Skip to content

Commit b934ee3

Browse files
authored
Merge pull request #190909 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents dc375f2 + 2938e22 commit b934ee3

File tree

103 files changed

+1120
-634
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

103 files changed

+1120
-634
lines changed

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -162,6 +162,8 @@
162162
items:
163163
- name: FAQs
164164
href: faqs.yml
165+
- name: Feature availability
166+
href: feature-availability.md
165167
- name: Service updates
166168
href: https://azure.microsoft.com/updates/?product=active-directory-ds
167169
- name: Pricing
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
---
2+
title: Azure Active Directory Domain Services (Azure AD DS) feature availability in Azure Government
3+
description: Learn which Azure AD DS features are available in Azure Government.
4+
5+
ms.service: active-directory
6+
ms.subservice: domain-services
7+
ms.workload: identity
8+
ms.topic: conceptual
9+
ms.date: 03/07/2022
10+
11+
ms.author: justinha
12+
author: justinha
13+
manager: daveba
14+
ms.reviewer: michmcla
15+
ms.collection: M365-identity-device-management
16+
---
17+
18+
# Azure Active Directory Domain Services feature availability
19+
20+
<!---Jeremy said there are additional features that don't fit nicely in this list that we need to add later--->
21+
22+
This following table lists Azure Active Directory Domain Services (Azure AD DS) feature availability in Azure Government.
23+
24+
25+
| Feature | Availability |
26+
|---------|:------------:|
27+
| Configure LDAPS | &#x2705; |
28+
| Create trusts | &#x2705; |
29+
| Create replica sets | &#x2705; |
30+
| Configure and scope user and group sync | &#x2705; |
31+
| Configure password hash sync | &#x2705; |
32+
| Configure password and account lockout policies | &#x2705; |
33+
| Manage Group Policy | &#x2705; |
34+
| Manage DNS | &#x2705; |
35+
| Email notifications | &#x2705; |
36+
| Configure Kerberos constrained delegation | &#x2705; |
37+
| Auditing and Azure Monitor Workbooks templates | &#x2705; |
38+
| Domain join Windows VMs | &#x2705; |
39+
| Domain join Linux VMs | &#x2705; |
40+
| Deploy Azure AD Application Proxy | &#x2705; |
41+
| Enable profile sync for SharePoint | &#x2705; |
42+
43+
## Next steps
44+
45+
- [FAQs](faqs.yml)
46+
- [Service updates](https://azure.microsoft.com/updates/?product=active-directory-ds)
47+
- [Pricing](https://azure.microsoft.com/pricing/details/active-directory-ds/)

articles/active-directory/authentication/feature-availability.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure AD feature availability in Azure Government
2+
title: Azure Active Directory (Azure AD) feature availability in Azure Government
33
description: Learn which Azure AD features are available in Azure Government.
44

55
services: multi-factor-authentication
@@ -15,12 +15,13 @@ ms.reviewer: michmcla
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Cloud feature availability
18+
# Azure Active Directory feature availability
1919

2020
<!---Jeremy said there are additional features that don't fit nicely in this list that we need to add later--->
2121

22-
This following table lists Azure AD feature availability in Azure Government.
22+
This following tables list Azure AD feature availability in Azure Government.
2323

24+
## Azure Active Directory
2425

2526
|Service | Feature | Availability |
2627
|:------|---------|:------------:|
@@ -106,7 +107,7 @@ This following table lists Azure AD feature availability in Azure Government.
106107
|Additional risk detected | &#x2705; |
107108

108109

109-
## HR-provisioning apps
110+
## HR provisioning apps
110111

111112
| HR-provisioning app | Availability |
112113
|----------------|:--------------------:|

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Microsoft provides communication templates for end users. Download the [authenti
119119

120120
Users register their passwordless method as a part of the **combined security information workflow** at [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo). Azure AD logs registration of security keys and Microsoft Authenticator app, and any other changes to the authentication methods.
121121

