Skip to content

Commit c0d1784

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into trend-micro-tutorial
2 parents 9fa5009 + d83fd0e commit c0d1784

File tree

163 files changed

+2413
-1724
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

163 files changed

+2413
-1724
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2872,6 +2872,11 @@
28722872
"redirect_url": "https://github.com/Azure-Samples/active-directory-dotnet-native-uwp-v2",
28732873
"redirect_document_id": false
28742874
},
2875+
{
2876+
"source_path": "articles/active-directory/develop/quickstart-v2-javascipt-auth-code.md",
2877+
"redirect_url": "/azure/active-directory/develop/quickstart-v2-javascript-auth-code",
2878+
"redirect_document_id": true
2879+
},
28752880
{
28762881
"source_path": "articles/active-directory/develop/active-directory-v2-devquickstarts-wpf.md",
28772882
"redirect_url": "https://docs.microsoft.com/azure/active-directory/develop/guidedsetups/active-directory-windesktop",

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 10/03/2019
16+
ms.date: 04/28/2020
1717
ms.author: mimart
1818
ms.reviewer: arvinh
1919

@@ -30,7 +30,7 @@ While in quarantine, the frequency of incremental cycles is gradually reduced to
3030

3131
There are three ways to check whether an application is in quarantine:
3232

33-
- In the Azure portal, navigate to **Azure Active Directory** > **Enterprise applications** > <*application name*> > **Provisioning** and scroll to the progress bar at the bottom.
33+
- In the Azure portal, navigate to **Azure Active Directory** > **Enterprise applications** > <*application name*> > **Provisioning** and review the progress bar for a quarantine message.
3434

3535
![Provisioning status bar showing quarantine status](./media/application-provisioning-quarantine-status/progress-bar-quarantined.png)
3636

@@ -48,7 +48,13 @@ There are three ways to check whether an application is in quarantine:
4848

4949
## Why is my application in quarantine?
5050

51-
A Microsoft Graph request to get the status of the provisioning job shows the following reason for quarantine:
51+
|Description|Recommended Action|
52+
|---|---|
53+
|**SCIM Compliance issue:** An HTTP/404 Not Found response was returned rather than the expected HTTP/200 OK response. In this case the Azure AD provisioning service has made a request to the target application and received an unexpected response.|Check the admin credentials section to see if the application requires specifying the tenant URL and ensure that the URL is correct. If you don't see an issue, please contact the application developer to ensure that their service is SCIM-compliant. https://tools.ietf.org/html/rfc7644#section-3.4.2 |
54+
|**Invalid credentials:** When attempting to authorize access to the target application we received a response from the target application that indicates the credentials provided are invalid.|Please navigate to the admin credentials section of the provisioning configuration UI and authorize access again with valid credentials. If the application is in the gallery, review the application configuration tutorial for any additional steps required.|
55+
|**Duplicate roles:** Roles imported from certain applications like Salesforce and Zendesk must be unique. |Navigate to the application [manifest](https://docs.microsoft.com/azure/active-directory/develop/reference-app-manifest) in the Azure portal and remove the duplicate role.|
56+
57+
A Microsoft Graph request to get the status of the provisioning job shows the following reason for quarantine:
5258

5359
- `EncounteredQuarantineException` indicates that invalid credentials were provided. The provisioning service is unable to establish a connection between the source system and the target system.
5460

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -813,7 +813,7 @@ Requests from Azure Active Directory include an OAuth 2.0 bearer token. Any serv
813813

814814
In the token, the issuer is identified by an iss claim, like `"iss":"https://sts.windows.net/cbb1a5ac-f33b-45fa-9bf5-f37db0fed422/"`. In this example, the base address of the claim value, `https://sts.windows.net`, identifies Azure Active Directory as the issuer, while the relative address segment, _cbb1a5ac-f33b-45fa-9bf5-f37db0fed422_, is a unique identifier of the Azure Active Directory tenant for which the token was issued.
815815

816-
The audience for the token will be the application template ID for the application in the gallery, each of the applications registered in a single tenant may receive the same `iss` claim with SCIM requests. The application template ID for each application in the gallery varies, please contact [[email protected]](mailto:[email protected]) for questions around the application template ID for a gallery application. The application template ID for all custom apps is _8adf8e6e-67b2-4cf2-a259-e3dc5476c621_.
816+
The audience for the token will be the application template ID for the application in the gallery, each of the applications registered in a single tenant may receive the same `iss` claim with SCIM requests. The application template ID for all custom apps is _8adf8e6e-67b2-4cf2-a259-e3dc5476c621_. The token generated by the Azure AD provisioning service should only be used for testing. It should not be used in production environments.
817817

