Skip to content

Commit af3ca83

Browse files
committed
2 parents 9fd3d74 + af6bf99 commit af3ca83

File tree

153 files changed

+1683
-836
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+1683
-836
lines changed

.openpublishing.redirection.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45552,12 +45552,12 @@
4555245552
},
4555345553
{
4555445554
"source_path": "articles/iot-central/core/howto-export-data-blob-storage.md",
45555-
"redirect_url": "/azure/iot-central/core/",
45555+
"redirect_url": "/azure/iot-central/core/howto-export-data/",
4555645556
"redirect_document_id": false
4555745557
},
4555845558
{
4555945559
"source_path": "articles/iot-central/core/howto-export-data-event-hubs-service-bus.md",
45560-
"redirect_url": "/azure/iot-central/core/",
45560+
"redirect_url": "/azure/iot-central/core/howto-export-data/",
4556145561
"redirect_document_id": false
4556245562
},
4556345563
{

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/14/2020
12+
ms.date: 02/20/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -52,7 +52,7 @@ Configure pre-built policies for sign-up, sign-in, combined sign-up and sign-in,
5252

5353
The following operations allow you to manage your Azure AD B2C Trust Framework policies, known as [custom policies](custom-policy-overview.md).
5454

55-
- [List all trust framework policies configured in a tenant](https://docs.microsoft.com/graph/api/trustframework-list-trustframeworkpolicies.md)
55+
- [List all trust framework policies configured in a tenant](https://docs.microsoft.com/graph/api/trustframework-list-trustframeworkpolicies)
5656
- [Create trust framework policy](https://docs.microsoft.com/graph/api/trustframework-post-trustframeworkpolicy)
5757
- [Read properties of an existing trust framework policy](https://docs.microsoft.com/graph/api/trustframeworkpolicy-get)
5858
- [Update or create trust framework policy.](https://docs.microsoft.com/graph/api/trustframework-put-trustframeworkpolicy)

articles/active-directory-domain-services/join-windows-vm.md

Lines changed: 20 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/30/2019
11+
ms.date: 02/19/2020
1212
ms.author: iainfou
1313

1414
#Customer intent: As an server administrator, I want to learn how to join a Windows Server VM to an Azure Active Directory Domain Services managed domain to provide centralized identity and policy.
@@ -21,7 +21,7 @@ In this tutorial, you learn how to:
2121

2222
> [!div class="checklist"]
2323
> * Create a Windows Server VM
24-
> * Connect to the Windows Server VM to an Azure virtual network
24+
> * Connect the Windows Server VM to an Azure virtual network
2525
> * Join the VM to the Azure AD DS managed domain
2626
2727
If you don’t have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -38,6 +38,8 @@ To complete this tutorial, you need the following resources:
3838
* If needed, [create and configure an Azure Active Directory Domain Services instance][create-azure-ad-ds-instance].
3939
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
4040
* Make sure that Azure AD Connect password hash synchronization or self-service password reset has been performed so the account is able to sign in to Azure AD DS managed domain.
41+
* An Azure Bastion host deployed in your Azure AD DS virtual network.
42+
* If needed, [create an Azure Bastion host][azure-bastion].
4143

4244
If you already have a VM that you want to domain-join, skip to the section to [join the VM to the Azure AD DS managed domain](#join-the-vm-to-the-azure-ad-ds-managed-domain).
4345

@@ -67,13 +69,13 @@ If you already have a VM that you want to domain-join, skip to the section to [j
6769
| Username | Enter a username for the local administrator account to create on the VM, such as *azureuser* |
6870
| Password | Enter, and then confirm, a secure password for the local administrator to create on the VM. Don't specify a domain user account's credentials. |
6971

70-
1. By default, VMs created in Azure aren't accessible from the Internet. This configuration helps improve the security of the VM and reduces the area for potential attack. In the next step of this tutorial, you need to connect to the VM using remote desktop protocol (RDP) and then join the Windows Server to the Azure AD DS managed domain.
72+
1. By default, VMs created in Azure are accessible from the Internet using RDP. When RDP is enabled, automated sign in attacks are likely to occur, which may disable accounts with common names such as *admin* or *administrator* due to multiple failed successive sign in attempts.
7173

72-
When RDP is enabled, automated sign in attacks are likely to occur, which may disable accounts with common names such as *admin* or *administrator* due to multiple failed successive sign in attempts. RDP should only be enabled when required, and limited to a set of authorized IP ranges. [Azure Just In Time VM access][jit-access] as part of Azure Security Center can enable these short-lived, restricted RDP sessions. You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over SSL.
74+
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over SSL. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
7375

