Skip to content

Commit b86664a

Browse files
committed
Merge branch 'release-azure-relay-mvc' of https://github.com/MicrosoftDocs/azure-docs-pr into ehub-grid-0818
2 parents 486de21 + c2b74aa commit b86664a

File tree

379 files changed

+3974
-1670
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

379 files changed

+3974
-1670
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2877,7 +2877,27 @@
28772877
},
28782878
{
28792879
"source_path": "articles/automation/automation-sec-configure-azure-runas-account.md",
2880-
"redirect_url": "/azure/automation/automation-create-runas-account",
2880+
"redirect_url": "/azure/automation/manage-runas-account",
2881+
"redirect_document_id": false
2882+
},
2883+
{
2884+
"source_path": "articles/automation/automation-create-runas-account.md",
2885+
"redirect_url": "/azure/automation/manage-runas-account",
2886+
"redirect_document_id": false
2887+
},
2888+
{
2889+
"source_path": "articles/automation/automation-manage-account.md",
2890+
"redirect_url": "/azure/automation/manage-runas-account",
2891+
"redirect_document_id": false
2892+
},
2893+
{
2894+
"source_path": "articles/automation/automation-create-aduser-account.md",
2895+
"redirect_url": "/azure/automation/automation-credentials",
2896+
"redirect_document_id": false
2897+
},
2898+
{
2899+
"source_path": "articles/automation/automation-verify-runas-authentication.md",
2900+
"redirect_url": "/azure/automation/manage-runas-account",
28812901
"redirect_document_id": false
28822902
},
28832903
{
@@ -8377,6 +8397,11 @@
83778397
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/cli-samples",
83788398
"redirect_document_id": false
83798399
},
8400+
{
8401+
"source_path": "articles/cosmos-db/access-control.md",
8402+
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/secure-access-to-data",
8403+
"redirect_document_id": false
8404+
},
83808405
{
83818406
"source_path": "articles/documentdb/documentdb-automation-resource-manager-cli-nodejs.md",
83828407
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/cli-samples",
@@ -8394,7 +8419,7 @@
83948419
},
83958420
{
83968421
"source_path": "articles/documentdb/table-powershell.md",
8397-
"redirect_url": "https://docs.microsoft.com/en-us/azure/cosmos-db/table-introduction",
8422+
"redirect_url": "https://docs.microsoft.com/azure/cosmos-db/table-introduction",
83988423
"redirect_document_id": false
83998424
},
84008425
{

articles/active-directory/authentication/howto-mfa-nps-extension-rdg.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ Remote Desktop connection authorization policies (RD CAPs) specify the requireme
177177
![Server Name](./media/howto-mfa-nps-extension-rdg/image9.png)
178178

179179
4. In the Properties dialog box, select the **RD CAP Store** tab.
180-
5. On the RD CAP Store tab, select **Central Server running NPS**.
180+
5. On the RD CAP Store tab, select **Central server running NPS**.
181181
6. In the **Enter a name or IP address for the server running NPS** field, type the IP address or server name of the server where you installed the NPS extension.
182182

183183
![Enter Name or IP Address](./media/howto-mfa-nps-extension-rdg/image10.png)
@@ -223,7 +223,7 @@ To ensure there is time to validate users’ credentials, perform two-step verif
223223
By default, when you configure the RD Gateway to use a central policy store for connection authorization policies, the RD Gateway is configured to forward CAP requests to the NPS server. The NPS server with the Azure MFA extension installed, processes the RADIUS access request. The following steps show you how to verify the default connection request policy.
224224

225225
1. On the RD Gateway, in the NPS (Local) console, expand **Policies**, and select **Connection Request Policies**.
226-
2. Right-click **Connect Request Policies**, and double-click **TS GATEWAY AUTHORIZATION POLICY**.
226+
2. Double-click **TS GATEWAY AUTHORIZATION POLICY**.
227227
3. In the **TS GATEWAY AUTHORIZATION POLICY properties** dialog box, click the **Settings** tab.
228228
4. On **Settings** tab, under Forwarding Connection Request, click **Authentication**. RADIUS client is configured to forward requests for authentication.
229229

@@ -264,15 +264,15 @@ The Remote Desktop Gateway needs to be configured as a RADIUS client to the NPS
264264
Recall that the NPS server with the Azure MFA extension is the designated central policy store for the Connection Authorization Policy (CAP). Therefore, you need to implement a CAP on the NPS server to authorize valid connections requests.
265265

266266
1. On the NPS Server, open the NPS (Local) console, expand **Policies**, and click **Network Policies**.
267-
2. Right-click **Connections to other access servers**, and click **Duplicate policy**.
267+
2. Right-click **Connections to other access servers**, and click **Duplicate Policy**.
268268

269269
![Duplicate Policy](./media/howto-mfa-nps-extension-rdg/image19.png)
270270

271271
3. Right-click **Copy of Connections to other access servers**, and click **Properties**.
272272

273273
![Network Properties](./media/howto-mfa-nps-extension-rdg/image20.png)
274274