122-
For the first-time user who doesn't have a password, admins can provide a [Temporary Access Passcode](howto-authentication-temporary-access-pass.md) to register their security information in [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo.md) . This is a time-limited passcode and satisfies strong authentication requirements. **Temporary Access Pass is a per-user process**.
122+
For the first-time user who doesn't have a password, admins can provide a [Temporary Access Passcode](howto-authentication-temporary-access-pass.md) to register their security information in [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo) . This is a time-limited passcode and satisfies strong authentication requirements. **Temporary Access Pass is a per-user process**.
123123

124124
This method can also be used for easy recovery when the user has lost or forgotten their authentication factor such as security key or Microsoft Authenticator app but needs to sign in to **register a new strong authentication method**.
125125

articles/active-directory/develop/scenario-web-app-call-api-app-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ In the following example, the `GraphBeta` section specifies these settings.
4949
"AzureAd": {
5050
"Instance": "https://login.microsoftonline.com/",
5151
"ClientId": "[Client_id-of-web-app-eg-2ec40e65-ba09-4853-bcde-bcb60029e596]",
52-
"TenantId": "common"
52+
"TenantId": "common",
5353

5454
// To call an API
5555
"ClientSecret": "[Copy the client secret added to the app from the Azure portal]",
@@ -70,7 +70,7 @@ Instead of a client secret, you can provide a client certificate. The following
7070
"AzureAd": {
7171
"Instance": "https://login.microsoftonline.com/",
7272
"ClientId": "[Client_id-of-web-app-eg-2ec40e65-ba09-4853-bcde-bcb60029e596]",
73-
"TenantId": "common"
73+
"TenantId": "common",
7474

7575
// To call an API
7676
"ClientCertificates": [

articles/active-directory/governance/TOC.yml

Lines changed: 22 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -16,18 +16,28 @@
1616
- name: Tutorials
1717
expanded: true
1818
items:
19-
- name: Manage access to resources - Azure portal
20-
href: entitlement-management-access-package-first.md
21-
- name: Manage access to resources - Microsoft Graph
22-
href: /graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json
23-
- name: Manage access to resources - PowerShell
24-
href: /powershell/microsoftgraph/tutorial-entitlement-management?view=graph-powershell-beta
25-
- name: Onboard external users to Azure AD through an approval process
26-
href: entitlement-management-onboard-external-user.md
27-
- name: Manage the lifecycle of your group-based licenses in Azure AD
28-
href: entitlement-management-group-licenses.md
29-
- name: Automate identity governance tasks
30-
href: identity-governance-automation.md
19+
- name: Azure portal tutorials
20+
items:
21+
- name: Manage access to resources - Azure portal
22+
href: entitlement-management-access-package-first.md
23+
- name: Manage the lifecycle of your group-based licenses in Azure AD
24+
href: entitlement-management-group-licenses.md
25+
- name: Onboard external users to Azure AD through an approval process
26+
href: entitlement-management-onboard-external-user.md
27+
- name: Automate identity governance tasks
28+
href: identity-governance-automation.md
29+
- name: API tutorials
30+
items:
31+
- name: Manage access to resources - Microsoft Graph
32+
href: /graph/tutorial-access-package-api?toc=/azure/active-directory/governance/toc.json&bc=/azure/active-directory/governance/breadcrumb/toc.json
33+
- name: Manage access to resources - PowerShell
34+
href: /powershell/microsoftgraph/tutorial-entitlement-management?view=graph-powershell-beta
35+
- name: Review access to Microsoft 365 groups - Microsoft Graph
36+
href: https://docs.microsoft.com/graph/tutorial-accessreviews-m365group
37+
- name: Review access to security groups - Microsoft Graph
38+
href: https://docs.microsoft.com/graph/tutorial-accessreviews-securitygroup
39+
- name: Review access to privileged roles - Microsoft Graph
40+
href: https://docs.microsoft.com/graph/tutorial-accessreviews-roleassignments
3141
- name: Concepts
3242
expanded: true
3343
items:

articles/active-directory/governance/create-access-review.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,8 @@ For more information, see [License requirements](access-reviews-overview.md#lice
158158

