Skip to content

Commit a81094d

Browse files
committed
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into clusterupgrade
2 parents 46edb5d + d645cba commit a81094d

File tree

359 files changed

+5134
-4925
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

359 files changed

+5134
-4925
lines changed

.openpublishing.publish.config.json

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -259,6 +259,24 @@
259259
"url": "https://github.com/Azure-Samples/cognitive-services-java-sdk-samples",
260260
"branch": "master",
261261
"branch_mapping": {}
262+
},
263+
{
264+
"path_to_root": "aml-sdk-samples",
265+
"url": "https://github.com/Azure/MachineLearningNotebooks",
266+
"branch": "sdk-codetest",
267+
"branch_mapping": {}
268+
},
269+
{
270+
"path_to_root": "cognitive-services-vision-csharp-sdk-quickstarts",
271+
"url": "https://github.com/Azure-Samples/cognitive-services-vision-csharp-sdk-quickstarts",
272+
"branch": "master",
273+
"branch_mapping": {}
274+
},
275+
{
276+
"path_to_root": "cognitive-face-csharp-sample",
277+
"url": "https://github.com/Azure-Samples/Cognitive-Face-CSharp-sample",
278+
"branch": "master",
279+
"branch_mapping": {}
262280
}
263281
],
264282
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/machine-learning/service/how-to-choose-a-dev-environment.md",
5+
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/frontdoor/front-door-powershell-reference.md",
510
"redirect_url": "/powershell/module/azurerm.frontdoor",
@@ -11069,6 +11074,11 @@
1106911074
"redirect_url": "/azure/monitoring-and-diagnostics/alert-log",
1107011075
"redirect_document_id": false
1107111076
},
11077+
{
11078+
"source_path": "articles/monitoring-and-diagnostics/monitoring-overview-unified-alerts.md",
11079+
"redirect_url": "/azure/monitoring-and-diagnostics/monitoring-overview-alerts",
11080+
"redirect_document_id": false
11081+
},
1107211082
{
1107311083
"source_path": "articles/monitoring-and-diagnostics/monitoring-create-activity-log-alerts-with-resource-manager-template.md",
1107411084
"redirect_url": "/azure/monitoring-and-diagnostics/alert-activity-log",
@@ -30510,6 +30520,17 @@
3051030520
"source_path": "articles/iot-central/howto-create-application.md",
3051130521
"redirect_url": "/azure/iot-central/quick-deploy-iot-central",
3051230522
"redirect_document_id" : false
30523+
},
30524+
{
30525+
"source_path": "articles/media-services/latest/create-account-cli-quickstart.md",
30526+
"redirect_url": "/azure/media-services/latest/create-account-cli-how-to",
30527+
"redirect_document_id" : false
30528+
},
30529+
{
30530+
"source_path": "articles/backup/backup-mabs-upgrade-to-v2.md",
30531+
"redirect_url": "/azure/backup/backup-mabs-whats-new-mabs",
30532+
"redirect_document_id" : false
3051330533
}
30534+
3051430535
]
3051530536
}

articles/active-directory-b2c/oauth2-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The **InputClaims** and **InputClaimsTransformations** elements are not required
4242

4343
## Output claims
4444

45-
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as the you set the `DefaultValue` attribute.
45+
The **OutputClaims** element contains a list of claims returned by the OAuth2 identity provider. You may need to map the name of the claim defined in your policy to the name defined in the identity provider. You can also include claims that aren't returned by the identity provider as long as you set the `DefaultValue` attribute.
4646

4747
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
4848

articles/active-directory-b2c/saml-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.component: B2C
1717

1818
[!INCLUDE [active-directory-b2c-advanced-audience-warning](../../includes/active-directory-b2c-advanced-audience-warning.md)]
1919

20-
Azure Active Directory (Azure AD) B2C provides support for the SAML 2.0 identity provider. This article describes the specifics of a technical profile for interacting with a claims provider that supports this standardized protocol. With SAML technical profile you can federate with a SAML based identity provider, such as AD-FS and Salesforce, allowing you users to sign-in with their existing social or enterprise identities.
20+
Azure Active Directory (Azure AD) B2C provides support for the SAML 2.0 identity provider. This article describes the specifics of a technical profile for interacting with a claims provider that supports this standardized protocol. With SAML technical profile you can federate with a SAML based identity provider, such as AD-FS and Salesforce, allowing your users to sign-in with their existing social or enterprise identities.
2121