818818
In the sample code, requests are authenticated using the Microsoft.AspNetCore.Authentication.JwtBearer package. The following code enforces that requests to any of the service’s endpoints are authenticated using the bearer token issued by Azure Active Directory for a specified tenant:
819819

articles/active-directory/develop/scenario-web-app-call-api-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ public void ConfigureServices(IServiceCollection services)
4646
{
4747
// more code here
4848
49-
services.AddSignIn(Configuration, "AzureAd");
49+
services.AddSignIn(Configuration, "AzureAd")
5050
.AddWebAppCallsProtectedWebApi(Configuration,
5151
initialScopes: new string[] { "user.read" })
5252
.AddInMemoryTokenCaches();

articles/active-directory/governance/entitlement-management-troubleshoot.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,13 +85,19 @@ This article describes some items you should check to help you troubleshoot Azur
8585

8686
If the request has any delivery errors, the request status will be **Undelivered** or **Partially delivered**.
8787

88-
If there are any delivery errors, in the request's detail pane, there will be a count of delivery errors.
88+
If there are any delivery errors, a count of delivery errors will be displayed in the request's detail pane.
8989

9090
1. Click the count to see all of the request's delivery errors.
9191

9292
### Reprocess a request
9393

94-
If a request encounters an error, you can reprocess the request to try it again. You can only reprocess a request that has a status of **Delivery failed** or **Partially delivered** and a completed date of less than one week.
94+
If an error is met after triggering an access package reprocess request, you must wait while the system reprocesses the request. The system tries multiple times to reprocess for several hours, so you can't force reprocessing during this time.
95+
96+
You can only reprocess a request that has a status of **Delivery failed** or **Partially delivered** and a completed date of less than one week.
97+
98+
- If the error is fixed during the trials window, the request status will change to **Delivering**. The request will reprocess without additional actions from the user.
99+
100+
- If the error wasn't fixed during the trials window, the request status may be **Delivery failed** or **partially delivered**. You can then use the **reprocess** button. You'll have seven days to reprocess the request.
95101

96102
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
97103

articles/active-directory/hybrid/choose-ad-authn.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -65,11 +65,11 @@ Details on decision questions:
6565

6666
1. Azure AD can handle sign-in for users without relying on on-premises components to verify passwords.
6767
2. Azure AD can hand off user sign-in to a trusted authentication provider such as Microsoft’s AD FS.
68-
3. If you need to apply user-level Active Directory security policies such as account expired, disabled account, password expired, account locked out, and sign-in hours on each user sign-in, Azure AD requires some on-premises components.
68+
3. If you need to apply, user-level Active Directory security policies such as account expired, disabled account, password expired, account locked out, and sign-in hours on each user sign-in, Azure AD requires some on-premises components.
6969
4. Sign-in features not natively supported by Azure AD:
7070
* Sign-in using smartcards or certificates.
7171
* Sign-in using on-premises MFA Server.
72-
* Sign-in using third party authentication solution.
72+
* Sign-in using third-party authentication solution.
7373
* Multi-site on-premises authentication solution.
7474
5. Azure AD Identity Protection requires Password Hash Sync regardless of which sign-in method you choose, to provide the *Users with leaked credentials* report. Organizations can fail over to Password Hash Sync if their primary sign-in method fails and it was configured before the failure event.
7575

@@ -128,7 +128,7 @@ Refer to [implementing pass-through authentication](../../active-directory/hybri
128128

129129
* **User experience**. The user experience of federated authentication depends on the implementation of the features, topology, and configuration of the federation farm. Some organizations need this flexibility to adapt and configure the access to the federation farm to suit their security requirements. For example, it's possible to configure internally connected users and devices to sign in users automatically, without prompting them for credentials. This configuration works because they already signed in to their devices. If necessary, some advanced security features make users' sign-in process more difficult.
130130

131-
* **Advanced scenarios**. A federated authentication solution is usually required when customers have an authentication requirement that Azure AD doesn't support natively. See detailed information to help you [choose the right sign-in option](https://blogs.msdn.microsoft.com/samueld/2017/06/13/choosing-the-right-sign-in-option-to-connect-to-azure-ad-office-365/). Consider the following common requirements:
131+
* **Advanced scenarios**. A federated authentication solution is required when customers have an authentication requirement that Azure AD doesn't support natively. See detailed information to help you [choose the right sign-in option](https://blogs.msdn.microsoft.com/samueld/2017/06/13/choosing-the-right-sign-in-option-to-connect-to-azure-ad-office-365/). Consider the following common requirements:
132132

133133
* Authentication that requires smartcards or certificates.
134134
* On-premises MFA servers or third-party multifactor providers requiring a federated identity provider.
@@ -197,7 +197,7 @@ Use or enable password hash synchronization for whichever authentication method
197197

