an Azure AD Domain Services managed domain?
6464
No. The domain provided by Azure AD Domain Services is a managed domain. You don't need to provision, configure, or otherwise manage domain controllers for this domain. These management activities are provided as a service by Microsoft. Therefore, you can't add additional domain controllers (read-write or read-only) for the managed domain.

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The following providers offer FIDO2 security keys of different form factors that
7272
| Feitian | [https://www.ftsafe.com/about/Contact_Us](https://www.ftsafe.com/about/Contact_Us) |
7373
| HID | [https://www.hidglobal.com/contact-us](https://www.hidglobal.com/contact-us) |
7474
| Ensurity | [https://www.ensurity.com/contact](https://www.ensurity.com/contact) |
75-
| eWBM | [https://www.ewbm.com/page/sub1_5](https://www.ewbm.com/page/sub1_5) |
75+
| eWBM | [https://www.ewbm.com/support](https://www.ewbm.com/support) |
7676
| AuthenTrend | [https://authentrend.com/about-us/#pg-35-3](https://authentrend.com/about-us/#pg-35-3) |
7777

7878
> [!NOTE]

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To target specific device groups to enable the credential provider, use the foll
8585

8686
### Enable with a provisioning package
8787

88-
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/store/apps/9nblggh4tx22).
88+
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/en-us/p/windows-configuration-designer/9nblggh4tx22).
8989

9090
1. Launch the Windows Configuration Designer.
9191
1. Select **File** > **New project**.

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Deploy Azure AD self-service password reset
1919

20+
> [!NOTE]
21+
> This guide explains self-service password reset and how to deploy it. If you are looking for the self service password reset tool to get back into your account, go to [https://aka.ms/sspr](https://aka.ms/sspr).
22+
2023
Self-service password reset (SSPR) is an Azure Active Directory feature that enables employees to reset their passwords without needing to contact IT staff. Employees must register for or be registered for self-service password reset before using the service. During registration, the employee chooses one or more authentication methods enabled by their organization.
2124

2225
SSPR enables employees to quickly get unblocked and continue working no matter where they are or the time of day. By allowing users to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.

articles/active-directory/authentication/multi-factor-authentication-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ A workaround for this error is to have separate user accounts for admin-related
216216

217217
If your question isn't answered here, please leave it in the comments at the bottom of the page. Or, here are some additional options for getting help:
218218

219-
* Search the [Microsoft Support Knowledge Base](https://www.microsoft.com/en-us/search?form=mssupport&q=phonefactor&rtc=1) for solutions to common technical issues.
219+
* Search the [Microsoft Support Knowledge Base](https://support.microsoft.com) for solutions to common technical issues.
220220
* Search for and browse technical questions and answers from the community, or ask your own question in the [Azure Active Directory forums](https://social.msdn.microsoft.com/Forums/azure/newthread?category=windowsazureplatform&forum=WindowsAzureAD&prof=required).
221221
* If you're a legacy PhoneFactor customer and you have questions or need help resetting a password, use the [password reset](mailto:[email protected]) link to open a support case.
222222
* Contact a support professional through [Azure Multi-Factor Authentication Server (PhoneFactor) support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, and the ID of the user who saw the error.

articles/active-directory/manage-apps/access-panel-extension-problem-installing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To install the access panel browser extension, do the following:
5959
You can also download the extension for Chrome and Microsoft Edge directly from following sites:
6060

6161
- [Chrome extension](https://chrome.google.com/webstore/detail/access-panel-extension/ggjhpefgjjfobnfoldnjipclpcfbgbhl)
62-
- [Microsoft Edge extension](https://www.microsoft.com/store/apps/9pc9sckkzk84)
62+
- [Microsoft Edge extension](https://www.microsoft.com/en-us/p/my-apps-secure-sign-in-extension/9pc9sckkzk84)
6363
- [Firefox extension](https://addons.mozilla.org/en-US/firefox/addon/access-panel-extension/)
6464