2222
## Metadata exchange
2323

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ A technical profile enables these types of scenarios:
3434
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
3535
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3636
- **WsFed** - Federation with any WsFed protocol identity provider.
37-
- **Session management** - Handle different types of sessions.
38-
- **User journey context provider**
37+
- [Session management](active-directory-b2c-reference-sso-custom.md) - Handle different types of sessions.
3938
- **Application insights**
4039

4140
## Technical profile flow
Lines changed: 39 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Azure MFA Server upgrade | Microsoft Docs
2+
title: Azure MFA Server upgrade
33
description: Steps and guidance to upgrade the Azure Multi-Factor Authentication Server to a newer version.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.component: authentication
88
ms.topic: conceptual
9-
ms.date: 07/11/2018
9+
ms.date: 11/12/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -20,30 +20,41 @@ This article walks you through the process of upgrading Azure Multi-Factor Authe
2020

2121
If you're upgrading from v6.x or older to v7.x or newer, all components change from .NET 2.0 to .NET 4.5. All components also require Microsoft Visual C++ 2015 Redistributable Update 1 or higher. The MFA Server installer installs both the x86 and x64 versions of these components if they aren't already installed. If the User Portal and Mobile App Web Service run on separate servers, you need to install those packages before upgrading those components. You can search for the latest Microsoft Visual C++ 2015 Redistributable update on the [Microsoft Download Center](https://www.microsoft.com/download/).
2222

23-
## Install the latest version of Azure MFA Server
23+
Upgrade steps at a glance:
2424

25-
1. Use the instructions in [Download the Azure Multi-Factor Authentication Server](howto-mfaserver-deploy.md#download-the-mfa-server) to get the latest version of the Azure MFA Server.
25+
* Upgrade Azure MFA Servers (Subordinates then Master)
26+
* Upgrade the User Portal instances
27+
* Upgrade the AD FS Adapter instances
28+
29+
## Upgrade Azure MFA Server
30+
31+
1. Use the instructions in [Download the Azure Multi-Factor Authentication Server](howto-mfaserver-deploy.md#download-the-mfa-server) to get the latest version of the Azure MFA Server installer.
2632
2. Make a backup of the MFA Server data file located at C:\Program Files\Multi-Factor Authentication Server\Data\PhoneFactor.pfdata (assuming the default install location) on your master MFA Server.
27-
3. If you run multiple servers for high availability, change the client systems that authenticate to the MFA Server so that they stop sending traffic to the servers that are upgrading. If you use a load balancer, remove a MFA Server from the load balancer, do the upgrade, and then add the server back into the farm.
28-
4. Run the new installer on each MFA Server. Upgrade subordinate servers first because they can read the old data file being replicated by the master.
33+
3. If you run multiple servers for high availability, change the client systems that authenticate to the MFA Server so that they stop sending traffic to the servers that are upgrading. If you use a load balancer, remove a subordinate MFA Server from the load balancer, do the upgrade, and then add the server back into the farm.
34+
4. Run the new installer on each MFA Server. Upgrade subordinate servers first because they can read the old data file being replicated by the master.
2935

30-
You do not need to uninstall your current MFA Server before running the installer. The installer performs an in-place upgrade. The installation path is picked up from the registry from the previous installation, so it installs in the same location (for example, C:\Program Files\Multi-Factor Authentication Server).
36+
> [!NOTE]
37+
> When upgrading a server it should be removed from any loadbalancing or traffic sharing with other MFA Servers.
38+
>
39+
> You do not need to uninstall your current MFA Server before running the installer. The installer performs an in-place upgrade. The installation path is picked up from the registry from the previous installation, so it installs in the same location (for example, C:\Program Files\Multi-Factor Authentication Server).
3140
3241
5. If you're prompted to install a Microsoft Visual C++ 2015 Redistributable update package, accept the prompt. Both the x86 and x64 versions of the package are installed.
33-
5. If you use the Web Service SDK, you are prompted to install the new Web Service SDK. When you install the new Web Service SDK, make sure that the virtual directory name matches the previously installed virtual directory (for example, MultiFactorAuthWebServiceSdk).
34-
6. Repeat the steps on all subordinate servers. Promote one of the subordinates to be the new master, then upgrade the old master server.
42+
6. If you use the Web Service SDK, you are prompted to install the new Web Service SDK. When you install the new Web Service SDK, make sure that the virtual directory name matches the previously installed virtual directory (for example, MultiFactorAuthWebServiceSdk).
43+
7. Repeat the steps on all subordinate servers. Promote one of the subordinates to be the new master, then upgrade the old master server.
3544

