Skip to content

Commit bfc431f

Browse files
authored
Merge pull request #204589 from MicrosoftDocs/main
7/13 AM Publish
2 parents e4c7718 + 2d96889 commit bfc431f

File tree

54 files changed

+499
-314
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+499
-314
lines changed
139 KB
Loading

articles/active-directory/cloud-sync/plan-cloud-sync-topologies.md

Lines changed: 27 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,18 +20,18 @@ This article describes various on-premises and Azure Active Directory (Azure AD)
2020
> [!IMPORTANT]
2121
> Microsoft doesn't support modifying or operating Azure AD Connect cloud sync outside of the configurations or actions that are formally documented. Any of these configurations or actions might result in an inconsistent or unsupported state of Azure AD Connect cloud sync. As a result, Microsoft can't provide technical support for such deployments.
2222
23-
For more information see the following video.
23+
For more information, see the following video.
2424

2525
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWJ8l5]
2626
2727
## Things to remember about all scenarios and topologies
28-
The following is a list of information to keep in mind when selecting a solution.
28+
The information below should be kept in mind, when selecting a solution.
2929

3030
- Users and groups must be uniquely identified across all forests
31-
- Matching across forests does not occur with cloud sync
31+
- Matching across forests doesn't occur with cloud sync
3232
- A user or group must be represented only once across all forests
3333
- The source anchor for objects is chosen automatically. It uses ms-DS-ConsistencyGuid if present, otherwise ObjectGUID is used.
34-
- You cannot change the attribute that is used for source anchor.
34+
- You can't change the attribute that is used for source anchor.
3535

3636
## Single forest, single Azure AD tenant
3737
![Diagram that shows the topology for a single forest and a single tenant.](media/tutorial-single-forest/diagram-2.png)
@@ -42,7 +42,7 @@ The simplest topology is a single on-premises forest, with one or multiple domai
4242
## Multi-forest, single Azure AD tenant
4343
![Topology for a multi-forest and a single tenant](media/plan-cloud-provisioning-topologies/multi-forest-2.png)
4444

45-
A common topology is a multiple AD forests, with one or multiple domains, and a single Azure AD tenant.
45+
Multiple AD forests is a common topology, with one or multiple domains, and a single Azure AD tenant.
4646

4747
## Existing forest with Azure AD Connect, new forest with cloud Provisioning
4848
![Diagram that shows the topology for an existing forest and a new forest.](media/tutorial-existing-forest/existing-forest-new-forest-2.png)
@@ -55,7 +55,29 @@ The piloting scenario involves the existence of both Azure AD Connect and Azure
5555

5656
For an example of this scenario see [Tutorial: Pilot Azure AD Connect cloud sync in an existing synced AD forest](tutorial-pilot-aadc-aadccp.md)
5757

58+
## Merging objects from disconnected sources
59+
### (Public Preview)
60+
![Diagram for merging objects from disconnected sources](media/plan-cloud-provisioning-topologies/attributes-multiple-sources.png)
61+
In this scenario, the attributes of a user are contributed to by two disconnected Active Directory forests.
5862

63+
An example would be:
64+
65+
- one forest (1) contains most of the attributes
66+
- a second forest (2) contains a few attributes
67+
68+
Since the second forest doesn't have network connectivity to the Azure AD Connect server, the object can't be merged through Azure AD Connect. Cloud Sync in the second forest allows the attribute value to be retrieved from the second forest. The value can then be merged with the object in Azure AD that is synced by Azure AD Connect.
69+
70+
This configuration is advanced and there are a few caveats to this topology:
71+
72+
1. You must use `msdsConsistencyGuid` as the source anchor in the Cloud Sync configuration.
73+
2. The `msdsConsistencyGuid` of the user object in the second forest must match that of the corresponding object in Azure AD.
74+
3. You must populate the `UserPrincipalName` attribute and the `Alias` attribute in the second forest and it must match the ones that are synced from the first forest.
75+
4. You must remove all attributes from the attribute mapping in the Cloud Sync configuration that don't have a value or may have a different value in the second forest – you can't have overlapping attribute mappings between the first forest and the second one.
76+
5. If there's no matching object in the first forest, for an object that is synced from the second forest, then Cloud Sync will still create the object in Azure AD. The object will only have the attributes that are defined in the mapping configuration of Cloud Sync for the second forest.
77+
6. If you delete the object from the second forest, it will be temporarily soft deleted in Azure AD. It will be restored automatically after the next Azure AD Connect sync cycle.
78+
7. If you delete the object from the first forest, it will be soft deleted from Azure AD. The object won't be restored unless a change is made to the object in the second forest. After 30 days the object will be hard deleted from Azure AD and if a change is made to the object in the second forest it will be created as a new object in Azure AD.
79+
80+
5981

