You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-health-agent-install.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ The following table lists requirements for using Azure AD Connect Health.
33
33
| The Azure service endpoints have outbound connectivity. | During installation and runtime, the agent requires connectivity to Azure AD Connect Health service endpoints. If firewalls block outbound connectivity, add the [outbound connectivity endpoints](how-to-connect-health-agent-install.md#outbound-connectivity-to-the-azure-service-endpoints) to the allow list. |
34
34
|Outbound connectivity is based on IP addresses. | For information about firewall filtering based on IP addresses, see [Azure IP ranges](https://www.microsoft.com/download/details.aspx?id=56519).|
35
35
| TLS inspection for outbound traffic is filtered or disabled. | The agent registration step or data upload operations might fail if there's TLS inspection or termination for outbound traffic at the network layer. For more information, see [Set up TLS inspection](/previous-versions/tn-archive/ee796230(v=technet.10)). |
36
-
| Firewall ports on the server are running the agent. |The agent requires the following firewall ports to be open so that it can communicate with the Azure AD Connect Health service endpoints: <br /><li>TCP port 443</li><li>TCP port 5671</li> <br />The latest version of the agent doesn't require port 5671. Upgrade to the latest version so that only port 443 is required. For more information, see [Hybrid identity required ports and protocols](./reference-connect-ports.md). |
36
+
| Firewall ports on the server are running the agent. |The agent requires the following firewall ports to be open so that it can communicate with the Azure AD Connect Health service endpoints: <br /><li>TCP port 443</li><li>TCP port 5671</li> <br />The latest version of the agent doesn't require port 5671. Upgrade to the latest version so that only port 443 is required. For more information, see [Hybrid identity required ports and protocols](./reference-connect-ports.md). |
37
37
| If Internet Explorer enhanced security is enabled, allow specified websites. |If Internet Explorer enhanced security is enabled, then allow the following websites on the server where you install the agent:<br /><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com</li><li>https:\//login.windows.net</li><li>https:\//aadcdn.msftauth.net</li><li>The federation server for your organization that's trusted by Azure AD (for example, https:\//sts.contoso.com)</li> <br />For more information, see [How to configure Internet Explorer](https://support.microsoft.com/help/815141/internet-explorer-enhanced-security-configuration-changes-the-browsing). If you have a proxy in your network, then see the note that appears at the end of this table.|
38
38
| PowerShell version 5.0 or newer is installed. | Windows Server 2016 includes PowerShell version 5.0.
39
39
@@ -55,7 +55,7 @@ These URLs allow communication with Azure AD Connect Health service endpoints. L
55
55
56
56
| Domain environment | Required Azure service endpoints |
57
57
| --- | --- |
58
-
| General public | <li>*.blob.core.windows.net </li><li>*.aadconnecthealth.azure.com </li><li>*.servicebus.windows.net - Port: 5671 (This endpoint isn't required in the latest version of the agent.)</li><li>*.adhybridhealth.azure.com/</li><li>https:\//management.azure.com </li><li>https:\//policykeyservice.dc.ad.msft.net/</li><li>https:\//login.windows.net</li><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com </li><li>https:\//www.office.com (This endpoint is used only for discovery purposes during registration.)</li> <li>https://aadcdn.msftauth.net</li><li>https://aadcdn.msauth.net</li> |
58
+
| General public | <li>*.blob.core.windows.net </li><li>*.aadconnecthealth.azure.com </li><li>**.servicebus.windows.net - Port: 5671 (If 5671 is blocked, the agent falls back to 443, but using 5671 is recommended. This endpoint isn't required in the latest version of the agent.)</li><li>*.adhybridhealth.azure.com/</li><li>https:\//management.azure.com </li><li>https:\//policykeyservice.dc.ad.msft.net/</li><li>https:\//login.windows.net</li><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com </li><li>https:\//www.office.com (This endpoint is used only for discovery purposes during registration.)</li> <li>https://aadcdn.msftauth.net</li><li>https://aadcdn.msauth.net</li> |