275-
4. In the **Copy of Connections to other access servers** dialog box, in **Policy Name**, enter a suitable name, such as _RDG_CAP_. Check **Policy enabled**, and select **Grant access**. Optionally, in **Type of network access server**, select **Remote Desktop Gateway**, or you can leave it as **Unspecified**.
275+
4. In the **Copy of Connections to other access servers** dialog box, in **Policy name**, enter a suitable name, such as _RDG_CAP_. Check **Policy enabled**, and select **Grant access**. Optionally, in **Type of network access server**, select **Remote Desktop Gateway**, or you can leave it as **Unspecified**.
276276

277277
![Copy of Connections](./media/howto-mfa-nps-extension-rdg/image21.png)
278278

articles/active-directory/connect-health/active-directory-aadconnect-health-agent-install.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,13 @@ The following table is a list of requirements for using Azure AD Connect Health.
2626
| --- | --- |
2727
| Azure AD Premium |Azure AD Connect Health is an Azure AD Premium feature and requires Azure AD Premium. </br></br>For more information, see [Getting started with Azure AD Premium](../fundamentals/active-directory-get-started-premium.md) </br>To start a free 30-day trial, see [Start a trial.](https://azure.microsoft.com/trial/get-started-active-directory/) |
2828
| You must be a global administrator of your Azure AD to get started with Azure AD Connect Health |By default, only the global administrators can install and configure the health agents to get started, access the portal, and perform any operations within Azure AD Connect Health. For more information, see [Administering your Azure AD directory](../fundamentals/active-directory-administer.md). <br><br> Using Role Based Access Control you can allow access to Azure AD Connect Health to other users in your organization. For more information, see [Role Based Access Control for Azure AD Connect Health.](active-directory-aadconnect-health-operations.md#manage-access-with-role-based-access-control) </br></br>**Important:** The account used when installing the agents must be a work or school account. It cannot be a Microsoft account. For more information, see [Sign up for Azure as an organization](../fundamentals/sign-up-organization.md) |
29-
| Azure AD Connect Health Agent is installed on each targeted server | Azure AD Connect Health requires the Health Agents to be installed and configured on targeted servers to receive the data and provide the Monitoring and Analytics capabilities </br></br>For example, to get data from your AD FS infrastructure, the agent must be installed on the AD FS and Web Application Proxy servers. Similarly, to get data on your on-premises AD DS infrastructure, the agent must be installed on the domain controllers. </br></br> |
29+
| Azure AD Connect Health Agent is installed on each targeted server | Azure AD Connect Health requires the Health Agents to be installed and configured on targeted servers to receive the data and provide the Monitoring and Analytics capabilities. </br></br>For example, to get data from your AD FS infrastructure, the agent must be installed on the AD FS and Web Application Proxy servers. Similarly, to get data on your on-premises AD DS infrastructure, the agent must be installed on the domain controllers. </br></br> |
3030
| Outbound connectivity to the Azure service endpoints | During installation and runtime, the agent requires connectivity to Azure AD Connect Health service endpoints. If outbound connectivity is blocked using Firewalls, ensure that the following endpoints are added to the allowed list. See [outbound connectivity endpoints](active-directory-aadconnect-health-agent-install.md#outbound-connectivity-to-the-azure-service-endpoints) |
3131
|Outbound connectivity based on IP Addresses | For IP address based filtering on firewalls, refer to the [Azure IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653).|
3232
| SSL Inspection for outbound traffic is filtered or disabled | The agent registration step or data upload operations may fail if there is SSL inspection or termination for outbound traffic at the network layer. Read more about [how to setup SSL inspection](https://technet.microsoft.com/library/ee796230.aspx) |
3333
| Firewall ports on the server running the agent |The agent requires the following firewall ports to be open in order for the agent to communicate with the Azure AD Health service endpoints.</br></br><li>TCP port 443</li><li>TCP port 5671</li> </br>Read more about [enable firewall ports](https://technet.microsoft.com/library/ms345310(v=sql.100).aspx) |
3434
| Allow the following websites if IE Enhanced Security is enabled |If IE Enhanced Security is enabled, then the following websites must be allowed on the server that is going to have the agent installed.</br></br><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com</li><li>https:\//login.windows.net</li><li>The federation server for your organization trusted by Azure Active Directory. For example: https:\//sts.contoso.com</li> Read more about [how to configure IE](https://support.microsoft.com/help/815141/internet-explorer-enhanced-security-configuration-changes-the-browsing) |
35-
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](http://www.microsoft.com/download/details.aspx?id=40855) the Windows Menagement Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|
35+
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](http://www.microsoft.com/download/details.aspx?id=40855) the Windows Management Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|
3636
|Disable FIPS|FIPS is not supported by Azure AD Connect Health agents.|
3737

3838
### Outbound connectivity to the Azure service endpoints
@@ -57,6 +57,11 @@ The following table is a list of requirements for using Azure AD Connect Health.
5757
* [See the installation instructions](#installing-the-azure-ad-connect-health-agent-for-ad-ds).
5858