159159
A multi-stage review allows the administrator to define two or three sets of reviewers to complete a review one after another. In a single-stage review, all reviewers make a decision within the same period and the last reviewer to make a decision "wins". In a multi-stage review, two or three independent sets of reviewers make a decision within their own stage, and the next stage doesn't happen until a decision is made in the previous stage. Multi-stage reviews can be used to reduce the burden on later-stage reviewers, allow for escalation of reviewers, or have independent groups of reviewers agree on decisions.
160160
> [!WARNING]
161-
> Data of users included in multi-stage access reviews are a part of the audit record at the start of the review. Administrators may delete the data at any time by deleting the multi-stage access review series.
161+
> Data of users included in multi-stage access reviews are a part of the audit record at the start of the review. Administrators may delete the data at any time by deleting the multi-stage access review series.
162+
[!INCLUDE [GDPR-related guidance](../../../includes/gdpr-intro-sentence.md)]
162163

163164
1. After you have selected the resource and scope of your review, move on to the **Reviews** tab.
164165

articles/active-directory/saas-apps/joyn-fsm-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4242

4343
## Step 2. Configure Joyn FSM to support provisioning with Azure AD
4444

45-
Contact your [SevenLakes Customer Success Representative](mailto:mailto:[email protected]) in order to obtain the Tenant URL and Secret Token which are required for configuring provisioning.
45+
Contact your [SevenLakes Customer Success Representative](mailto:[email protected]) in order to obtain the Tenant URL and Secret Token which are required for configuring provisioning.
4646