6082
## Next steps
6183

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -102,15 +102,15 @@ services.Configure<MsalDistributedTokenCacheAdapterOptions>(options =>
102102
options.DisableL1Cache = false;
103103

104104
// Or limit the memory (by default, this is 500 MB)
105-
options.L1CacheOptions.SizeLimit = 1024 * 1024 * 1024, // 1 GB
105+
options.L1CacheOptions.SizeLimit = 1024 * 1024 * 1024; // 1 GB
106106
107107
// You can choose if you encrypt or not encrypt the cache
108108
options.Encrypt = false;
109109

110110
// And you can set eviction policies for the distributed
111111
// cache.
112112
options.SlidingExpiration = TimeSpan.FromHours(1);
113-
}
113+
});
114114

115115
// Then, choose your implementation of distributed cache
116116
// -----------------------------------------------------
@@ -708,4 +708,4 @@ The following samples illustrate token cache serialization.
708708
| ------ | -------- | ----------- |
709709
|[active-directory-dotnet-desktop-msgraph-v2](https://github.com/azure-samples/active-directory-dotnet-desktop-msgraph-v2) | Desktop (WPF) | Windows Desktop .NET (WPF) application that calls the Microsoft Graph API. ![Diagram that shows a topology with a desktop app client flowing to Azure Active Directory by acquiring a token interactively and to Microsoft Graph.](media/msal-net-token-cache-serialization/topology.png)|
710710
|[active-directory-dotnet-v1-to-v2](https://github.com/Azure-Samples/active-directory-dotnet-v1-to-v2) | Desktop (console) | Set of Visual Studio solutions that illustrate the migration of Azure AD v1.0 applications (using ADAL.NET) to Microsoft identity platform applications (using MSAL.NET). In particular, see [Token cache migration](https://github.com/Azure-Samples/active-directory-dotnet-v1-to-v2/blob/master/TokenCacheMigration/README.md) and [Confidential client token cache](https://github.com/Azure-Samples/active-directory-dotnet-v1-to-v2/tree/master/ConfidentialClientTokenCache). |
711-
[ms-identity-aspnet-webapp-openidconnect](https://github.com/Azure-Samples/ms-identity-aspnet-webapp-openidconnect) | ASP.NET (net472) | Example of token cache serialization in an ASP.NET MVC application (using MSAL.NET). In particular, see [MsalAppBuilder](https://github.com/Azure-Samples/ms-identity-aspnet-webapp-openidconnect/blob/master/WebApp/Utils/MsalAppBuilder.cs).
711+
[ms-identity-aspnet-webapp-openidconnect](https://github.com/Azure-Samples/ms-identity-aspnet-webapp-openidconnect) | ASP.NET (net472) | Example of token cache serialization in an ASP.NET MVC application (using MSAL.NET). In particular, see [MsalAppBuilder](https://github.com/Azure-Samples/ms-identity-aspnet-webapp-openidconnect/blob/master/WebApp/Utils/MsalAppBuilder.cs).

articles/active-directory/external-identities/cross-cloud-settings.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -47,13 +47,6 @@ After each organization has completed these steps, Azure AD B2B collaboration be
4747

4848
In your Microsoft cloud settings, enable the Microsoft Azure cloud you want to collaborate with.
4949

50-
> [!NOTE]
51-
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
52-
>
53-
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
54-
>
55-
>Microsoft Azure China - https://aka.ms/cloudsettingschina
56-
5750
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global administrator or Security administrator account. Then open the **Azure Active Directory** service.
5851
1. Select **External Identities**, and then select **Cross-tenant access settings**.
5952
1. Select **Microsoft cloud settings (Preview)**.