3645
## Upgrade the User Portal
3746

47+
Complete the upgrade of your MFA Servers before moving to this section.
48+
3849
1. Make a backup of the web.config file that is in the virtual directory of the User Portal installation location (for example, C:\inetpub\wwwroot\MultiFactorAuth). If any changes were made to the default theme, make a backup of the App_Themes\Default folder as well. It is better to create a copy of the Default folder and create a new theme than to change the Default theme.
3950
2. If the User Portal runs on the same server as the other MFA Server components, the MFA Server installation prompts you to update the User Portal. Accept the prompt and install the User Portal update. Check that the virtual directory name matches the previously installed virtual directory (for example, MultiFactorAuth).
40-
3. If the User Portal is on its own server, copy the MultiFactorAuthenticationUserPortalSetup64.msi file from the install location of one of the MFA Servers and put it onto the User Portal web server. Run the installer.
51+
3. If the User Portal is on its own server, copy the MultiFactorAuthenticationUserPortalSetup64.msi file from the install location of one of the MFA Servers and put it onto the User Portal web server. Run the installer.
4152

42-
If an error occurs stating, "Microsoft Visual C++ 2015 Redistributable Update 1 or higher is required," download and install the latest update package from the [Microsoft Download Center](https://www.microsoft.com/download/). Install both the x86 and x64 versions.
53+
If an error occurs stating, "Microsoft Visual C++ 2015 Redistributable Update 1 or higher is required," download and install the latest update package from the [Microsoft Download Center](https://www.microsoft.com/download/). Install both the x86 and x64 versions.
4354

4455
4. After the updated User Portal software is installed, compare the web.config backup you made in step 1 with the new web.config file. If no new attributes exist in the new web.config, copy your backup web.config into the virtual directory to overwrite the new one. Another option is to copy/paste the appSettings values and the Web Service SDK URL from the backup file into the new web.config.
4556

46-
If you have the User Portal on multiple servers, repeat the installation on all of them.
57+
If you have the User Portal on multiple servers, repeat the installation on all of them.
4758

4859
## Upgrade the Mobile App Web Service
4960

@@ -52,35 +63,37 @@ If you have the User Portal on multiple servers, repeat the installation on all
5263
5364
## Upgrade the AD FS Adapters
5465

66+
Complete the upgrade of your MFA Servers and User Portal before moving to this section.
67+
5568
### If MFA runs on different servers than AD FS
5669

5770
These instructions only apply if you run Multi-Factor Authentication Server separately from your AD FS servers. If both services run on the same servers, skip this section and go to the installation steps.
5871

5972
1. Save a copy of the MultiFactorAuthenticationAdfsAdapter.config file that was registered in AD FS, or export the configuration using the following PowerShell command: `Export-AdfsAuthenticationProviderConfigurationData -Name [adapter name] -FilePath [path to config file]`. The adapter name is either "WindowsAzureMultiFactorAuthentication" or "AzureMfaServerAuthentication" depending on the version previously installed.
6073
2. Copy the following files from the MFA Server installation location to the AD FS servers:
6174

62-
- MultiFactorAuthenticationAdfsAdapterSetup64.msi
63-
- Register-MultiFactorAuthenticationAdfsAdapter.ps1
64-
- Unregister-MultiFactorAuthenticationAdfsAdapter.ps1
65-
- MultiFactorAuthenticationAdfsAdapter.config
75+
* MultiFactorAuthenticationAdfsAdapterSetup64.msi
76+
* Register-MultiFactorAuthenticationAdfsAdapter.ps1
77+
* Unregister-MultiFactorAuthenticationAdfsAdapter.ps1
78+
* MultiFactorAuthenticationAdfsAdapter.config
6679

