Skip to content

Commit bbdbe3c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into mm-assign
2 parents da186b1 + 53e34be commit bbdbe3c

File tree

333 files changed

+5181
-9555
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

333 files changed

+5181
-9555
lines changed

.openpublishing.redirection.json

Lines changed: 36 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -250,6 +250,11 @@
250250
"redirect_url": "/azure/virtual-machines/",
251251
"redirect_document_id": false
252252
},
253+
{
254+
"source_path": "articles/virtual-machines/dc-series.md",
255+
"redirect_url": "/azure/virtual-machines/sizes-previous-gen",
256+
"redirect_document_id": false
257+
},
253258
{
254259
"source_path": "articles/virtual-machines/windows/maintenance-and-updates.md",
255260
"redirect_url": "/azure/virtual-machines/maintenance-and-updates?toc=/azure/virtual-machines/windows/toc.json&bc=/azure/virtual-machines/windows/breadcrumb/toc.json",
@@ -520,16 +525,7 @@
520525
"redirect_url": "/azure/site-recovery/vmware-physical-mobility-service-overview#install-mobility-agent-through-ui",
521526
"redirect_document_id": false
522527
},
523-
{
524-
"source_path": "articles/site-recovery/scvmm-site-recovery-deprecation.md",
525-
"redirect_url": "/azure/site-recovery/site-to-site-deprecation",
526-
"redirect_document_id": false
527-
},
528-
{
529-
"source_path": "articles/site-recovery/site-to-site-deprecation.md",
530-
"redirect_url": "/azure/site-recovery/hyper-v-azure-tutorial",
531-
"redirect_document_id": false
532-
},
528+
533529
{
534530
"source_path": "articles/machine-learning/service/quickstart-get-started.md",
535531
"redirect_url": "/azure/machine-learning/service/tutorial-1st-experiment-sdk-setup",
@@ -26985,6 +26981,16 @@
2698526981
"redirect_url": "/azure/storage/files/storage-files-faq",
2698626982
"redirect_document_id": true
2698726983
},
26984+
{
26985+
"source_path": "articles/storage/files/storage-files-active-directory-enable.md",
26986+
"redirect_url": "/azure/storage/files/storage-files-identity-auth-active-directory-domain-service-enable",
26987+
"redirect_document_id": true
26988+
},
26989+
{
26990+
"source_path": "articles/storage/files/storage-files-active-directory-domain-services-enable.md",
26991+
"redirect_url": "/azure/storage/files/storage-files-identity-auth-active-directory-enable",
26992+
"redirect_document_id": true
26993+
},
2698826994
{
2698926995
"source_path": "articles/storage/storage-files-introduction.md",
2699026996
"redirect_url": "/azure/storage/files/storage-files-introduction",
@@ -29010,6 +29016,11 @@
2901029016
"redirect_url": "/azure/security-center/security-center-partner-integration",
2901129017
"redirect_document_id": false
2901229018
},
29019+
{
29020+
"source_path": "articles/security-center/security-center-faq.md",
29021+
"redirect_url": "/azure/security-center/faq-general",
29022+
"redirect_document_id": false
29023+
},
2901329024
{
2901429025
"source_path": "articles/security-center/security-center-playbooks.md",
2901529026
"redirect_url": "/azure/security-center/workflow-automation",
@@ -48875,6 +48886,21 @@
4887548886
"source_path": "articles/virtual-machines/windows/chef-automation.md",
4887648887
"redirect_url": "/azure/chef/chef-automation",
4887748888
"redirect_document_id": true
48889+
},
48890+
{
48891+
"source_path": "articles/azure-monitor/app/hockeyapp-bridge-app.md",
48892+
"redirect_url": "/azure/azure-monitor/overview",
48893+
"redirect_document_id": false
48894+
},
48895+
{
48896+
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-jenkins.md",
48897+
"redirect_url": "/azure/jenkins/tutorial-build-deploy-jenkins",
48898+
"redirect_document_id": true
48899+
},
48900+
{
48901+
"source_path": "articles/virtual-machines/linux/tutorial-jenkins-github-docker-cicd.md",
48902+
"redirect_url": "/azure/jenkins/tutorial-jenkins-github-docker-cicd",
48903+
"redirect_document_id": false
4887848904
}
4887948905
]
4888048906
}

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,9 @@ Let's jump straight into creating the identity. If you run into a problem, check
3636

3737
You've created your Azure AD application and service principal.
3838

39-
## Assign the application to a role
39+
## Assign a role to the application
4040

