Skip to content

Commit a9784a3

Browse files
authored
Merge pull request #116144 from MicrosoftDocs/master
5/21 PM Publish
2 parents 318d1ba + caf1ecc commit a9784a3

File tree

89 files changed

+3017
-1111
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+3017
-1111
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52433,7 +52433,16 @@
5243352433
"source_path": "articles/cdn/endpoint-multiorigin.md",
5243452434
"redirect_url": "/azure/cdn/cdn-overview",
5243552435
"redirect_document_id": false
52436+
},
52437+
{
52438+
"source_path": "articles/batch/batch-api-basics.md",
52439+
"redirect_url": "/azure/batch/batch-service-workflow-features",
52440+
"redirect_document_id": false
52441+
},
52442+
{
52443+
"source_path": "articles/batch/batch-retry-after-errors.md",
52444+
"redirect_url": "/azure/batch/error-handling",
52445+
"redirect_document_id": false
5243652446
}
52437-
5243852447
]
5243952448
}

articles/active-directory/devices/hybrid-azuread-join-federated-domains.md

Lines changed: 52 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -178,25 +178,69 @@ The installer creates a scheduled task on the system that runs in the user conte
178178

179179
## Verify the registration
180180

181-
To verify the device registration state in your Azure tenant, you can use the **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)** cmdlet in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
181+
Here are 3 ways to locate and verify the device state:
182+
183+
### Locally on the device
184+
185+
1. Open Windows PowerShell.
186+
2. Enter `dsregcmd /status`.
187+
3. Verify that both **AzureAdJoined** and **DomainJoined** are set to **YES**.
188+
4. You can use the **DeviceId** and compare the status on the service using either the Azure portal or PowerShell.
189+
190+
### Using the Azure portal
191+
192+
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
193+
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](https://docs.microsoft.com/azure/active-directory/devices/device-management-azure-portal#locate-devices).
194+
3. If the **Registered** column says **Pending**, then Hybrid Azure AD Join has not completed. In federated environments, this can happen only if it failed to register and AAD connect is configured to sync the devices.
195+
4. If the **Registered** column contains a **date/time**, then Hybrid Azure AD Join has completed.
196+
197+
### Using PowerShell
198+
199+
Verify the device registration state in your Azure tenant by using **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)**. This cmdlet is in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
182200

183201
When you use the **Get-MSolDevice** cmdlet to check the service details:
184202

185203
- An object with the **device ID** that matches the ID on the Windows client must exist.
186-
- The value for **DeviceTrustType** must be **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state under **Devices** in the Azure AD portal.
187-
- For devices that are used in Conditional Access, the value for **Enabled** must be **True** and **DeviceTrustLevel** must be **Managed**.
188-
189-
**To check the service details**:
204+
- The value for **DeviceTrustType** is **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state on the **Devices** page in the Azure AD portal.
205+
- For devices that are used in Conditional Access, the value for **Enabled** is **True** and **DeviceTrustLevel** is **Managed**.
190206

191207
1. Open Windows PowerShell as an administrator.
192-
1. Enter `Connect-MsolService` to connect to your Azure tenant.
193-
1. Enter `get-msoldevice -deviceId <deviceId>`.
194-
1. Verify that **Enabled** is set to **True**.
208+
2. Enter `Connect-MsolService` to connect to your Azure tenant.
209+
210+
#### Count all Hybrid Azure AD joined devices (excluding **Pending** state)
211+
212+
```azurepowershell
213+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
214+
```
215+
216+
#### Count all Hybrid Azure AD joined devices with **Pending** state
217+
218+
```azurepowershell
219+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
220+
```
221+
222+
#### List all Hybrid Azure AD joined devices
223+
224+
```azurepowershell
225+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
226+
```
227+
228+
#### List all Hybrid Azure AD joined devices with **Pending** state
229+
230+
```azurepowershell
231+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
232+
```
233+
234+
#### List details of a single device:
235+
236+
1. Enter `get-msoldevice -deviceId <deviceId>` (This is the **DeviceId** obtained locally on the device).
237+
2. Verify that **Enabled** is set to **True**.
195238

