Skip to content

Commit b5d59c6

Browse files
authored
Merge pull request #97324 from MicrosoftDocs/master
11/27 AM Publish
2 parents 428fded + e1ed4bb commit b5d59c6

File tree

39 files changed

+334
-222
lines changed

39 files changed

+334
-222
lines changed

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Some of the risk detections detected by Azure Active Directory Identity Protecti
7777

7878
## Define network locations
7979

80-
We recommended that organizations use Conditional Access to define their network using [named locations](../conditional-access/location-condition.md#named-locations). If your organization is using Identity Protection, consider using risk-based policies instead of named locations.
80+
We recommend that organizations use Conditional Access to define their network using [named locations](../conditional-access/location-condition.md#named-locations). If your organization is using Identity Protection, consider using risk-based policies instead of named locations.
8181

8282
### Configuring a named location
8383

articles/active-directory/fundamentals/active-directory-deployment-plans.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,14 +77,14 @@ Widening the rollout to larger groups of users should be carried out by increasi
7777
| [ADFS to Password Hash Sync](https://aka.ms/deploymentplans/adfs2phs)| With Password Hash Synchronization, hashes of user passwords are synchronized from on-premises Active Directory to Azure AD, letting Azure AD authenticate users with no interaction with the on-premises Active Directory |
7878
| [ADFS to Pass Through Authentication](https://aka.ms/deploymentplans/adfs2pta)| Azure AD Pass-through Authentication helps your users sign in to both on-premises and cloud-based applications using the same passwords. This feature provides users with a better experience - one less password to remember - and reduces IT helpdesk costs because users are less likely to forget how to sign in. When people sign in using Azure AD, this feature validates users' passwords directly against your on-premises Active Directory. |
7979
| [Azure AD Application Proxy](https://aka.ms/deploymentplans/appproxy)| Employees today want to be productive at any place, at any time, and from any device. They need to access SaaS apps in the cloud and corporate apps on-premises. Azure AD Application proxy enables this robust access without costly and complex virtual private networks (VPNs) or demilitarized zones (DMZs). |
80-
| [Seamless SSO](https://aka.ms/SeamlessSSODPDownload)| Azure Active Directory Seamless Single Sign-On (Azure AD Seamless SSO) automatically signs users in when they are on their corporate devices connected to your corporate network. With this feature, users won't need to type in their passwords to sign in to Azure AD and usually won't need to enter their usernames. This feature provides authorized users with easy access to your cloud-based applications without needing any additional on-premises components. |
80+
| [Seamless SSO](../hybrid/how-to-connect-sso-quick-start.md)| Azure Active Directory Seamless Single Sign-On (Azure AD Seamless SSO) automatically signs users in when they are on their corporate devices connected to your corporate network. With this feature, users won't need to type in their passwords to sign in to Azure AD and usually won't need to enter their usernames. This feature provides authorized users with easy access to your cloud-based applications without needing any additional on-premises components. |
8181

8282
## Deploy user provisioning
8383

8484
| Capability | Description|
8585
| -| -|
8686
| [User provisioning](https://aka.ms/deploymentplans/userprovisioning)| Azure AD helps you automate the creation, maintenance, and removal of user identities in cloud (SaaS) applications, such as Dropbox, Salesforce, ServiceNow, and more. |
87-
| [Workday-driven Inbound User Provisioning](https://aka.ms/WorkdayDeploymentPlan)| Workday-driven Inbound User Provisioning to Active Directory creates a foundation for ongoing identity governance and enhances the quality of business processes that rely on authoritative identity data. Using this feature, you can seamlessly manage the identity lifecycle of employees and contingent workers by configuring rules that map Joiner-Mover-Leaver processes (such as New Hire, Terminate, Transfer) to IT provisioning actions (such as Create, Enable, Disable) |
87+
| [Cloud HR user provisioning](https://aka.ms/deploymentplans/cloudhr)| Cloud HR user provisioning to Active Directory creates a foundation for ongoing identity governance and enhances the quality of business processes that rely on authoritative identity data. Using this feature with your cloud HR product, such as Workday or Successfactors, you can seamlessly manage the identity lifecycle of employees and contingent workers by configuring rules that map Joiner-Mover-Leaver processes (such as New Hire, Terminate, Transfer) to IT provisioning actions (such as Create, Enable, Disable) |
8888

