You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/plan-cloud-sync-topologies.md
+27-5Lines changed: 27 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,18 +20,18 @@ This article describes various on-premises and Azure Active Directory (Azure AD)
20
20
> [!IMPORTANT]
21
21
> Microsoft doesn't support modifying or operating Azure AD Connect cloud sync outside of the configurations or actions that are formally documented. Any of these configurations or actions might result in an inconsistent or unsupported state of Azure AD Connect cloud sync. As a result, Microsoft can't provide technical support for such deployments.
## Things to remember about all scenarios and topologies
28
-
The following is a list of information to keep in mind when selecting a solution.
28
+
The information below should be kept in mind, when selecting a solution.
29
29
30
30
- Users and groups must be uniquely identified across all forests
31
-
- Matching across forests does not occur with cloud sync
31
+
- Matching across forests doesn't occur with cloud sync
32
32
- A user or group must be represented only once across all forests
33
33
- The source anchor for objects is chosen automatically. It uses ms-DS-ConsistencyGuid if present, otherwise ObjectGUID is used.
34
-
- You cannot change the attribute that is used for source anchor.
34
+
- You can't change the attribute that is used for source anchor.
35
35
36
36
## Single forest, single Azure AD tenant
37
37

@@ -42,7 +42,7 @@ The simplest topology is a single on-premises forest, with one or multiple domai
42
42
## Multi-forest, single Azure AD tenant
43
43

44
44
45
-
A common topology is a multiple AD forests, with one or multiple domains, and a single Azure AD tenant.
45
+
Multiple AD forests is a common topology, with one or multiple domains, and a single Azure AD tenant.
46
46
47
47
## Existing forest with Azure AD Connect, new forest with cloud Provisioning
48
48

@@ -55,7 +55,29 @@ The piloting scenario involves the existence of both Azure AD Connect and Azure
55
55
56
56
For an example of this scenario see [Tutorial: Pilot Azure AD Connect cloud sync in an existing synced AD forest](tutorial-pilot-aadc-aadccp.md)
57
57
58
+
## Merging objects from disconnected sources
59
+
### (Public Preview)
60
+