196239
## Troubleshoot your implementation
197240

198241
If you experience issues with completing hybrid Azure AD join for domain-joined Windows devices, see:
199242

243+
- [Troubleshooting devices using dsregcmd command](https://docs.microsoft.com/azure/active-directory/devices/troubleshoot-device-dsregcmd)
200244
- [Troubleshoot hybrid Azure AD join for Windows current devices](troubleshoot-hybrid-join-windows-current.md)
201245
- [Troubleshoot hybrid Azure AD join for Windows downlevel devices](troubleshoot-hybrid-join-windows-legacy.md)
202246

articles/active-directory/devices/hybrid-azuread-join-managed-domains.md

Lines changed: 49 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,24 @@ The installer creates a scheduled task on the system that runs in the user conte
158158

159159
## Verify the registration
160160

161+
Here are 3 ways to locate and verify the device state:
162+
163+
### Locally on the device
164+
165+
1. Open Windows PowerShell.
166+
2. Enter `dsregcmd /status`.
167+
3. Verify that both **AzureAdJoined** and **DomainJoined** are set to **YES**.
168+
4. You can use the **DeviceId** and compare the status on the service using either the Azure portal or PowerShell.
169+
170+
### Using the Azure portal
171+
172+
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
173+
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](https://docs.microsoft.com/azure/active-directory/devices/device-management-azure-portal#locate-devices).
174+
3. If the **Registered** column says **Pending**, then Hybrid Azure AD Join has not completed.
175+
4. If the **Registered** column contains a **date/time**, then Hybrid Azure AD Join has completed.
176+
177+
### Using PowerShell
178+
161179
Verify the device registration state in your Azure tenant by using **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)**. This cmdlet is in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
162180

163181
When you use the **Get-MSolDevice** cmdlet to check the service details:
@@ -166,17 +184,43 @@ When you use the **Get-MSolDevice** cmdlet to check the service details:
166184
- The value for **DeviceTrustType** is **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state on the **Devices** page in the Azure AD portal.
167185
- For devices that are used in Conditional Access, the value for **Enabled** is **True** and **DeviceTrustLevel** is **Managed**.
168186

169-
To check the service details:
170-
171187
1. Open Windows PowerShell as an administrator.
172-
1. Enter `Connect-MsolService` to connect to your Azure tenant.
173-
1. Enter `get-msoldevice -deviceId <deviceId>`.
174-
1. Verify that **Enabled** is set to **True**.
188+
2. Enter `Connect-MsolService` to connect to your Azure tenant.
189+
190+
#### Count all Hybrid Azure AD joined devices (excluding **Pending** state)
191+
192+
```azurepowershell
193+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
194+
```
195+
196+
#### Count all Hybrid Azure AD joined devices with **Pending** state
197+
198+
```azurepowershell
199+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
200+
```
201+
202+
#### List all Hybrid Azure AD joined devices
203+
204+
```azurepowershell
205+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
206+
```
207+
208+
#### List all Hybrid Azure AD joined devices with **Pending** state
209+
210+
```azurepowershell
211+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
212+
```
213+
214+
#### List details of a single device:
215+
216+
1. Enter `get-msoldevice -deviceId <deviceId>` (This is the **DeviceId** obtained locally on the device).
217+
2. Verify that **Enabled** is set to **True**.
175218

176219
## Troubleshoot your implementation
177220

178221
If you experience issues completing hybrid Azure AD join for domain-joined Windows devices, see:
179222

223+
- [Troubleshooting devices using dsregcmd command](https://docs.microsoft.com/azure/active-directory/devices/troubleshoot-device-dsregcmd)
180224
- [Troubleshooting hybrid Azure Active Directory joined devices](troubleshoot-hybrid-join-windows-current.md)
181225
- [Troubleshooting hybrid Azure Active Directory joined down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
182226

articles/active-directory/devices/hybrid-azuread-join-manual.md

Lines changed: 60 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -548,16 +548,71 @@ To register Windows down-level devices, you need to download and install a Windo
548548

549549
## Verify joined devices
550550

551-
You can check for successfully joined devices in your organization by using the [Get-MsolDevice](/powershell/msonline/v1/get-msoldevice) cmdlet in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
551+
Here are 3 ways to locate and verify the device state:
552552