59
59
| Azure Germany | <li>*.blob.core.cloudapi.de </li><li>*.servicebus.cloudapi.de </li> <li>*.aadconnecthealth.microsoftazure.de </li><li>https:\//management.microsoftazure.de </li><li>https:\//policykeyservice.aadcdi.microsoftazure.de </li><li>https:\//login.microsoftonline.de </li><li>https:\//secure.aadcdn.microsoftonline-p.de </li><li>https:\//www.office.de (This endpoint is used only for discovery purposes during registration.)</li> <li>https://aadcdn.msftauth.net</li><li>https://aadcdn.msauth.net</li> |
60
60
| Azure Government | <li>*.blob.core.usgovcloudapi.net </li> <li>*.servicebus.usgovcloudapi.net </li> <li>*.aadconnecthealth.microsoftazure.us </li> <li>https:\//management.usgovcloudapi.net </li><li>https:\//policykeyservice.aadcdi.azure.us </li><li>https:\//login.microsoftonline.us </li><li>https:\//secure.aadcdn.microsoftonline-p.com </li><li>https:\//www.office.com (This endpoint is used only for discovery purposes during registration.)</li> <li>https://aadcdn.msftauth.net</li><li>https://aadcdn.msauth.net</li> |
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sync-recycle-bin.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,10 +18,12 @@ ms.author: billmath
18
18
19
19
ms.collection: M365-identity-device-management
20
20
---
21
-
# Azure AD Connect sync: Enable AD recycle bin
22
-
It is recommended that you enable the AD Recycle Bin feature for your on-premises Active Directories, which are synchronized to Azure AD.
21
+
# Azure AD Connect sync: Enable Active Directory recycle bin
22
+
We recommend that you enable the Active Directory Recycle Bin feature for your on-premises instances of Active Directory (AD) that are synchronized to Azure AD.
23
23
24
-
If you accidentally deleted an on-premises AD user object and restore it using the feature, Azure AD restores the corresponding Azure AD user object. For information about the AD Recycle Bin feature, refer to article [Scenario Overview for Restoring Deleted Active Directory Objects](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd379542(v=ws.10)).
24
+
If you accidentally deleted an on-premises AD user object and restore it using the feature, Azure AD restores the corresponding Azure AD user object. For information about restoring Active Directory objects, see [Scenario overview for restoring deleted Active Directory objects](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd379542(v=ws.10)).
25
+
26
+
To learn how to enable the Active Directory Recycle Bin feature, see [Active Directory Administrative Center enhancements](/windows-server/identity/ad-ds/get-started/adac/introduction-to-active-directory-administrative-center-enhancements--level-100-#ad_recycle_bin_mgmt).
25
27
26
28
## Benefits of enabling the AD recycle bin
27
29
This feature helps with restoring Azure AD user objects by doing the following:
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-ports.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ This table describes the ports and protocols that are required for communication
33
33
| LDAP |389 (TCP/UDP) |Used for data import from AD. Data is encrypted with Kerberos Sign & Seal. |
34
34
| SMB | 445 (TCP) |Used by Seamless SSO to create a computer account in the AD forest and during password writeback. For more information, see [Change a user account's password](/openspecs/windows_protocols/ms-adod/d211aaba-d188-4836-8007-8c62f7c9402d). |
35
35
| LDAP/SSL |636 (TCP/UDP) |Used for data import from AD. The data transfer is signed and encrypted. Only used if you are using TLS. |
36
-
| RPC |49152- 65535 (Random high RPC Port)(TCP) |Used during the initial configuration of Azure AD Connect when it binds to the AD forests, and during Password synchronization. If the dynamic port has been changed, you need to open that port. See [KB929851](https://support.microsoft.com/kb/929851), [KB832017](https://support.microsoft.com/kb/832017), and [KB224196](https://support.microsoft.com/kb/224196) for more information. |