67-
3. Edit the Register-MultiFactorAuthenticationAdfsAdapter.ps1 script by adding `-ConfigurationFilePath [path]` to the end of the `Register-AdfsAuthenticationProvider` command. Replace *[path]* with the full path to the MultiFactorAuthenticationAdfsAdapter.config file or the configuration file exported in the previous step.
80+
3. Edit the Register-MultiFactorAuthenticationAdfsAdapter.ps1 script by adding `-ConfigurationFilePath [path]` to the end of the `Register-AdfsAuthenticationProvider` command. Replace *[path]* with the full path to the MultiFactorAuthenticationAdfsAdapter.config file or the configuration file exported in the previous step.
6881

69-
Check the attributes in the new MultiFactorAuthenticationAdfsAdapter.config to see if they match the old config file. If any attributes were added or removed in the new version, copy the attribute values from the old configuration file to the new one or modify the old configuration file to match.
82+
Check the attributes in the new MultiFactorAuthenticationAdfsAdapter.config to see if they match the old config file. If any attributes were added or removed in the new version, copy the attribute values from the old configuration file to the new one or modify the old configuration file to match.
7083

7184
### Install new AD FS adapters
7285

73-
> [!IMPORTANT]
86+
> [!IMPORTANT]
7487
> Your users will not be required to perform two-step verification during steps 3-8 of this section. If you have AD FS configured in multiple clusters, you can remove, upgrade, and restore each cluster in the farm independently of the other clusters to avoid downtime.
7588
7689
1. Remove some AD FS servers from the farm. Update these servers while the others are still running.
77-
2. Install the new AD FS adapter on each server removed from the AD FS farm. If the MFA Server is installed on each AD FS server, you can update through the MFA Server admin UX. Otherwise, update by running MultiFactorAuthenticationAdfsAdapterSetup64.msi.
90+
2. Install the new AD FS adapter on each server removed from the AD FS farm. If the MFA Server is installed on each AD FS server, you can update through the MFA Server admin UX. Otherwise, update by running MultiFactorAuthenticationAdfsAdapterSetup64.msi.
7891

79-
If an error occurs stating, "Microsoft Visual C++ 2015 Redistributable Update 1 or higher is required," download and install the latest update package from the [Microsoft Download Center](https://www.microsoft.com/download/). Install both the x86 and x64 versions.
92+
If an error occurs stating, "Microsoft Visual C++ 2015 Redistributable Update 1 or higher is required," download and install the latest update package from the [Microsoft Download Center](https://www.microsoft.com/download/). Install both the x86 and x64 versions.
8093

81-
3. Go to **AD FS** > **Authentication Policies** > **Edit Global MultiFactor Authentication Policy**. Uncheck **WindowsAzureMultiFactorAuthentication** or **AzureMFAServerAuthentication** (depending on the current version installed).
94+
3. Go to **AD FS** > **Authentication Policies** > **Edit Global MultiFactor Authentication Policy**. Uncheck **WindowsAzureMultiFactorAuthentication** or **AzureMFAServerAuthentication** (depending on the current version installed).
8295

83-
Once this step is complete, two-step verification through MFA Server is not available in this AD FS cluster until you complete step 8.
96+
Once this step is complete, two-step verification through MFA Server is not available in this AD FS cluster until you complete step 8.
8497

8598
4. Unregister the older version of the AD FS adapter by running the Unregister-MultiFactorAuthenticationAdfsAdapter.ps1 PowerShell script. Ensure that the *-Name* parameter (either “WindowsAzureMultiFactorAuthentication” or "AzureMFAServerAuthentication") matches the name that was displayed in step 3. This applies to all servers in the same AD FS cluster since there is a central configuration.
8699
5. Register the new AD FS adapter by running the Register-MultiFactorAuthenticationAdfsAdapter.ps1 PowerShell script. This applies to all servers in the same AD FS cluster since there is a central configuration.
@@ -92,8 +105,8 @@ These instructions only apply if you run Multi-Factor Authentication Server sepa
92105

93106
## Next steps
94107

95-
- Get examples of [Advanced scenarios with Azure Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md)
108+
* Get examples of [Advanced scenarios with Azure Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md)
96109

97-
- [Synchronize MFA Server with Windows Server Active Directory](howto-mfaserver-dir-ad.md)
110+
* [Synchronize MFA Server with Windows Server Active Directory](howto-mfaserver-dir-ad.md)
98111

99-
- [Configure Windows Authentication](howto-mfaserver-windows.md) for your applications
112+
* [Configure Windows Authentication](howto-mfaserver-windows.md) for your applications

0 commit comments

Comments
 (0)