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -77,13 +77,6 @@ To set up B2B collaboration, both organizations configure their Microsoft cloud
7777
7878
For configuration steps, see [Configure Microsoft cloud settings for B2B collaboration (Preview)](cross-cloud-settings.md).
7979

80-
> [!NOTE]
81-
> The admin experience is currently still deploying to national clouds. To access the admin experience in Microsoft Azure Government or Microsoft Azure China, you can use these links:
82-
>
83-
>Microsoft Azure Government - https://aka.ms/cloudsettingsusgov
84-
>
85-
>Microsoft Azure China - https://aka.ms/cloudsettingschina
86-
8780
### Default settings in cross-cloud scenarios
8881

8982
To collaborate with a partner tenant in a different Microsoft Azure cloud, both organizations need to mutually enable B2B collaboration with each other. The first step is to enable the partner's cloud in your cross-tenant settings. When you first enable another cloud, B2B collaboration is blocked for all tenants in that cloud. You need to add the tenant you want to collaborate with to your Organizational settings, and at that point your default settings go into effect for that tenant only. You can allow the default settings to remain in effect, or you can modify the organizational settings for the tenant.

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,9 @@ With outbound settings, you select which of your users and groups will be able t
231231
- Select the user or group in the search results.
232232
- When you're done selecting the users and groups you want to add, choose **Select**.
233233

234+
> [!NOTE]
235+
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-sms-signin). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](https://docs.microsoft.com/graph/api/resources/crosstenantaccesspolicy-overview?view=graph-rest-1.0) to add the user's object ID directly or target a group the user belongs to.
236+
234237
1. Select the **External applications** tab.
235238

236239
1. Under **Access status**, select one of the following:

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -228,6 +228,9 @@ With outbound settings, you select which of your users and groups will be able t
228228
- In the **Select** pane, type the user name or the group name in the search box.
229229
- When you're done selecting users and groups, choose **Select**.
230230

231+
> [!NOTE]
232+
> When targeting your users and groups, you won't be able to select users who have configured [SMS-based authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-sms-signin). This is because users who have a "federated credential" on their user object are blocked to prevent external users from being added to outbound access settings. As a workaround, you can use the [Microsoft Graph API](https://docs.microsoft.com/graph/api/resources/crosstenantaccesspolicy-overview?view=graph-rest-1.0) to add the user's object ID directly or target a group the user belongs to.
233+
231234
1. Select **Save**.
232235
1. Select the **External applications** tab.
233236
1. Under **Access status**, select one of the following:

articles/application-gateway/redirect-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ A common redirection scenario for many web applications is to support automatic
1919
A redirect type sets the response status code for the clients to understand the purpose of the redirect. The following types of redirection are supported:
2020

2121
- 301 (Moved permanently): Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource will use one of the enclosed URIs. Use 301 status code for HTTP to HTTPS redirection.
22+
- 303 (Permanent redirect): Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource should use one of the enclosed URIs.
2223
- 302 (Found): Indicates that the target resource is temporarily under a different URI. Since the redirection can change on occasion, the client should continue to use the effective request URI for future requests.
2324
- 307 (Temporary redirect): Indicates that the target resource is temporarily under a different URI. The user agent MUST NOT change the request method if it does an automatic redirection to that URI. Since the redirection can change over time, the client ought to continue using the original effective request URI for future requests.
24-
- 308 (Permanent redirect): Indicates that the target resource has been assigned a new permanent URI. Any future references to this resource should use one of the enclosed URIs.
2525

2626
## Redirection capabilities
2727

articles/availability-zones/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@
1616
href: az-region.md
1717
- name: Migration Guidance
1818
items:
19+
- name: API Management
20+
href: migrate-api-mgt.md
1921
- name: App Service Environment
2022
href: migrate-app-service-environment.md
2123
- name: App Service
@@ -26,6 +28,8 @@
2628
href: migrate-vm.md
2729
- name: Storage accounts
2830
href: migrate-storage.md
31+
- name: Virtual Machines and Virtual Machine Scale Sets
32+
href: migrate-vm.md
2933
- name: Terminology
3034
href: glossary.md
3135
- name: High Availability

articles/availability-zones/az-region.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ In the Product Catalog, always-available services are listed as "non-regional" s
9393
| **Products** | **Resiliency** |
9494
| --- | --- |
9595
| [Azure Active Directory Domain Services](../active-directory-domain-services/overview.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
96-
| [Azure API Management](../api-management/zone-redundancy.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
96+
| [Azure API Management](migrate-api-mgt.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
9797
| [Azure App Configuration](../azure-app-configuration/faq.yml#how-does-app-configuration-ensure-high-data-availability) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
9898
| [Azure App Service](migrate-app-service.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) |
9999
| [Azure App Service: App Service Environment](migrate-app-service-environment.md) | ![An icon that signifies this service is zone redundant.](media/icon-zone-redundant.svg) ![An icon that signifies this service is zonal](media/icon-zonal.svg) |

0 commit comments

Comments
 (0)