8989
## Deploy governance and reporting
9090

articles/active-directory/hybrid/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -326,6 +326,8 @@
326326
href: reference-connect-version-history.md
327327
- name: Azure AD Connect Health version history
328328
href: reference-connect-health-version-history.md
329+
- name: Azure AD Pass-through Authentication agent version history
330+
href: reference-connect-pta-version-history.md
329331
- name: Connector version history
330332
href: reference-connect-sync-connector-version-history.md
331333
- name: Accounts and permissions
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
title: 'Azure AD Pass-through Authentication: Version release history | Microsoft Docs'
3+
description: This article lists all releases of the Azure AD Pass-through Authentication agent
4+
services: active-directory
5+
author: billmath
6+
manager: daveba
7+
ms.assetid: ef2797d7-d440-4a9a-a648-db32ad137494
8+
ms.service: active-directory
9+
ms.topic: reference
10+
ms.workload: identity
11+
ms.date: 11/27/2019
12+
ms.subservice: hybrid
13+
ms.author: billmath
14+
ms.collection: M365-identity-device-management
15+
---
16+
17+
# Azure AD Pass-through Authentication agent: Version Release History
18+
19+
The agents installed on-premises that enable Pass-through Authentication are updated regularly to provide new capabilities. This article lists the versions and features that are added when new functionality is introduced. Pass-through authentication agents are updated automatically when a new version is released.
20+
21+
Here are related topics:
22+
23+
- [User sign-in with Azure AD Pass-through Authentication](how-to-connect-pta.md)
24+
- [Azure AD Pass-through Authentication agent installation](how-to-connect-pta-quick-start.md)
25+
26+
27+
28+
## 1.5.1007.0
29+
### Release status
30+
1/22/2019: Released for download
31+
### New features and improvements
32+
- Added support for Service Bus reliable channels to add another layer of connection resiliency for outbound connections
33+
- Enforce TLS 1.2 during agent registration
34+
35+
## 1.5.643.0
36+
### Release status
37+
4/10/2018: Released for download
38+
### New features and improvements
39+
- Web socket connection support
40+
- Set TLS 1.2 as the default protocol for the agent
41+
42+
## 1.5.405.0
43+
### Release status
44+
1/31/2018: Released for download
45+
### Fixed issues
46+
47+
- Fixed a bug that caused some memory leaks in the agent.
48+
- Updated the Azure Service Bus version, which includes a bug fix for connector timeout issues.
49+
50+
## 1.5.405.0
51+
### Release status
52+
11/26/2017: Released for download
53+
### New features and improvements
54+
- Added support for websocket based connections between the agent and Azure AD services to improve connection resiliency
55+
56+
## 1.5.402.0
57+
### Release status
58+
11/25/2017: Released for download
59+
### Fixed issues
60+
- Fixed bugs related to the DNS cache for default proxy scenarios
61+
62+
## 1.5.389.0
63+
### Release status
64+
10/17/2017: Released for download
65+
### New features and improvements
66+
- Added DNS cache functionality for outbound connections to add resiliency from DNS failures
67+
68+
## 1.5.261.0
69+
### Release status
70+
08/31/2017: Released for download
71+
### New features and improvements
72+
- GA version of the Azure AD Pass-through authentication agent
73+
74+
## Next steps
75+
76+
- [User sign-in with Azure Active Directory Pass-through Authentication](how-to-connect-pta.md)

articles/active-directory/manage-apps/configure-automatic-user-provisioning-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,4 +81,4 @@ If provisioning is being enabled for the first time for an application, turn on
8181

8282
Change the **Provisioning Status** to **Off** to pause the provisioning service. In this state, Azure doesn't create, update, or remove any user or group objects in the app. Change the state back to **On** and the service picks up where it left off.
8383