74-
For this tutorial, manually enable RDP connections to the VM.
76+
For now, disable direct RDP connections to the VM.
7577

76-
Under **Public inbound ports**, select the option to **Allow selected ports**. From the drop-down menu for **Select inbound ports**, choose *RDP (3389)*.
78+
Under **Public inbound ports**, select *None*.
7779

7880
1. When done, select **Next: Disks**.
7981
1. From the drop-down menu for **OS disk type**, choose *Standard SSD*, then select **Next: Networking**.
@@ -117,20 +119,23 @@ It takes a few minutes to create the VM. The Azure portal shows the status of th
117119

118120
## Connect to the Windows Server VM
119121

120-
Now let's connect to the newly created Windows Server VM using RDP and join the Azure AD DS managed domain. Use the local administrator credentials that you specified when the VM was created in the previous step, not any existing domain credentials.
122+
To securely connect to your VMs, use an Azure Bastion host. With Azure Bastion, a managed host is deployed into your virtual network and provides web-based RDP or SSH connections to VMs. No public IP addresses are required for the VMs, and you don't need to open network security group rules for external remote traffic. You connect to VMs using the Azure portal from your web browser.
123+
124+
To use a Bastion host to connect to your VM, complete the following steps:
125+
126+
1. In the **Overview** pane for your VM, select **Connect**, then **Bastion**.
121127

122-
1. In the **Overview** pane, select **Connect**.
128+
![Connect to Windows virtual machine using Bastion in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
123129

124-
![Connect to Windows virtual machine in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
130+
1. Enter the credentials for your VM that you specified in the previous section, then select **Connect**.
125131

126-
1. Select the option to *Download RDP File*. Save this RDP file in your web browser.
127-
1. To connect to your VM, open the downloaded RDP file. If prompted, select **Connect**.
128-
1. Enter the local administrator credentials you entered in the previous step to create the VM, such as *localhost\azureuser*
129-
1. If you see a certificate warning during the sign in process, select **Yes** or **Continue** to connect.
132+
![Connect through the Bastion host in the Azure portal](./media/join-windows-vm/connect-to-bastion.png)
133+
134+
If needed, allow your web browser to open pop-ups for the Bastion connection to be displayed. It takes a few seconds to make the connection to your VM.
130135

131136
## Join the VM to the Azure AD DS managed domain
132137

133-
With the VM created and an RDP connection establish, now let's join the Windows Server virtual machine to the Azure AD DS managed domain. This process is the same as a computer connecting to a regular on-premises Active Directory Domain Services domain.
138+
With the VM created and a web-based RDP connection established using Azure Bastion, now let's join the Windows Server virtual machine to the Azure AD DS managed domain. This process is the same as a computer connecting to a regular on-premises Active Directory Domain Services domain.
134139

135140
1. If **Server Manager** doesn't open by default when you sign in to the VM, select the **Start** menu, then choose **Server Manager**.
136141
1. In the left pane of the **Server Manager** window, select **Local Server**. Under **Properties** on the right pane, choose **Workgroup**.
@@ -171,23 +176,14 @@ Once the Windows Server VM has restarted, any policies applied in the Azure AD D
171176

172177
## Clean up resources
173178

174-
In the next tutorial, you use this Windows Server VM to install the management tools that let you administer the Azure AD DS managed domain. If you don't want to continue in this tutorial series, review the following clean up steps to [disable RDP](#disable-rdp) or [delete the VM](#delete-the-vm). Otherwise, [continue to the next tutorial](#next-steps).
179+
In the next tutorial, you use this Windows Server VM to install the management tools that let you administer the Azure AD DS managed domain. If you don't want to continue in this tutorial series, review the following clean up steps to [delete the VM](#delete-the-vm). Otherwise, [continue to the next tutorial](#next-steps).
175180

176181
### Un-join the VM from Azure AD DS managed domain
177182

178183
To remove the VM from the Azure AD DS managed domain, follow through the steps again to [join the VM to a domain](#join-the-vm-to-the-azure-ad-ds-managed-domain). Instead of joining the Azure AD DS managed domain, choose to join a workgroup, such as the default *WORKGROUP*. After the VM has rebooted, the computer object is removed from the Azure AD DS managed domain.
179184

180185
If you [delete the VM](#delete-the-vm) without unjoining from the domain, an orphaned computer object is left in Azure AD DS.
181186