6565
## Use the My Apps Secure Sign-in Extension
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
title: 'Application management: Best practices and recommendations | Microsoft Docs'
3+
description: Learn best practices and recommendations for managing applications in Azure Active Directory. Learn about using automatic provisioning and publishing on-premises apps with Application Proxy.
4+
5+
services: active-directory
6+
documentationcenter: ''
7+
author: msmimart
8+
manager: CelesteDG
9+
editor: ''
10+
ms.assetid:
11+
ms.service: active-directory
12+
ms.devlang: na
13+
ms.topic: reference
14+
ms.tgt_pltfrm: na
15+
ms.workload: identity
16+
ms.date: 11/13/2019
17+
ms.subservice: app-mgmt
18+
ms.author: mimart
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
# Application management best practices
23+
This article contains recommendations and best practices for managing applications in Azure Active Directory (Azure AD), using automatic provisioning, and publishing on-premises apps with Application Proxy.
24+
25+
## Cloud app and single sign-on recommendations
26+
| Recommendation | Comments |
27+
| --- | --- |
28+
| Check the Azure AD application gallery for apps | Azure AD has a gallery that contains thousands of pre-integrated applications that are enabled with Enterprise single sign-on (SSO). For app-specific setup guidance, see the [List of SaaS app tutorials](https://azure.microsoft.com/documentation/articles/active-directory-saas-tutorial-list/). |
29+
| Use federated SAML-based SSO | When an application supports it, use Federated, SAML-based SSO with Azure AD instead of password-based SSO and ADFS. |
30+
| Use SHA-256 for certificate signing | Azure AD uses the SHA-256 algorithm by default to sign the SAML response. Use SHA-256 unless the application requires SHA-1 (see [Certificate signing options](certificate-signing-options.md) and [Application sign-in problem](application-sign-in-problem-application-error.md).) |
31+
| Require user assignment | By default, users can access to your enterprise applications without being assigned to them. However, if the application exposes roles, or if you want the application to appear on a user’s access panel, require user assignment. (See [Developer guidance for integrating applications](developer-guidance-for-integrating-applications.md).) |
32+
| Deploy the My Apps access panel to your users | The [access panel](end-user-experiences.md) at `https://myapps.microsoft.com` is a web-based portal that provides users with a single point of entry for their assigned cloud-based applications. As additional capabilities like group management and self-service password reset are added, users can find them in the access panel. See [Plan an access panel deployment](access-panel-deployment-plan.md).
33+
| Use group assignment | If included in your subscription, assign groups to an application so you can delegate ongoing access management to the group owner. (See [Developer guidance for integrating applications](developer-guidance-for-integrating-applications.md).) |
34+
| Establish a process for managing certificates | The maximum lifetime of a signing certificate is three years. To prevent or minimize outage due to a certificate expiring, use roles and email distribution lists to ensure that certificate-related change notifications are closely monitored. |
35+
36+
## Provisioning recommendations
37+
| Recommendation | Comments |
38+
| --- | --- |
39+
| Use tutorials to set up provisioning with cloud apps | Check the [List of SaaS app tutorials](https://azure.microsoft.com/documentation/articles/active-directory-saas-tutorial-list/) for step-by-step guidance on configuring provisioning for the gallery app you want to add. |
40+
| Use provisioning logs (preview) to monitor status | The [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context) give details about all actions performed by the provisioning service, including status for individual users. |
41+
| Assign a distribution group to the provisioning notification email | To increase the visibility of critical alerts sent by the provisioning service, assign a distribution group to the Notification Emails setting. |
42+
43+
44+
## Application Proxy recommendations
45+
| Recommendation | Comments |
46+
| --- | --- |
47+
| Use Application Proxy for remote access to internal resources | Application Proxy is recommended for giving remote users access to internal resources, replacing the need for a VPN or reverse proxy. It is not intended for accessing resources from within the corporate network because it could add latency.
48+
| Use custom domains | Set up custom domains for your applications (see [Configure custom domains](application-proxy-configure-custom-domain.md)) so that URLs for users and between applications will work from either inside or outside of your network. You'll also be able to control your branding and customize your URLs. When using custom domain names, plan to acquire a public certificate from a non-Microsoft trusted certificate authority. Azure Application Proxy supports standard, ([wildcard](application-proxy-wildcard.md)), or SAN-based certificates. (See [Application Proxy planning](application-proxy-deployment-plan.md).) |
49+
| Synchronize users before deploying Application Proxy | Before deploying application proxy, synchronize user identities from an on-premises directory or create them directly in Azure AD. Identity synchronization allows Azure AD to pre-authenticate users before granting them access to App Proxy published applications. It also provides the necessary user identifier information to perform single sign-on (SSO). (See [Application Proxy planning](application-proxy-deployment-plan.md).) |
50+
| Follow our tips for high availability and load balancing | To learn how traffic flows among users, Application Proxy connectors, and back-end app servers, and to get tips for optimizing performance and load balancing, see [High availability and load balancing of your Application Proxy connectors and applications](application-proxy-high-availability-load-balancing.md). |
51+
| Use multiple connectors | Use two or more Application Proxy connectors for greater resiliency, availability, and scale (see [Application Proxy connectors](application-proxy-connectors.md)). Create connector groups and ensure each connector group has at least two connectors (three connectors is optimal). |
52+
| Locate connector servers close to application servers, and make sure they're in the same domain | To optimize performance, physically locate the connector server close to the application servers (see [Network topology considerations](application-proxy-network-topology.md)). Also, the connector server and web applications servers should belong to the same Active Directory domain, or they should span trusting domains. This configuration is required for SSO with Integrated Windows Authentication (IWA) and Kerberos Constrained Delegation (KCD). If the servers are in different domains, you'll need to use resource-based delegation for SSO (see [KCD for single sign-on with Application Proxy](application-proxy-configure-single-sign-on-with-kcd.md)). |
53+
| Enable auto-updates for connectors | Enable auto-updates for your connectors for the latest features and bug fixes. Microsoft provides direct support for the latest connector version and one version before. (See [Application Proxy release version history](application-proxy-release-version-history.md).) |
54+
| Bypass your on-premises proxy | For easier maintenance, configure the connector to bypass your on-premises proxy so it directly connects to the Azure services. (See [Application Proxy connectors and proxy servers](application-proxy-configure-connectors-with-proxy-servers.md).) |
55+
| Use Azure AD Application Proxy over Web Application Proxy | Use Azure AD Application Proxy for most on-premises scenarios. Web Application Proxy is only preferred in scenarios that require a proxy server for AD FS and where you can't use custom domains in Azure Active Directory. (See [Application Proxy migration](application-proxy-migration.md).) |

articles/active-directory/manage-apps/application-sign-in-other-problem-access-panel.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ You may also download the extension for Chrome and Microsoft Edge from the direc
9393

9494
- [Chrome Access Panel Extension](https://chrome.google.com/webstore/detail/access-panel-extension/ggjhpefgjjfobnfoldnjipclpcfbgbhl)
9595

96-
- [Microsoft Edge Access Panel Extension](https://www.microsoft.com/store/apps/9pc9sckkzk84)
96+
- [Microsoft Edge Access Panel Extension](https://www.microsoft.com/p/my-apps-secure-sign-in-extension/9pc9sckkzk84)
9797

9898
## How to configure federated single sign-on for an Azure AD gallery application
9999

0 commit comments

Comments
 (0)