84-
**Clear current state and restart synchronization** triggers an initial cycle. The service will then evaluate all the users in the source system again and determine if they are in scope for provisioning. This can be useful when your application is currently in quarantine or you need to make a change to your attribute mappings. This should not be used to trigger a delete or disable request as these events can be dropped when triggering a clear state and restart. The initial cycle also takes longer to complete than the typical incremental cycle due to the number of objects that need to be evaluated. You can learn more about the performance of initial and incremental cycles [here.](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish-specific-user).
84+
**Clear current state and restart synchronization** triggers an initial cycle. The service will then evaluate all the users in the source system again and determine if they are in scope for provisioning. This can be useful when your application is currently in quarantine or you need to make a change to your attribute mappings. Note that the initial cycle takes longer to complete than the typical incremental cycle due to the number of objects that need to be evaluated. You can learn more about the performance of initial and incremental cycles [here.](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish-specific-user).

articles/app-service/containers/app-service-linux-intro.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,12 @@ Based on a current limitation, for the same resource group you cannot mix Window
6464

6565
## Troubleshooting
6666

67-
When your application fails to start or you want to check the logging from your app, check the Docker logs in the LogFiles directory. You can access this directory either through your SCM site or via FTP. To log the `stdout` and `stderr` from your container, you need to enable **Docker Container logging** under **App Service Logs**. The setting takes effect immediately. App Service detects the change and restarts the container automatically.
67+
> [!NOTE]
68+
> There's new integrated logging capability with [Azure Monitoring (preview)](https://docs.microsoft.com/azure/app-service/troubleshoot-diagnostic-logs#send-logs-to-azure-monitor-preview) .
69+
>
70+
>
71+
72+
When your application fails to start or you want to check the logging from your app, check the Docker logs in the LogFiles directory. You can access this directory either through your SCM site or via FTP. To log the `stdout` and `stderr` from your container, you need to enable **Application Logging** under **App Service Logs**. The setting takes effect immediately. App Service detects the change and restarts the container automatically.
6873

6974
You can access the SCM site from **Advanced Tools** in the **Development Tools** menu.
7075

articles/app-service/troubleshoot-diagnostic-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ With the new [Azure Monitor integration](https://aka.ms/appsvcblog-azmon), you c
185185
186186
The following table shows the supported log types and descriptions:
187187
188-
| Log type | Windows support | Linux support | Description |
188+
| Log type | Windows support | Linux (Docker) support | Description |
189189
|-|-|-|
190190
| AppServiceConsoleLogs | TBA | Yes | Standard output and standard error |
191191
| AppServiceHTTPLogs | Yes | Yes | Web server logs |

articles/azure-monitor/app/pricing.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.subservice: application-insights
66
ms.topic: conceptual
77
author: DaleKoetke
88
ms.author: dalek
9-
ms.date: 10/28/2019
9+
ms.date: 11/27/2019
1010

1111
ms.reviewer: mbullwin
1212
---
@@ -65,7 +65,7 @@ Application Insights charges are added to your Azure bill. You can see details o
6565
### Using data volume metrics
6666
<a id="understanding-ingested-data-volume"></a>
6767

68-
To learn more about your data volumes, selecting **Metrics** for your Application Insights resource, add a new chart. For the chart metric, under **Log-based metrics**, select **Data point volume**. Click **Apply splitting**, and select group by **Telemetryitem type**.
68+
To learn more about your data volumes, selecting **Metrics** for your Application Insights resource, add a new chart. For the chart metric, under **Log-based metrics**, select **Data point volume**. Click **Apply splitting**, and select group by **`Telemetryitem` type**.
6969

7070
![Use Metrics to look at data volume](./media/pricing/10-billing.png)
7171

@@ -199,7 +199,7 @@ To change the retention, from your Application Insights resource, go to the **Us
199199

200200
![Adjust the daily telemetry volume cap](./media/pricing/pricing-005.png)
201201