36
+
| RPC |49152- 65535 (Random high RPC Port)(TCP) |Used during the initial configuration of Azure AD Connect when it binds to the AD forests, and during Password synchronization. If the dynamic port has been changed, you need to open that port. See [KB929851](https://support.microsoft.com/kb/929851), [KB832017](https://support.microsoft.com/kb/832017), and [KB224196](https://support.microsoft.com/kb/224196) for more information. |
37
37
|WinRM | 5985 (TCP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard|
38
38
|AD DS Web Services | 9389 (TCP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard |
39
39
| Global Catalog | 3268 (TCP) | Used by Seamless SSO to query the global catalog in the forest before creating a computer account in the domain. |
@@ -44,7 +44,7 @@ This table describes the ports and protocols that are required for communication
44
44
| Protocol | Ports | Description |
45
45
| --- | --- | --- |
46
46
| HTTP |80 (TCP) |Used to download CRLs (Certificate Revocation Lists) to verify TLS/SSL certificates. |
47
-
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
47
+
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
48
48
49
49
For a list of URLs and IP addresses you need to open in your firewall, see [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2) and [Troubleshooting Azure AD Connect connectivity](tshoot-connect-connectivity.md#troubleshoot-connectivity-issues-in-the-installation-wizard).
50
50
@@ -54,40 +54,40 @@ This table describes the ports and protocols that are required for communication
54
54
| Protocol | Ports | Description |
55
55
| --- | --- | --- |
56
56
| HTTP |80 (TCP) |Used to download CRLs (Certificate Revocation Lists) to verify TLS/SSL certificates. |
57
-
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
57
+
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
58
58
| WinRM |5985 |WinRM Listener |
59
59
60
60
## Table 4 - WAP and Federation Servers
61
61
This table describes the ports and protocols that are required for communication between the Federation servers and WAP servers.
62
62
63
63
| Protocol | Ports | Description |
64
64
| --- | --- | --- |
65
-
| HTTPS |443(TCP) |Used for authentication. |
65
+
| HTTPS |443(TCP) |Used for authentication. |
66
66
67
67
## Table 5 - WAP and Users
68
68
This table describes the ports and protocols that are required for communication between users and the WAP servers.
69
69
70
70
| Protocol | Ports | Description |
71
71
| --- | --- | --- |
72
-
| HTTPS |443(TCP) |Used for device authentication. |
72
+
| HTTPS |443(TCP) |Used for device authentication. |
73
73
| TCP |49443 (TCP) |Used for certificate authentication. |
74
74
75
75
## Table 6a & 6b - Pass-through Authentication with Single Sign On (SSO) and Password Hash Sync with Single Sign On (SSO)
76
76
The following tables describes the ports and protocols that are required for communication between the Azure AD Connect and Azure AD.
77
77
78
78
### Table 6a - Pass-through Authentication with SSO
79
-
|Protocol|Port Number|Description
80
-
| --- | --- | ---
81
-
|HTTP|80|Enable outbound HTTP traffic for security validation such as SSL. Also needed for the connector auto-update capability to function properly.
82
-
|HTTPS|443| Enable outbound HTTPS traffic for operations such as enabling and disabling of the feature, registering connectors, downloading connector updates, and handling all user sign-in requests.
79
+
|Protocol| Ports |Description|
80
+
| --- | --- | ---|
81
+
|HTTP|80 (TCP)|Used to download CRLs (Certificate Revocation Lists) to verify TLS/SSL certificates. Also needed for the connector auto-update capability to function properly.|
82
+
|HTTPS|443 (TCP)|Used to enable and disable the feature, register connectors, download connector updates, and handle all user sign-in requests.|
83
83
84
84
In addition, Azure AD Connect needs to be able to make direct IP connections to the [Azure data center IP ranges](https://www.microsoft.com/download/details.aspx?id=41653).
