Skip to content

Commit bbb25a7

Browse files
authored
Merge pull request #182986 from MicrosoftDocs/master
12/15 PM Publish
2 parents 969dbf3 + 1c6418d commit bbb25a7

File tree

317 files changed

+2445
-757
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

317 files changed

+2445
-757
lines changed

.openpublishing.redirection.data-factory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@
1919
"source_path_from_root": "/articles/data-factory/continuous-integration-deployment-improvements.md",
2020
"redirect_url": "/azure/data-factory/continuous-integration-delivery-improvements",
2121
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/data-factory/transform-data-using-dotnet-custom-activity.md",
25+
"redirect_url": "/azure/data-factory/transform-data-using-custom-activity",
26+
"redirect_document_id": false
2227
}
2328
]
2429
}

articles/active-directory-domain-services/troubleshoot-account-lockout.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: troubleshooting
12-
ms.date: 07/06/2020
12+
ms.date: 12/15/2021
1313
ms.author: justinha
1414

1515
#Customer intent: As a directory administrator, I want to troubleshoot why user accounts are locked out in an Azure Active Directory Domain Services managed domain.
@@ -82,10 +82,10 @@ AADDomainServicesAccountManagement
8282
| sort by TimeGenerated asc
8383
```
8484

85-
**Note**
86-
8785
You may find on 4776 and 4740 event details of "Source Workstation: " empty. This is because the bad password happened over Network logon via some other devices.
88-
For Example: If you have RADIUS server, which can forward the auth to AAD DS. To confirm that Enable RDP to DC backend configure netlogon logs.
86+
87+
For example, a RADIUS server can forward the authentication to Azure AD DS.
88+
8989

9090
03/04 19:07:29 [LOGON] [10752] contoso: SamLogon: Transitive Network logon of contoso\Nagappan.Veerappan from (via LOB11-RADIUS) Entered
9191

@@ -95,14 +95,13 @@ For Example: If you have RADIUS server, which can forward the auth to AAD DS. To
9595

9696
03/04 19:07:35 [LOGON] [10753] contoso: SamLogon: Transitive Network logon of contoso\Nagappan.Veerappan from (via LOB11-RADIUS) Returns 0xC000006A
9797

98-
Enable RDP to your DCs in NSG to backend to configure diagnostics capture (i.e netlogon).
99-
[Inbound security rules](alert-nsg.md#inbound-security-rules)
10098

101-
If you have modified the default NSG already, follow these steps:
102-
[Port 3389 - management using remote desktop](network-considerations.md#port-3389---management-using-remote-desktop)
99+
Enable RDP to your DCs in NSG to backend to configure diagnostics capture (netlogon). For more information about requirements, see
100+
[Inbound security rules](alert-nsg.md#inbound-security-rules).
101+
102+
If you have modified the default NSG already, follow [Port 3389 - management using remote desktop](network-considerations.md#port-3389---management-using-remote-desktop).
103103

104-
To enable Netlogon log on any server, follow these steps:
105-
[Enabling debug logging for the Netlogon service](/troubleshoot/windows-client/windows-security/enable-debug-logging-netlogon-service)
104+
To enable Netlogon log on any server, follow [Enabling debug logging for the Netlogon service](/troubleshoot/windows-client/windows-security/enable-debug-logging-netlogon-service).
106105

107106
## Next steps
108107

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 09/15/2021
11+
ms.date: 12/15/2021
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -157,7 +157,7 @@ To authenticate users on the managed domain, Azure AD DS needs password hashes i
157157
>
158158
> Synchronized credential information in Azure AD can't be re-used if you later create a managed domain - you must reconfigure the password hash synchronization to store the password hashes again. Previously domain-joined VMs or users won't be able to immediately authenticate - Azure AD needs to generate and store the password hashes in the new managed domain.
159159
>
160-
> [Azure AD Connect Cloud Sync is not supported with Azure AD DS][/azure/active-directory/cloud-sync/what-is-cloud-sync#comparison-between-azure-ad-connect-and-cloud-sync]. On-premises users need to be synced using Azure AD Connect in order to be able to access domain-joined VMs. For more information, see [Password hash sync process for Azure AD DS and Azure AD Connect][password-hash-sync-process].
160+
> [Azure AD Connect Cloud Sync is not supported with Azure AD DS](../active-directory/cloud-sync/what-is-cloud-sync.md#comparison-between-azure-ad-connect-and-cloud-sync). On-premises users need to be synced using Azure AD Connect in order to be able to access domain-joined VMs. For more information, see [Password hash sync process for Azure AD DS and Azure AD Connect][password-hash-sync-process].
161161
162162
The steps to generate and store these password hashes are different for cloud-only user accounts created in Azure AD versus user accounts that are synchronized from your on-premises directory using Azure AD Connect.
163163

articles/active-directory/app-proxy/what-is-application-proxy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ Up to this point, we've focused on using Application Proxy to publish on-premise
181181
* **Securely publish REST APIs**. When you have business logic or APIs running on-premises or hosted on virtual machines in the cloud, Application Proxy provides a public endpoint for API access. API endpoint access lets you control authentication and authorization without requiring incoming ports. It provides additional security through Azure AD Premium features such as multi-factor authentication and device-based Conditional Access for desktops, iOS, MAC, and Android devices using Intune. To learn more, see [How to enable native client applications to interact with proxy applications](./application-proxy-configure-native-client-application.md) and [Protect an API by using OAuth 2.0 with Azure Active Directory and API Management](../../api-management/api-management-howto-protect-backend-with-aad.md).
182182
* **Remote Desktop Services** **(RDS)**. Standard RDS deployments require open inbound connections. However, the [RDS deployment with Application Proxy](./application-proxy-integrate-with-remote-desktop-services.md) has a permanent outbound connection from the server running the connector service. This way, you can offer more applications to end users by publishing on-premises applications through Remote Desktop Services. You can also reduce the attack surface of the deployment with a limited set of two-step verification and Conditional Access controls to RDS.
183183
* **Publish applications that connect using WebSockets**. Support with [Qlik Sense](./application-proxy-qlik.md) is in Public Preview and will be expanded to other apps in the future.
184-
* **Enable native client applications to interact with proxy applications**. You can use Azure AD Application Proxy to publish web apps, but it also can be used to publish [native client applications](./application-proxy-configure-native-client-application.md) that are configured with the Azure AD Authentication Library (ADAL). Native client applications differ from web apps because they're installed on a device, while web apps are accessed through a browser.
184+
* **Enable native client applications to interact with proxy applications**. You can use Azure AD Application Proxy to publish web apps, but it also can be used to publish [native client applications](./application-proxy-configure-native-client-application.md) that are configured with Microsoft Authentication Library (MSAL). Native client applications differ from web apps because they're installed on a device, while web apps are accessed through a browser.
185185

186186
## Conclusion
187187

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/12/2021
9+
ms.date: 12/15/2021
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -78,7 +78,7 @@ To enable a registration campaign in the Azure AD portal, complete the following
7878

7979
## Enable the registration campaign policy using Graph Explorer
8080

81-
To enable the the registration campaign policy, you must use the Authentication Methods Policy using Graph APIs. **Global administrators** and **Authentication Method Policy administrators** can update the policy.
81+
In addition to using the Azure portal, you can also enable the registration campaign policy using Graph Explorer. To enable the the registration campaign policy, you must use the Authentication Methods Policy using Graph APIs. **Global administrators** and **Authentication Method Policy administrators** can update the policy.
8282

8383
To configure the policy using Graph Explorer:
8484

0 commit comments

Comments
 (0)