5959
## Installing the Azure AD Connect Health Agent for AD FS
60+
> [!NOTE]
61+
> AD FS server should be different from your Sync server. Do not install AD FS agent to your Sync server.
62+
>
63+
64+
Before installation, make sure your AD FS server host name is unique and not present in the AD FS service.
6065
To start the agent installation, double-click the .exe file that you downloaded. On the first screen, click Install.
6166

6267
![Verify Azure AD Connect Health](./media/active-directory-aadconnect-health-requirements/install1.png)
@@ -161,6 +166,10 @@ Note that "basic" audit level is enabled by default. Read more about the [AD FS
161166
162167

163168
## Installing the Azure AD Connect Health agent for sync
169+
> [!NOTE]
170+
> Sync server should be different from your AD FS server. Do not install Sync agent to your AD FS server.
171+
>
172+
164173
The Azure AD Connect Health agent for sync is installed automatically in the latest build of Azure AD Connect. To use Azure AD Connect for sync, you need to download the latest version of Azure AD Connect and install it. You can download the latest version [here](http://www.microsoft.com/download/details.aspx?id=47594).
165174

166175
To verify the agent has been installed, look for the following services on the server. If you completed the configuration, they should already be running. Otherwise, they are stopped until the configuration is complete.

articles/active-directory/connect/active-directory-aadconnect-feature-device-writeback.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@ This provides additional security and assurance that access to applications is g
3333
> [!IMPORTANT]
3434
> <li>Devices must be located in the same forest as the users. Since devices must be written back to a single forest, this feature does not currently support a deployment with multiple user forests.</li>
3535
> <li>Only one device registration configuration object can be added to the on-premises Active Directory forest. This feature is not compatible with a topology where the on-premises Active Directory is synchronized to multiple Azure AD directories.</li>
36-
>
37-
>
3836
3937
## Part 1: Install Azure AD Connect
4038
Install Azure AD Connect using Custom or Express settings. Microsoft recommends to start with all users and groups successfully synchronized before you enable device writeback.

articles/active-directory/connect/active-directory-aadconnect-version-history.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: article
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 08/10/2018
15+
ms.date: 08/21/2018
1616
ms.component: hybrid
1717
ms.author: billmath
1818

@@ -36,7 +36,7 @@ Download| [Download Azure AD Connect](http://go.microsoft.com/fwlink/?LinkId=615
3636

3737
### Release status
3838

39-
7/20/2018: Released for download and auto upgrade. The auto upgrade process is still in progress.
39+
8/21/2018: Released for download and auto upgrade.
4040

4141
### New features and improvements
4242

articles/active-directory/develop/active-directory-v2-limitations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 07/12/2017
17+
ms.date: 08/14/2018
1818
ms.author: celested
1919
ms.reviewer: hirsin, dastrock
2020
ms.custom: aaddev
@@ -97,6 +97,7 @@ Currently, library support for the v2.0 endpoint is limited. If you want to use
9797
* If you are building a desktop or mobile application, you can use one of the preview Microsoft Authentication Libraries (MSAL). These libraries are in a production-supported preview, so it is safe to use them in production applications. You can read more about the terms of the preview and the available libraries in [authentication libraries reference](reference-v2-libraries.md).
9898
* For platforms not covered by Microsoft libraries, you can integrate with the v2.0 endpoint by directly sending and receiving protocol messages in your application code. The v2.0 OpenID Connect and OAuth protocols [are explicitly documented](active-directory-v2-protocols.md) to help you perform such an integration.
9999
* Finally, you can use open-source Open ID Connect and OAuth libraries to integrate with the v2.0 endpoint. The v2.0 protocol should be compatible with many open-source protocol libraries without major changes. The availability of these kinds of libraries varies by language and platform. The [Open ID Connect](http://openid.net/connect/) and [OAuth 2.0](http://oauth.net/2/) websites maintain a list of popular implementations. For more information, see [Azure Active Directory v2.0 and authentication libraries](reference-v2-libraries.md), and the list of open-source client libraries and samples that have been tested with the v2.0 endpoint.
100+
* For reference, the `.well-known` endpoint for the v2.0 common endpoint is `https://login.microsoftonline.com/common/v2.0/.well-known/openid-configuration` . Replace `common` with your tenant ID to get data specific to your tenant.
100101

101102
## Restrictions on protocols
102103

@@ -105,7 +106,6 @@ The v2.0 endpoint does not support SAML or WS-Federation; it only supports Open
105106
The following protocol features and capabilities currently are *not available* in the v2.0 endpoint:
106107

107108
* Currently, the `email` claim is returned only if an optional claim is configured and scope is scope=email was specified in the request. However, this behavior will change as the v2.0 endpoint is updated to further comply with the Open ID Connect and OAuth2.0 standards.
108-
* The OpenID Connect UserInfo endpoint is not implemented on the v2.0 endpoint. However, all user profile data that you potentially would receive at this endpoint is available from the Microsoft Graph `/me` endpoint.
109109
* The v2.0 endpoint does not support issuing role or group claims in ID tokens.
110110
* The [OAuth 2.0 Resource Owner Password Credentials Grant](https://tools.ietf.org/html/rfc6749#section-4.3) is not supported by the v2.0 endpoint.
111111

0 commit comments

Comments
 (0)