61
+
In this scenario, the attributes of a user are contributed to by two disconnected Active Directory forests.
58
62
63
+
An example would be:
64
+
65
+
- one forest (1) contains most of the attributes
66
+
- a second forest (2) contains a few attributes
67
+
68
+
Since the second forest doesn't have network connectivity to the Azure AD Connect server, the object can't be merged through Azure AD Connect. Cloud Sync in the second forest allows the attribute value to be retrieved from the second forest. The value can then be merged with the object in Azure AD that is synced by Azure AD Connect.
69
+
70
+
This configuration is advanced and there are a few caveats to this topology:
71
+
72
+
1. You must use `msdsConsistencyGuid` as the source anchor in the Cloud Sync configuration.
73
+
2. The `msdsConsistencyGuid` of the user object in the second forest must match that of the corresponding object in Azure AD.
74
+
3. You must populate the `UserPrincipalName` attribute and the `Alias` attribute in the second forest and it must match the ones that are synced from the first forest.
75
+
4. You must remove all attributes from the attribute mapping in the Cloud Sync configuration that don't have a value or may have a different value in the second forest – you can't have overlapping attribute mappings between the first forest and the second one.
76
+
5. If there's no matching object in the first forest, for an object that is synced from the second forest, then Cloud Sync will still create the object in Azure AD. The object will only have the attributes that are defined in the mapping configuration of Cloud Sync for the second forest.
77
+
6. If you delete the object from the second forest, it will be temporarily soft deleted in Azure AD. It will be restored automatically after the next Azure AD Connect sync cycle.
78
+
7. If you delete the object from the first forest, it will be soft deleted from Azure AD. The object won't be restored unless a change is made to the object in the second forest. After 30 days the object will be hard deleted from Azure AD and if a change is made to the object in the second forest it will be created as a new object in Azure AD.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-cloud-settings.md
-7Lines changed: 0 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,13 +47,6 @@ After each organization has completed these steps, Azure AD B2B collaboration be
47
47
48
48
In your Microsoft cloud settings, enable the Microsoft Azure cloud you want to collaborate with.
49
49
50
-
> [!NOTE]
51
-
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
52
-
>
53
-
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
54
-
>
55
-
>Microsoft Azure China - https://aka.ms/cloudsettingschina
56
-
57
50
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
58
51
1. Select **External Identities**, and then select **Cross-tenant access settings**.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-overview.md
-7Lines changed: 0 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,13 +77,6 @@ To set up B2B collaboration, both organizations configure their Microsoft cloud
77
77
78
78
For configuration steps, see [Configure Microsoft cloud settings for B2B collaboration (Preview)](cross-cloud-settings.md).
79
79
80
-
> [!NOTE]
81
-
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
82
-
>
83
-
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
84
-
>
85
-
>Microsoft Azure China - https://aka.ms/cloudsettingschina
86
-
87
80
### Default settings in cross-cloud scenarios
88
81
89
82
To collaborate with a partner tenant in a different Microsoft Azure cloud, both organizations need to mutually enable B2B collaboration with each other. The first step is to enable the partner's cloud in your cross-tenant settings. When you first enable another cloud, B2B collaboration is blocked for all tenants in that cloud. You need to add the tenant you want to collaborate with to your Organizational settings, and at that point your default settings go into effect for that tenant only. You can allow the default settings to remain in effect, or you can modify the organizational settings for the tenant.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -231,6 +231,9 @@ With outbound settings, you select which of your users and groups will be able t
231
231
- Select the user or group in the search results.
232
232
- When you're done selecting the users and groups you want to add, choose **Select**.
233
233
234
+
> [!NOTE]
235
+
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-sms-signin). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](https://docs.microsoft.com/graph/api/resources/crosstenantaccesspolicy-overview?view=graph-rest-1.0) to add the user's object ID directly or target a group the user belongs to.
236
+
234
237
1. Select the **External applications** tab.
235
238
236
239
1. Under **Access status**, select one of the following:
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -228,6 +228,9 @@ With outbound settings, you select which of your users and groups will be able t
228
228
- In the **Select** pane, type the user name or the group name in the search box.
229
229
- When you're done selecting users and groups, choose **Select**.
230
230
231
+
> [!NOTE]
232
+
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-sms-signin). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](https://docs.microsoft.com/graph/api/resources/crosstenantaccesspolicy-overview?view=graph-rest-1.0) to add the user's object ID directly or target a group the user belongs to.
233
+
231
234
1. Select **Save**.
232
235
1. Select the **External applications** tab.
233
236
1. Under **Access status**, select one of the following:
Copy file name to clipboardExpand all lines: articles/application-gateway/redirect-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,9 +19,9 @@ A common redirection scenario for many web applications is to support automatic
19
19
A redirect type sets the response status code for the clients to understand the purpose of the redirect. The following types of redirection are supported:
20
20
21
21
- 301 (Moved permanently): Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource will use one of the enclosed URIs. Use 301 status code for HTTP to HTTPS redirection.
22
+
- 303 (Permanent redirect): Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource should use one of the enclosed URIs.
22
23
- 302 (Found): Indicates that the target resource is temporarily under a different URI. Since the redirection can change on occasion, the client should continue to use the effective request URI for future requests.
23
24
- 307 (Temporary redirect): Indicates that the target resource is temporarily under a different URI. The user agent MUST NOT change the request method if it does an automatic redirection to that URI. Since the redirection can change over time, the client ought to continue using the original effective request URI for future requests.
24
-
- 308 (Permanent redirect): Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource should use one of the enclosed URIs.
Copy file name to clipboardExpand all lines: articles/availability-zones/az-region.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ In the Product Catalog, always-available services are listed as "non-regional" s
93
93
|**Products**|**Resiliency**|
94
94
| --- | --- |
95
95
|[Azure Active Directory Domain Services](../active-directory-domain-services/overview.md)||
96
-
|[Azure API Management](../api-management/zone-redundancy.md)||
96
+
|[Azure API Management](migrate-api-mgt.md)||
97
97
|[Azure App Configuration](../azure-app-configuration/faq.yml#how-does-app-configuration-ensure-high-data-availability)||
98
98
|[Azure App Service](migrate-app-service.md)||
99
99
|[Azure App Service: App Service Environment](migrate-app-service-environment.md)||
0 commit comments