Skip to content

Commit b438cf2

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ignite-disk-bursting
2 parents 51a4bb1 + fc5a522 commit b438cf2

File tree

392 files changed

+11352
-4451
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

392 files changed

+11352
-4451
lines changed

.openpublishing.redirection.json

Lines changed: 419 additions & 14 deletions
Large diffs are not rendered by default.

articles/active-directory-domain-services/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Classic virtual networks aren't supported for new deployments. Existing managed
4343
Yes. Azure AD Domain Services can be enabled in an Azure Resource Manager virtual network. Classic Azure virtual networks are no longer supported for when you create a new managed domain.
4444

4545
### Can I migrate my existing managed domain from a Classic virtual network to a Resource Manager virtual network?
46-
Yes, this feature is in preview. For more information, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager (preview)][migrate-from-classic-vnet.md]
46+
Yes, this feature is in preview. For more information, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager (preview)](migrate-from-classic-vnet.md).
4747

4848
### Can I enable Azure AD Domain Services in an Azure CSP (Cloud Solution Provider) subscription?
4949
Yes. For more information, see [how to enable Azure AD Domain Services in Azure CSP subscriptions](csp.md).

articles/active-directory-domain-services/network-considerations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 08/09/2019
13+
ms.date: 10/23/2019
1414
ms.author: iainfou
1515

1616
---
@@ -87,8 +87,8 @@ An Azure AD DS managed domain creates some networking resources during deploymen
8787
| Azure resource | Description |
8888
|:----------------------------------------|:---|
8989
| Network interface card | Azure AD DS hosts the managed domain on two domain controllers (DCs) that run on Windows Server as Azure VMs. Each VM has a virtual network interface that connects to your virtual network subnet. |
90-
| Dynamic basic public IP address | Azure AD DS communicates with the synchronization and management service using a basic SKU public IP address. For more information about public IP addresses, see [IP address types and allocation methods in Azure](../virtual-network/virtual-network-ip-addresses-overview-arm.md). |
91-
| Azure basic load balancer | Azure AD DS uses a basic SKU load balancer for network address translation (NAT) and load balancing (when used with secure LDAP). For more information about Azure load balancers, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md) |
90+
| Dynamic standard public IP address | Azure AD DS communicates with the synchronization and management service using a standard SKU public IP address. For more information about public IP addresses, see [IP address types and allocation methods in Azure](../virtual-network/virtual-network-ip-addresses-overview-arm.md). |
91+
| Azure standard load balancer | Azure AD DS uses a standard SKU load balancer for network address translation (NAT) and load balancing (when used with secure LDAP). For more information about Azure load balancers, see [What is Azure Load Balancer?](../load-balancer/load-balancer-overview.md) |
9292
| Network address translation (NAT) rules | Azure AD DS creates and uses three NAT rules on the load balancer - one rule for secure HTTP traffic, and two rules for secure PowerShell remoting. |
9393
| Load balancer rules | When an Azure AD DS managed domain is configured for secure LDAP on TCP port 636, three rules are created and used on a load balancer to distribute the traffic. |
9494

articles/active-directory-domain-services/powershell-create-instance.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,12 @@ $Vnet= New-AzVirtualNetwork `
126126

127127
Now let's create an Azure AD DS managed domain. Set your Azure subscription ID, and then provide a name for the managed domain, such as *contoso.com*. You can get your subscription ID using the [Get-AzSubscription][Get-AzSubscription] cmdlet.
128128