4747
## Step 3. Add Joyn FSM from the Azure AD application gallery
4848

articles/aks/availability-zones.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -114,21 +114,21 @@ First, get the AKS cluster credentials using the [az aks get-credentials][az-aks
114114
az aks get-credentials --resource-group myResourceGroup --name myAKSCluster
115115
```
116116

117-
Next, use the [kubectl describe][kubectl-describe] command to list the nodes in the cluster and filter on the *failure-domain.beta.kubernetes.io/zone* value. The following example is for a Bash shell.
117+
Next, use the [kubectl describe][kubectl-describe] command to list the nodes in the cluster and filter on the `topology.kubernetes.io/zone` value. The following example is for a Bash shell.
118118

119119
```console
120-
kubectl describe nodes | grep -e "Name:" -e "failure-domain.beta.kubernetes.io/zone"
120+
kubectl describe nodes | grep -e "Name:" -e "topology.kubernetes.io/zone"
121121
```
122122

123123
The following example output shows the three nodes distributed across the specified region and availability zones, such as *eastus2-1* for the first availability zone and *eastus2-2* for the second availability zone:
124124

125125
```console
126126
Name: aks-nodepool1-28993262-vmss000000
127-
failure-domain.beta.kubernetes.io/zone=eastus2-1
127+
topology.kubernetes.io/zone=eastus2-1
128128
Name: aks-nodepool1-28993262-vmss000001
129-
failure-domain.beta.kubernetes.io/zone=eastus2-2
129+
topology.kubernetes.io/zone=eastus2-2
130130
Name: aks-nodepool1-28993262-vmss000002
131-
failure-domain.beta.kubernetes.io/zone=eastus2-3
131+
topology.kubernetes.io/zone=eastus2-3
132132
```
133133

134134
As you add additional nodes to an agent pool, the Azure platform automatically distributes the underlying VMs across the specified availability zones.
@@ -150,7 +150,7 @@ aks-nodepool1-34917322-vmss000002 eastus eastus-3
150150

151151
## Verify pod distribution across zones
152152

153-
As documented in [Well-Known Labels, Annotations and Taints][kubectl-well_known_labels], Kubernetes uses the `failure-domain.beta.kubernetes.io/zone` label to automatically distribute pods in a replication controller or service across the different zones available. In order to test this, you can scale up your cluster from 3 to 5 nodes, to verify correct pod spreading:
153+
As documented in [Well-Known Labels, Annotations and Taints][kubectl-well_known_labels], Kubernetes uses the `topology.kubernetes.io/zone` label to automatically distribute pods in a replication controller or service across the different zones available. In order to test this, you can scale up your cluster from 3 to 5 nodes, to verify correct pod spreading:
154154

155155
```azurecli-interactive
156156
az aks scale \
@@ -159,19 +159,19 @@ az aks scale \
159159
--node-count 5
160160
```
161161

162-
When the scale operation completes after a few minutes, the command `kubectl describe nodes | grep -e "Name:" -e "failure-domain.beta.kubernetes.io/zone"` in a Bash shell should give an output similar to this sample:
162+
When the scale operation completes after a few minutes, the command `kubectl describe nodes | grep -e "Name:" -e "topology.kubernetes.io/zone"` in a Bash shell should give an output similar to this sample:
163163

164164
```console
165165
Name: aks-nodepool1-28993262-vmss000000
166-
failure-domain.beta.kubernetes.io/zone=eastus2-1
166+
topology.kubernetes.io/zone=eastus2-1
167167
Name: aks-nodepool1-28993262-vmss000001
168-
failure-domain.beta.kubernetes.io/zone=eastus2-2
168+
topology.kubernetes.io/zone=eastus2-2
169169
Name: aks-nodepool1-28993262-vmss000002
170-
failure-domain.beta.kubernetes.io/zone=eastus2-3
170+
topology.kubernetes.io/zone=eastus2-3
171171
Name: aks-nodepool1-28993262-vmss000003
172-
failure-domain.beta.kubernetes.io/zone=eastus2-1
172+
topology.kubernetes.io/zone=eastus2-1
173173
Name: aks-nodepool1-28993262-vmss000004
174-
failure-domain.beta.kubernetes.io/zone=eastus2-2
174+
topology.kubernetes.io/zone=eastus2-2
175175
```
176176

177177
We now have two additional nodes in zones 1 and 2. You can deploy an application consisting of three replicas. We will use NGINX as an example:

articles/application-gateway/classic-to-resource-manager.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,24 @@ For more information on how to set up an Application Gateway resource after VNet
2828
* [Deployment via Azure CLI](quick-create-cli.md)
2929
* [Deployment via ARM template](quick-create-template.md)
3030

31+
## Common questions
32+
33+
### What is Azure Service Manager and what does it mean by classic?
34+
35+
The word "classic" in classic networking service refers to networking resources managed by Azure Service Manager (ASM). Azure Service Manager (ASM) is the old control plane of Azure responsible for creating, managing, deleting VMs and performing other control plane operations.
36+
37+
### What is Azure Resource Manager?
38+
39+
Azure Resource Manager is the latest control plane of Azure responsible for creating, managing, deleting VMs and performing other control plane operations.
40+
41+
### Where can I find more information regarding classic to Azure Resource Manager migration?
42+
43+
Please refer to [Frequently asked questions about classic to Azure Resource Manager migration](../virtual-machines/migration-classic-resource-manager-faq.yml)
44+
45+
### How do I report an issue?
46+
47+
Post your issues and questions about migration to our [Microsoft Q&A page](https://aka.ms/AAflal1). We recommend posting all your questions on this forum. If you have a support contract, you're welcome to log a support ticket as well.
48+
3149
## Next steps
3250
To get started see: [platform-supported migration of IaaS resources from classic to Resource Manager](../virtual-machines/migration-classic-resource-manager-ps.md)
3351

0 commit comments

Comments
 (0)