182-
### Disable RDP
183-
184-
If you continue to use the Windows Server VM created in this tutorial for running your own applications or workloads, recall that RDP was open over the Internet. To improve the security and reduce the risk of attack, RDP should be disabled over the Internet. To disable RDP to the Windows Server VM over the internet, complete the following steps:
185-
186-
1. From the left-hand menu, select **Resource groups**
187-
1. Choose your resource group, such as *myResourceGroup*.
188-
1. Choose your VM, such as *myVM*, then select *Networking*.
189-
1. Under **Inbound network security rules** for the network security group, select the rule that allows RDP, then choose **Delete**. It takes a few seconds to remove the inbound security rule.
190-
191187
### Delete the VM
192188

193189
If you're not going use this Windows Server VM, delete the VM using the following steps:
@@ -246,6 +242,5 @@ To administer your Azure AD DS managed domain, configure a management VM using t
246242
[vnet-peering]: ../virtual-network/virtual-network-peering-overview.md
247243
[password-sync]: active-directory-ds-getting-started-password-sync.md
248244
[add-computer]: /powershell/module/microsoft.powershell.management/add-computer
249-
[jit-access]: ../security-center/security-center-just-in-time.md
250245
[azure-bastion]: ../bastion/bastion-create-host-portal.md
251246
[set-azvmaddomainextension]: /powershell/module/az.compute/set-azvmaddomainextension
48.9 KB
Loading
-9.75 KB
Loading

articles/active-directory-domain-services/tutorial-create-management-vm.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@ To complete this tutorial, you need the following resources and privileges:
4242
* A Windows Server VM that is joined to the Azure AD DS managed domain.
4343
* If needed, see the previous tutorial to [create a Windows Server VM and join it to a managed domain][create-join-windows-vm].
4444
* A user account that's a member of the *Azure AD DC administrators* group in your Azure AD tenant.
45+
* An Azure Bastion host deployed in your Azure AD DS virtual network.
46+
* If needed, [create an Azure Bastion host][azure-bastion].
4547

4648
## Sign in to the Azure portal
4749

@@ -82,16 +84,15 @@ In the previous tutorial, a Windows Server VM was created and joined to the Azur
8284
To get started, connect to the Windows Server VM as follows:
8385

8486
1. In the Azure portal, select **Resource groups** on the left-hand side. Choose the resource group where your VM was created, such as *myResourceGroup*, then select the VM, such as *myVM*.
85-
1. In the **Overview** windows of the VM, select **Connect**.
87+
1. In the **Overview** pane for your VM, select **Connect**, then **Bastion**.
8688

87-
![Connect to Windows virtual machine in the Azure portal](./media/tutorial-create-management-vm/connect-vm.png)
89+
![Connect to Windows virtual machine using Bastion in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
8890

89-
You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over SSL.
91+
1. Enter the credentials for your VM, then select **Connect**.
9092

91-
1. Select the option to *Download RDP File*. Save this RDP file in your web browser.
92-
1. To connect to your VM, open the downloaded RDP file. If prompted, select **Connect**.
93-
1. Enter the credentials of a user that's part of the *Azure AD DC administrators* group, such as *contoso\dee*
94-
1. If you see a certificate warning during the sign in process, select **Yes** or **Continue** to connect.
93+
![Connect through the Bastion host in the Azure portal](./media/join-windows-vm/connect-to-bastion.png)
94+
95+
If needed, allow your web browser to open pop-ups for the Bastion connection to be displayed. It takes a few seconds to make the connection to your VM.
9596

9697
## Install Active Directory administrative tools
9798

articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmimart
77
manager: CelesteDG
88
ms.assetid:
99
ms.service: active-directory
10-
ms.subservice: app-mgmt
10+
ms.subservice: app-provisioning
1111
ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na

articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88

99
ms.assetid:
1010
ms.service: active-directory
11-
ms.subservice: app-mgmt
11+
ms.subservice: app-provisioning
1212
ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na

articles/active-directory/app-provisioning/application-provisioning-config-problem-storage-limit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88

99
ms.assetid:
1010
ms.service: active-directory
11-
ms.subservice: app-mgmt
11+
ms.subservice: app-provisioning
1212
ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na

articles/active-directory/app-provisioning/application-provisioning-config-problem-wrong-users-provisioned.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88

99
ms.assetid:
1010
ms.service: active-directory
11-
ms.subservice: app-mgmt
11+
ms.subservice: app-provisioning
1212
ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na

0 commit comments

Comments
 (0)