129+
If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
130+
131+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
132+
133+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones].
134+
129135
```powershell
130136
$AzureSubscriptionId = "YOUR_AZURE_SUBSCRIPTION_ID"
131137
$ManagedDomainName = "contoso.com"
@@ -144,6 +150,8 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
144150

145151
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
146152
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
153+
* If you created an Azure AD DS managed domain in a region that supports Availability Zones, create a network security group to restrict traffic in the virtual network for the Azure AD DS managed domain. An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly.
154+
* To create the network security group and required rules, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically create and configure the network security group.
147155
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
148156

149157
## Complete PowerShell script
@@ -229,6 +237,8 @@ When the Azure portal shows that the Azure AD DS managed domain has finished pro
229237

230238
* Update DNS settings for the virtual network so virtual machines can find the managed domain for domain join or authentication.
231239
* To configure DNS, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically configure these DNS settings.
240+
* If you created an Azure AD DS managed domain in a region that supports Availability Zones, create a network security group to restrict traffic in the virtual network for the Azure AD DS managed domain. An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly.
241+
* To create the network security group and required rules, select your Azure AD DS managed domain in the portal. On the **Overview** window, you are prompted to automatically create and configure the network security group.
232242
* [Enable password synchronization to Azure AD Domain Services](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) so end users can sign in to the managed domain using their corporate credentials.
233243

234244
## Next steps
@@ -254,3 +264,4 @@ To see the Azure AD DS managed domain in action, you can [domain-join a Windows
254264
[New-AzVirtualNetwork]: /powershell/module/Az.Network/New-AzVirtualNetwork
255265
[Get-AzSubscription]: /powershell/module/Az.Accounts/Get-AzSubscription
256266
[cloud-shell]: /azure/cloud-shell/cloud-shell-windows-users
267+
[availability-zones]: ../availability-zones/az-overview.md

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/18/2019
11+
ms.date: 10/23/2019
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -86,7 +86,11 @@ The following DNS name restrictions also apply:
8686
Complete the fields in the *Basics* window of the Azure portal to create an Azure AD DS instance:
8787

8888
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
89-
1. Choose the Azure **Location** in which the managed domain should be created.
89+
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
90+
91+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
92+
93+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
9094

9195
![Configure basic settings for an Azure AD Domain Services instance](./media/tutorial-create-instance-advanced/basics-window.png)
9296

@@ -165,7 +169,7 @@ On the **Summary** page of the wizard, review the configuration settings for the
165169

166170
![Domain Services status once successfully provisioned](./media/tutorial-create-instance-advanced/successfully-provisioned.png)
167171

168-
During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in your directory. These Enterprise Applications are needed to service your managed domain. It's imperative that these applications are not deleted at any time.
172+
The managed domain is associated with your Azure AD tenant. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in the Azure AD tenant. These Enterprise Applications are needed to service your managed domain. Don't delete these applications.
169173

170174
## Update DNS settings for the Azure virtual network
171175

@@ -236,6 +240,7 @@ To see this managed domain in action, create and join a virtual machine to the d
236240
[on-prem-sync]: tutorial-configure-password-hash-sync.md
237241
[configure-sspr]: ../active-directory/authentication/quickstart-sspr.md
238242
[password-hash-sync-process]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
243+
[availability-zones]: ../availability-zones/az-overview.md
239244

240245
<!-- EXTERNAL LINKS -->
241246
[naming-prefix]: /windows-server/identity/ad-ds/plan/selecting-the-forest-root-domain#selecting-a-prefix

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/18/2019
11+
ms.date: 10/23/2019
1212
ms.author: iainfou
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services instance so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -85,7 +85,11 @@ The following DNS name restrictions also apply:
8585
Complete the fields in the *Basics* window of the Azure portal to create an Azure AD DS instance:
8686

8787
1. Enter a **DNS domain name** for your managed domain, taking into consideration the previous points.
88-
1. Choose the Azure **Location** in which the managed domain should be created.
88+
1. Choose the Azure **Location** in which the managed domain should be created. If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
89+
90+
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there’s a minimum of three separate zones in all enabled regions.
91+
92+
There's nothing for you to configure for Azure AD DS to be distributed across zones. The Azure platform automatically handles the zone distribution of resources. For more information and to see region availability, see [What are Availability Zones in Azure?][availability-zones]
8993

9094