85
85
86
86
### Table 6b - Password Hash Sync with SSO
87
87
88
-
|Protocol|Port Number|Description
89
-
| --- | --- | ---
90
-
|HTTPS|443| Enable SSO registration (required only for the SSO registration process).
88
+
|Protocol| Ports |Description|
89
+
| --- | --- | ---|
90
+
|HTTPS|443 (TCP)|Used to enable SSO registration (required only for the SSO registration process).
91
91
92
92
In addition, Azure AD Connect needs to be able to make direct IP connections to the [Azure data center IP ranges](https://www.microsoft.com/download/details.aspx?id=41653). Again, this is only required for the SSO registration process.
93
93
@@ -99,11 +99,11 @@ This table describes the following outbound ports and protocols that are require
99
99
100
100
| Protocol | Ports | Description |
101
101
| --- | --- | --- |
102
-
|HTTPS |443(TCP) |Outbound |
103
-
|Azure Service Bus |5671 (TCP) |Outbound |
102
+
|Azure Service Bus |5671 (TCP) | Used to send health information to Azure AD. (recommended but not required in latest versions)|
103
+
|HTTPS |443 (TCP) |Used to send health information to Azure AD. (failback)|
104
104
105
-
Azure Service Bus port 5671 is no longer required for the latest version of agent. The latest Azure AD Connect Health agent version only required port 443.
105
+
If 5671 is blocked, the agent falls back to 443, but using 5671 is recommended. This endpoint isn't required in the latest version of the agent.
106
+
The latest Azure AD Connect Health agent versions only require port 443.
106
107
107
108
### 7b - Endpoints for Azure AD Connect Health agent for (AD FS/Sync) and Azure AD
108
109
For a list of endpoints, see [the Requirements section for the Azure AD Connect Health agent](how-to-connect-health-agent-install.md#requirements).
- The log file must not allow circular logging, log rotation where the file is overwritten with new entries, or the file is renamed and the same file name resues for continued loging.
26
+
- The log file must not allow circular logging, log rotation where the file is overwritten with new entries, or the file is renamed and the same file name is reused for continued logging.
27
27
- The log file must use ASCII or UTF-8 encoding. Other formats such as UTF-16 are not supported.
28
28
- For Linux, time zone conversion is not supported for time stamps in the logs.
29
29
- As a best practice, the log file should include the date time that it was created to prevent log rotation overwiting or renaming.
Copy file name to clipboardExpand all lines: articles/data-factory/data-flow-derived-column.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ To add more derived columns, click on **Add** above the column list or the plus
31
31
32
32
### Column patterns
33
33
34
-
In cases where your schema is not explicitly defined or if you want to update a set of columns in bulk, you will want to create column patters. Column patterns allow for you to match columns using rules based upon the column metadata and create derived columns for each matched column. For more information, learn [how to build column patterns](concepts-data-flow-column-pattern.md#column-patterns-in-derived-column-and-aggregate) in the derived column transformation.
34
+
In cases where your schema is not explicitly defined or if you want to update a set of columns in bulk, you will want to create column patterns. Column patterns allow for you to match columns using rules based upon the column metadata and create derived columns for each matched column. For more information, learn [how to build column patterns](concepts-data-flow-column-pattern.md#column-patterns-in-derived-column-and-aggregate) in the derived column transformation.
Copy file name to clipboardExpand all lines: articles/postgresql/flexible-server/connect-azure-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ This quickstart demonstrates how to connect to an Azure Database for PostgreSQL
22
22
- Login using Azure CLI with ```az login``` command
23
23
- Turn on parameter persistence with ```az config param-persist on```. Parameter persistence will help you use local context without having to repeat a lot of arguments like resource group or location.
24
24
25
-
## Create an PostgreSQL Flexible Server
25
+
## Create a PostgreSQL Flexible Server
26
26
27
27
The first thing we'll create is a managed PostgreSQL server. In [Azure Cloud Shell](https://shell.azure.com/), run the following script and make a note of the **server name**, **username** and **password** generated from this command.
0 commit comments