553-
The output of this cmdlet shows devices that are registered and joined with Azure AD. To get all devices, use the **-All** parameter, and then filter them by using the **deviceTrustType** property. Domain-joined devices have a value of **Domain Joined**.
553+
### Locally on the device
554+
555+
1. Open Windows PowerShell.
556+
2. Enter `dsregcmd /status`.
557+
3. Verify that both **AzureAdJoined** and **DomainJoined** are set to **YES**.
558+
4. You can use the **DeviceId** and compare the status on the service using either the Azure portal or PowerShell.
559+
560+
### Using the Azure portal
561+
562+
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
563+
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](https://docs.microsoft.com/azure/active-directory/devices/device-management-azure-portal#locate-devices).
564+
3. If the **Registered** column says **Pending**, then Hybrid Azure AD Join has not completed. In federated environments, this can happen only if it failed to register and AAD connect is configured to sync the devices.
565+
4. If the **Registered** column contains a **date/time**, then Hybrid Azure AD Join has completed.
566+
567+
### Using PowerShell
568+
569+
Verify the device registration state in your Azure tenant by using **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)**. This cmdlet is in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
570+
571+
When you use the **Get-MSolDevice** cmdlet to check the service details:
572+
573+
- An object with the **device ID** that matches the ID on the Windows client must exist.
574+
- The value for **DeviceTrustType** is **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state on the **Devices** page in the Azure AD portal.
575+
- For devices that are used in Conditional Access, the value for **Enabled** is **True** and **DeviceTrustLevel** is **Managed**.
576+
577+
1. Open Windows PowerShell as an administrator.
578+
2. Enter `Connect-MsolService` to connect to your Azure tenant.
579+
580+
#### Count all Hybrid Azure AD joined devices (excluding **Pending** state)
581+
582+
```azurepowershell
583+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
584+
```
585+
586+
#### Count all Hybrid Azure AD joined devices with **Pending** state
587+
588+
```azurepowershell
589+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
590+
```
591+
592+
#### List all Hybrid Azure AD joined devices
593+
594+
```azurepowershell
595+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
596+
```
597+
598+
#### List all Hybrid Azure AD joined devices with **Pending** state
599+
600+
```azurepowershell
601+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
602+
```
603+
604+
#### List details of a single device:
605+
606+
1. Enter `get-msoldevice -deviceId <deviceId>` (This is the **DeviceId** obtained locally on the device).
607+
2. Verify that **Enabled** is set to **True**.
554608

555609
## Troubleshoot your implementation
556610

557-
If you're experiencing issues with completing hybrid Azure AD join for domain-joined Windows devices, see:
611+
If you experience issues completing hybrid Azure AD join for domain-joined Windows devices, see:
558612

559-
* [Troubleshooting Hybrid Azure AD join for Windows current devices](troubleshoot-hybrid-join-windows-current.md)
560-
* [Troubleshooting Hybrid Azure AD join for Windows down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
613+
- [Troubleshooting devices using dsregcmd command](https://docs.microsoft.com/azure/active-directory/devices/troubleshoot-device-dsregcmd)
614+
- [Troubleshooting hybrid Azure Active Directory joined devices](troubleshoot-hybrid-join-windows-current.md)
615+
- [Troubleshooting hybrid Azure Active Directory joined down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
561616