![Configure basic settings for an Azure AD Domain Services instance](./media/tutorial-create-instance/basics-window.png)
9195

@@ -115,7 +119,7 @@ On the **Summary** page of the wizard, review the configuration settings for the
115119

116120
![Domain Services status once successfully provisioned](./media/tutorial-create-instance/successfully-provisioned.png)
117121

118-
We provision Azure AD Domain Services on the Azure Active Directory tenant and the Azure AD Domain Services resource for the service is created within the associated Azure subscription. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in your Azure Active directory instance where you have enabled the Azure AD domain services. These Enterprise Applications are needed to service your managed domain. It's imperative that these applications are not deleted at any time.
122+
The managed domain is associated with your Azure AD tenant. During the provisioning process, Azure AD DS creates two Enterprise Applications named *Domain Controller Services* and *AzureActiveDirectoryDomainControllerServices* in the Azure AD tenant. These Enterprise Applications are needed to service your managed domain. Don't delete these applications.
119123

120124
## Update DNS settings for the Azure virtual network
121125

@@ -186,6 +190,7 @@ Before you domain-join VMs and deploy applications that use the Azure AD DS mana
186190
[on-prem-sync]: tutorial-configure-password-hash-sync.md
187191
[configure-sspr]: ../active-directory/authentication/quickstart-sspr.md
188192
[password-hash-sync-process]: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
193+
[availability-zones]: ../availability-zones/az-overview.md
189194

190195
<!-- EXTERNAL LINKS -->
191196
[naming-prefix]: /windows-server/identity/ad-ds/plan/selecting-the-forest-root-domain#selecting-a-prefix

articles/active-directory/governance/entitlement-management-request-access.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 04/19/2019
15+
ms.date: 10/26/2019
1616
ms.author: ajburnle
1717
ms.reviewer: mamkumar
1818
ms.collection: M365-identity-device-management
@@ -56,13 +56,14 @@ Once you have found the access package in the My Access portal, you can submit a
5656

5757
1. Find the access package in the list. If necessary, you can search by typing a search string and then selecting the **Name**, **Catalog**, or **Resources** filter.
5858

59-
![My Access portal - Resource search](./media/entitlement-management-request-access/elm-myaccess-resource-search.png)
60-
1. Click the checkmark to select the access package.
59+
![My Access portal - Resource search](./media/entitlement-management-request-access/my-access-resource-search.png)
6160

62-
![My Access portal - Access packages](./media/entitlement-management-shared/my-access-access-packages.png)
61+
1. Click the checkmark to select the access package.
6362

6463
1. Click **Request access** to open the Request access pane.
6564

65+
![My Access portal - Access packages](./media/entitlement-management-request-access/my-access-request-access-button.png)
66+
6667
1. If the **Business justification** box is displayed, type a justification for needing access.
6768

6869
1. If **Request for specific period?** is enabled, select **Yes** or **No**.
@@ -77,6 +78,12 @@ Once you have found the access package in the My Access portal, you can submit a
7778

7879
If the access package requires approval, the request is now in a pending approval state.
7980

81+
### Select a policy
82+
83+
If you request access to an access package that has multiple policies that apply, you might be asked to select a policy. For example, an access package manager might configure an access package with two policies for two groups of internal employees. The first policy might allow access for 60 days and require approval. The second policy might allow access for 2 days and not require approval. If you encounter this scenario, you must select the policy you want to use.
84+
85+
![My Access portal - Request access - multiple policies](./media/entitlement-management-request-access/my-access-multiple-policies.png)
86+
8087
## Cancel a request
8188

8289
If you submit an access request and the request is still in the **pending approval** state, you can cancel the request.
@@ -93,12 +100,6 @@ If you submit an access request and the request is still in the **pending approv
93100

94101
1. Click **Request history** to confirm the request was canceled.
95102

96-
## Select a policy
97-
98-
If you are requesting access to an access package that has multiple policies that apply, you might be asked to select a policy. For example, an access package manager might configure an access package with two policies for two groups of internal employees. The first policy might allow access for 60 days and require approval. The second policy might allow access for 2 days and not require approval. If you encounter this scenario, you must select the policy you want to use.
99-
100-
**Prerequisite role:** Requestor
101-
102103
## Next steps
103104

104105
- [Approve or deny access requests](entitlement-management-request-approve.md)

articles/active-directory/governance/entitlement-management-request-approve.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 04/18/2019
15+
ms.date: 10/27/2019
1616
ms.author: ajburnle
1717
ms.reviewer: mamkumar
1818
ms.collection: M365-identity-device-management
@@ -68,7 +68,7 @@ After you open an access request pending approval, you can see details that will
6868

6969
1. If necessary, enter a reason.
7070

71-
![My Access portal - Access request](./media/entitlement-management-shared/my-access-approve-request.png)
71+
![My Access portal - Access request](./media/entitlement-management-request-approve/my-access-approve-request.png)
7272

7373
1. Click **Submit** to submit your decision.
7474

22.8 KB
Loading

0 commit comments

Comments
 (0)