202-
The retention can also be [set programatically using Powershell](powershell.md#set-the-data-retention) using the `retentionInDays` parameter. Additionally, if you set the data retention to 30 days, you can trigger an immediate purge of older data using the `immediatePurgeDataOn30Days` parameter, which may be useful for compliance-related scenarios. This purge functionality is only exposed via Azure Resource Manager and should be used with extreme care.
202+
The retention can also be [set programatically using Powershell](powershell.md#set-the-data-retention) using the `retentionInDays` parameter. Additionally, if you set the data retention to 30 days, you can trigger an immediate purge of older data using the `immediatePurgeDataOn30Days` parameter, which may be useful for compliance-related scenarios. This purge functionality is only exposed via Azure Resource Manager and should be used with extreme care. The daily reset time for the data volume cap can be configured using Azure Resource Manager to set the `dailyQuotaResetTime` parameter.
203203

204204
## Data transfer charges using Application Insights
205205

@@ -279,4 +279,4 @@ You can write a script to set the pricing tier by using Azure Resource Managemen
279279
[apiproperties]: app-insights-api-custom-events-metrics.md#properties
280280
[start]: ../../azure-monitor/app/app-insights-overview.md
281281
[pricing]: https://azure.microsoft.com/pricing/details/application-insights/
282-
[pricing]: https://azure.microsoft.com/pricing/details/application-insights/
282+
[pricing]: https://azure.microsoft.com/pricing/details/application-insights/

articles/azure-monitor/platform/stream-monitoring-data-event-hubs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Routing your monitoring data to an event hub with Azure Monitor enables you to e
5151
| SumoLogic | Instructions for setting up SumoLogic to consume data from an event hub are available at [Collect Logs for the Azure Audit App from Event Hub](https://help.sumologic.com/Send-Data/Applications-and-Other-Data-Sources/Azure-Audit/02Collect-Logs-for-Azure-Audit-from-Event-Hub). |
5252
| ArcSight | The ArcSight Azure Event Hub smart connector is available as part of [the ArcSight smart connector collection](https://community.softwaregrp.com/t5/Discussions/Announcing-General-Availability-of-ArcSight-Smart-Connectors-7/m-p/1671852). |
5353
| Syslog server | If you want to stream Azure Monitor data directly to a syslog server, you can use a [solution based on an Azure function](https://github.com/miguelangelopereira/azuremonitor2syslog/).
54-
| LogRhythm | Instructions to sett up LogRhythm to collect logs from an event hub are available [here](https://logrhythm.com/six-tips-for-securing-your-azure-cloud-environment/).
54+
| LogRhythm | Instructions to set up LogRhythm to collect logs from an event hub are available [here](https://logrhythm.com/six-tips-for-securing-your-azure-cloud-environment/).
5555

5656

5757
## Next Steps

articles/backup/backup-support-matrix-iaas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ Azure VM data disks | Back up a VM with 16 or less data disks.
153153
Data disk size | Individual disk size can be up to 32 TB and a maximum of 256 TB combined for all disks in a VM.
154154
Storage type | Standard HDD, Standard SSD, Premium SSD.
155155
Managed disks | Supported.
156-
Encrypted disks | Supported.<br/><br/> Azure VMs enabled with Azure Disk Encryption can be backed up (with or without the Azure AD app).<br/><br/> Encrypted VMs can’t be recovered at the file/folder level. You must recover the entire VM.<br/><br/> You can enable encryption on VMs that are already protected by Azure Backup.
156+
Encrypted disks | Supported (up to 4 TB).<br/><br/> Azure VMs enabled with Azure Disk Encryption can be backed up (with or without the Azure AD app).<br/><br/> Encrypted VMs can’t be recovered at the file/folder level. You must recover the entire VM.<br/><br/> You can enable encryption on VMs that are already protected by Azure Backup.
157157
Disks with Write Accelerator enabled | Not supported.<br/><br/> Azure backup automatically excludes the Disks with Write Accelerator enabled during backup. Since they are not backed up, you will not be able to Restore these disks from Recovery-Points of the VM.
158158
Back up & Restore deduplicated VMs/disks | Azure Backup does not support deduplication. For more information, see this [article](https://docs.microsoft.com/azure/backup/backup-support-matrix#disk-deduplication-support) <br/> <br/> - Azure Backup does not deduplicate across VMs in the Recovery Services vault <br/> <br/> - If there are VMs in deduplication state during restore, the files can't be restored as vault does not understand the format
159159
Add disk to protected VM | Supported.

0 commit comments

Comments
 (0)