562617
## Next steps
563618

articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,6 @@ Once you've configured provisioning, use the following resources to monitor your
137137
* **InvalidLookupReference:** When provisioning certain attributes such as Department and Location in ServiceNow, the values must already exist in a reference table in ServiceNow. For example, you may have two locations (Seattle, Los Angeles) and three departments (Sales, Finance, Marketing) in the **insert table name** table in ServiceNow. If you attempt to provision a user where his department is "Sales" and location is "Seattle" he will be provisioned successfully. If you attempt to provision a user with department "Sales" and location "LA" the user won't be provisioned. The location LA must either be added to the reference table in ServiceNow or the user attribute in Azure AD must be updated to match the format in ServiceNow.
138138
* **EntryJoiningPropertyValueIsMissing:** Review your [attribute mappings](https://docs.microsoft.com/azure/active-directory/manage-apps/customize-application-attributes) to identify the matching attribute. This value must be present on the user or group you're attempting to provision.
139139
* Review the [ServiceNow SOAP API](https://docs.servicenow.com/bundle/newyork-application-development/page/integrate/web-services-apis/reference/r_DirectWebServiceAPIFunctions.html) to understand any requirements or limitations (for example, format to specify country code for a user)
140-
* Some ServiceNow deployments require permitting IP ranges for the Azure AD provisioning service. The reserved IP ranges for the Azure AD provisioning service can be found [here](https://www.microsoft.com/download/details.aspx?id=56519) under "AzureActiveDirectoryDomainServices".
141140
* Provisioning requests are sent by default to https://{your-instance-name}.service-now.com/{table-name} . If you require a custom tenant URL, you can provide the entire URL in the instance name field.
142141

143142
## Additional resources

articles/analysis-services/analysis-services-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This tier is recommended for evaluation, development, and test scenarios. A sing
4343

4444
### Basic tier
4545

46-
The tier is recommended for production solutions with smaller tabular models, limited user concurrency, and simple data refresh requirements. Query replica scale-out *is not available* for this tier. Perspectives, multiple partitions, and DirectQuery tabular model features *are not supported* in this tier.
46+
This tier is recommended for production solutions with smaller tabular models, limited user concurrency, and simple data refresh requirements. Query replica scale-out *is not available* for this tier. Perspectives, multiple partitions, and DirectQuery tabular model features *are not supported* in this tier.
4747

4848
|Plan |QPUs |Memory (GB) |
4949
|---------|---------|---------|

articles/app-service/app-service-undelete.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ The detailed information includes:
4343
- **Deletion Time**: When was the app deleted
4444

4545
## Restore deleted app
46+
>[!NOTE]
47+
> `Restore-AzDeletedWebApp` isn't supported for function apps.
4648
4749
Once the app you want to restore has been identified, you can restore it using `Restore-AzDeletedWebApp`.
4850

articles/app-service/overview-managed-identity.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,11 @@ To set up a managed identity in the portal, you will first create an application
3737

3838
![Managed identity in App Service](media/app-service-managed-service-identity/system-assigned-managed-identity-in-azure-portal.png)
3939

40+
41+
> [!NOTE]
42+
> To find the managed identity for your web or slot app in the Azure portal, go to the User settings section under Enterprise applications.
43+
44+
4045
### Using the Azure CLI
4146

4247
To set up a managed identity using the Azure CLI, you will need to use the `az webapp identity assign` command against an existing application. You have three options for running the examples in this section:

articles/application-gateway/quick-create-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: vhorne
77
ms.service: application-gateway
88
ms.topic: quickstart
9-
ms.date: 03/09/2020
9+
ms.date: 05/21/2020
1010
ms.author: victorh
1111
ms.custom: mvc
1212
---
@@ -226,4 +226,4 @@ To delete the resource group:
226226
## Next steps
227227
228228
> [!div class="nextstepaction"]
229-
> [Manage web traffic with an application gateway using the Azure CLI](./tutorial-manage-web-traffic-cli.md)
229+
> [Tutorial: Configure an application gateway with TLS termination using the Azure portal](create-ssl-portal.md)

articles/azure-arc/kubernetes/connect-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Verify you have the following requirements ready:
2121

2222
* A Kubernetes cluster that is up and running
2323
* You'll need access with kubeconfig, and cluster-admin access.
24-
* The user or service principal used with `az login` and `az connectedk8s connect` commands must have the 'Read' and 'Write' permissions on the 'Microsoft.Kubernetes/connectedclusters' resource type.
24+
* The user or service principal used with `az login` and `az connectedk8s connect` commands must have the 'Read' and 'Write' permissions on the 'Microsoft.Kubernetes/connectedclusters' resource type. The "Azure Arc for Kubernetes Onboarding" role having these permissions can be used for role assignments on the user or service principal used with Azure CLI for onboarding.
2525
* Latest version of the *connectedk8s* and *k8sconfiguration* extensions
2626

2727
## Supported regions

0 commit comments

Comments
 (0)