41-
To access resources in your subscription, you must assign the application to a role. Decide which role offers the right permissions for the application. To learn about the available roles, see [RBAC: Built in Roles](../../role-based-access-control/built-in-roles.md).
41+
To access resources in your subscription, you must assign a role to the application. Decide which role offers the right permissions for the application. To learn about the available roles, see [RBAC: Built in Roles](../../role-based-access-control/built-in-roles.md).
4242

4343
You can set the scope at the level of the subscription, resource group, or resource. Permissions are inherited to lower levels of scope. For example, adding an application to the Reader role for a resource group means it can read the resource group and any resources it contains.
4444

@@ -58,7 +58,7 @@ You can set the scope at the level of the subscription, resource group, or resou
5858

5959
![Select the role to assign to the application](./media/howto-create-service-principal-portal/select-role.png)
6060

61-
1. Select **Save** to finish assigning the role. You see your application in the list of users assigned to a role for that scope.
61+
1. Select **Save** to finish assigning the role. You see your application in the list of users with a role for that scope.
6262

6363
Your service principal is set up. You can start using it to run your scripts or apps. The next section shows how to get values that are needed when signing in programmatically.
6464

@@ -108,7 +108,7 @@ If you choose not to use a certificate, you can create a new application secret.
108108
1. Select **Client secrets -> New client secret**.
109109
1. Provide a description of the secret, and a duration. When done, select **Add**.
110110

111-
After saving the client secret, the value of the client secret is displayed. Copy this value because you aren't able to retrieve the key later. You provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
111+
After saving the client secret, the value of the client secret is displayed. Copy this value because you won't be able to retrieve the key later. You will provide the key value with the application ID to sign in as the application. Store the key value where your application can retrieve it.
112112

113113
![Copy the secret value because you can't retrieve this later](./media/howto-create-service-principal-portal/copy-secret.png)
114114

@@ -122,7 +122,7 @@ Keep in mind, you might need to configure addition permissions on resources that
122122

123123
## Required permissions
124124

125-
You must have sufficient permissions to register an application with your Azure AD tenant, and assign the application to a role in your Azure subscription.
125+
You must have sufficient permissions to register an application with your Azure AD tenant, and assign to the application a role in your Azure subscription.
126126

127127
### Check Azure AD permissions
128128

@@ -134,11 +134,11 @@ You must have sufficient permissions to register an application with your Azure
134134
1. In the left pane, select **User settings**.
135135
1. Check the **App registrations** setting. This value can only be set by an administrator. If set to **Yes**, any user in the Azure AD tenant can register an app.
136136

137-
If the app registrations setting is set to **No**, only users with an administrator role may register these types of applications. See [available roles](../users-groups-roles/directory-assign-admin-roles.md#available-roles) and [role permissions](../users-groups-roles/directory-assign-admin-roles.md#role-permissions) to learn about available administrator roles and the specific permissions in Azure AD that are given to each role. If your account is assigned to the User role, but the app registration setting is limited to admin users, ask your administrator to either assign you to one of the administrator roles that can create and manage all aspects of app registrations, or to enable users to register apps.
137+
If the app registrations setting is set to **No**, only users with an administrator role may register these types of applications. See [available roles](../users-groups-roles/directory-assign-admin-roles.md#available-roles) and [role permissions](../users-groups-roles/directory-assign-admin-roles.md#role-permissions) to learn about available administrator roles and the specific permissions in Azure AD that are given to each role. If your account is assigned the User role, but the app registration setting is limited to admin users, ask your administrator to either assign you one of the administrator roles that can create and manage all aspects of app registrations, or to enable users to register apps.
138138

139139
### Check Azure subscription permissions
140140

141-
In your Azure subscription, your account must have `Microsoft.Authorization/*/Write` access to assign an AD app to a role. This action is granted through the [Owner](../../role-based-access-control/built-in-roles.md#owner) role or [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) role. If your account is assigned to the **Contributor** role, you don't have adequate permission. You receive an error when attempting to assign the service principal to a role.
141+
In your Azure subscription, your account must have `Microsoft.Authorization/*/Write` access to assign a role to an AD app. This action is granted through the [Owner](../../role-based-access-control/built-in-roles.md#owner) role or [User Access Administrator](../../role-based-access-control/built-in-roles.md#user-access-administrator) role. If your account is assigned the **Contributor** role, you don't have adequate permission. You will receive an error when attempting to assign the service principal a role.
142142

143143
To check your subscription permissions:
144144

@@ -150,9 +150,9 @@ To check your subscription permissions:
150150

151151
![Select the subscription you want to create the service principal in](./media/howto-create-service-principal-portal/view-details.png)
152152

153-
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign an AD app to a role. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned to the Owner role, which means that user has adequate permissions.
153+
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
154154

155-
![This example shows the user is assigned to the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
155+
![This example shows the user is assigned the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
156156

157157
## Next steps
158158

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -70,20 +70,21 @@ As a first planning step, you should review your environment and determine wheth
7070

7171
## Review things you should know
7272

73-
Hybrid Azure AD join is currently not supported if your environment consists of a single AD forest synchronizing identity data to more than one Azure AD tenant.
73+
### Unsupported scenarios
74+
- Hybrid Azure AD join is currently not supported if your environment consists of a single AD forest synchronizing identity data to more than one Azure AD tenant.
7475

75-
If your environment uses virtual desktop infrastructure (VDI), see [Device identity and desktop virtualization](https://docs.microsoft.com/azure/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure).
76+
- Hybrid Azure AD join is not supported for Windows Server running the Domain Controller (DC) role.
7677

77-
Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support. Starting from Windows 10 1903 release, TPMs 1.2 are not used for hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
78+
- Hybrid Azure AD join is not supported on Windows down-level devices when using credential roaming or user profile roaming or mandatory profile.
7879

79-
Hybrid Azure AD join is not supported for Windows Server running the Domain Controller (DC) role.
80+
### OS imaging considerations
81+
- If you are relying on the System Preparation Tool (Sysprep) and if you are using a **pre-Windows 10 1809** image for installation, make sure that image is not from a device that is already registered with Azure AD as Hybrid Azure AD join.
8082

81-
Hybrid Azure AD join is not supported on Windows down-level devices when using credential roaming or user profile roaming or mandatory profile.
83+
- If you are relying on a Virtual Machine (VM) snapshot to create additional VMs, make sure that snapshot is not from a VM that is already registered with Azure AD as Hybrid Azure AD join.
8284

83-
If you are relying on the System Preparation Tool (Sysprep) and if you are using a **pre-Windows 10 1809** image for installation, make sure that image is not from a device that is already registered with Azure AD as Hybrid Azure AD join.
84-
85-
If you are relying on a Virtual Machine (VM) snapshot to create additional VMs, make sure that snapshot is not from a VM that is already registered with Azure AD as Hybrid Azure AD join.
85+
- If you are using [Unified Write Filter](https://docs.microsoft.com/windows-hardware/customize/enterprise/unified-write-filter) and similar technologies that clear changes to the disk at reboot, they must be applied after the device is Hybrid Azure AD joined. Enabling such technologies prior to completion of Hybrid Azure AD join will result in the device getting unjoined on every reboot
8686

87+
### Handling devices with Azure AD registered state
8788
If your Windows 10 domain joined devices are [Azure AD registered](overview.md#getting-devices-in-azure-ad) to your tenant, it could lead to a dual state of Hybrid Azure AD joined and Azure AD registered device. We recommend upgrading to Windows 10 1803 (with KB4489894 applied) or above to automatically address this scenario. In pre-1803 releases, you will need to remove the Azure AD registered state manually before enabling Hybrid Azure AD join. In 1803 and above releases, the following changes have been made to avoid this dual state:
8889

8990
- Any existing Azure AD registered state would be automatically removed <i>after the device is Hybrid Azure AD joined</i>.
@@ -93,6 +94,11 @@ If your Windows 10 domain joined devices are [Azure AD registered](overview.md#g
9394
> [!NOTE]
9495
> The Azure AD registered device will not be automatically removed if it is managed by Intune.
9596
97+
### Additional considerations
98+
- If your environment uses virtual desktop infrastructure (VDI), see [Device identity and desktop virtualization](https://docs.microsoft.com/azure/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure).
99+
100+
- Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support. Starting from Windows 10 1903 release, TPMs 1.2 are not used for hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
101+
96102
## Review controlled validation of hybrid Azure AD join
97103

98104
When all of the pre-requisites are in place, Windows devices will automatically register as devices in your Azure AD tenant. The state of these device identities in Azure AD is referred as hybrid Azure AD join. More information about the concepts covered in this article can be found in the article [Introduction to device identity management in Azure Active Directory](overview.md).

articles/active-directory/saas-apps/workplacebyfacebook-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ We have locked down the admin credentials section for existing Workplace custome
4848

4949

5050
#### When will these changes happen?
51-
All new instances of Workplace will already be using the new integration / authorization method. Existing integrations will be migrated gradually in February. The migration will be completed for all tenants by the end of the Month.
51+
All new instances of Workplace will already be using the new integration / authorization method. Existing integrations will be migrated gradually by May. The workplace team has provided an extension on the deadline from Feb-28 to May-1.
5252

5353
## Capabilities supported
5454
> [!div class="checklist"]

0 commit comments

Comments
 (0)