198198
2. **On-premises outage survival**. The consequences of an on-premises outage due to a cyber-attack or disaster can be substantial, ranging from reputational brand damage to a paralyzed organization unable to deal with the attack. Recently, many organizations were victims of malware attacks, including targeted ransomware, which caused their on-premises servers to go down. When Microsoft helps customers deal with these kinds of attacks, it sees two categories of organizations:
199199

200-
* Organizations that previously turned on password hash synchronization changed their authentication method to use password hash synchronization. They were back online in a matter of hours. By using access to email via Office 365, they worked to resolve issues and access other cloud-based workloads.
200+
* Organizations that previously also turned on password hash synchronization on top of federated or pass-through authentication changed their primary authentication method to then use password hash synchronization. They were back online in a matter of hours. By using access to email via Office 365, they worked to resolve issues and access other cloud-based workloads.
201201

202202
* Organizations that didn’t previously enable password hash synchronization had to resort to untrusted external consumer email systems for communications to resolve issues. In those cases, it took them weeks to restore their on-premises identity infrastructure, before users were able to sign in to cloud-based apps again.
203203

articles/active-directory/hybrid/how-to-connect-migrate-groups.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Azure AD Connect: Migrate groups from one forest to another | Microsoft Docs'
2+
title: 'Azure AD Connect: Migrate groups from one forest to another'
33
description: This article describes the steps needed to successfully migrate groups from one forest to another for Azure AD Connect.
44
services: active-directory
55
author: billmath
@@ -16,28 +16,30 @@ ms.collection: M365-identity-device-management
1616

1717
# Migrate groups from one forest to another for Azure AD Connect
1818

19-
This article describes the steps needed to successfully migrate groups from one forest to another so that the migrated group objects match to the existing objects in the cloud.
19+
This article describes how to migrate groups from one forest to another so that the migrated group objects match the existing objects in the cloud.
2020

2121
## Prerequisites
2222

23-
- Azure AD Connect version 1.5.18.0 or higher
24-
- Source Anchor attribute is `mS-DS-ConsistencyGuid`
23+
- Azure AD Connect version 1.5.18.0 or later
24+
- Source anchor attribute set to `mS-DS-ConsistencyGuid`
2525

26-
Starting from version 1.5.18.0, Azure AD Connect has started supporting the use of `mS-DS-ConsistencyGuid` for groups. If `mS-DS-ConsistencyGuid` is chosen as the source anchor attribute and the value is populated in AD, Azure AD Connect uses the value of `mS-DS-ConsistencyGuid` as the immutableId. Otherwise, it falls back to using `objectGUID`. However, please note that Azure AD Connect **DOES NOT** write back the value to the `mS-DS-ConsistencyGuid` attribute in AD.
26+
## Migrate groups
2727

28-
During a cross-forest move scenario where a group object is moving from one forest (say F1) to another forest (say F2), we will need to copy over either the `mS-DS-ConsistencyGuid` value (If PRESENT) or `objectGUID` value from the object in forest F1 to the `mS-DS-ConsistencyGuid` attribute of the object in F2.
28+
Starting in version 1.5.18.0, Azure AD Connect supports the use of the `mS-DS-ConsistencyGuid` attribute for groups. If you choose `mS-DS-ConsistencyGuid` as the source anchor attribute and the value is populated in Active Directory, Azure AD Connect uses the value of `mS-DS-ConsistencyGuid` as the `immutableId`. Otherwise, it falls back to using `objectGUID`. But note that Azure AD Connect doesn't write the value back to the `mS-DS-ConsistencyGuid` attribute in Active Directory.
2929

30-
Please use the following scripts as guideline to see how you can migrate a single group from forest F1 to forest F2. Please feel free to use this as a guideline to do the migration for multiple groups.
30+
During a cross-forest move, when a group object is moving from one forest (say F1) to another forest (say F2), you need to copy either the `mS-DS-ConsistencyGuid` value (if it's present) or the `objectGUID` value from the object in forest F1 to the `mS-DS-ConsistencyGuid` attribute of the object in F2.
3131

32-
First, we get the `objectGUID` and `mS-DS-ConsistencyGuid` of group object in forest F1. These attributes are exported to a CSV file.
32+
Use the following scripts as a guide to learn how to migrate a single group from one forest to another. You can also use these scripts as a guide for the migration of multiple groups. The scripts use the forest name F1 for the source forest and F2 for the destination forest.
33+
34+
First, we get the `objectGUID` and `mS-DS-ConsistencyGuid` of the group object in forest F1. These attributes are exported to a CSV file.
3335
```
3436
<#
3537
DESCRIPTION
3638
============
3739
This script will take DN of a group as input.
3840
It then copies the objectGUID and mS-DS-ConsistencyGuid values along with other attributes of the given group to a CSV file.
3941
40-
This CSV file can then be used as input to Export-Group script
42+
This CSV file can then be used as input to the Export-Group script.
4143
#>
4244
Param(
4345
[ValidateNotNullOrEmpty()]
@@ -77,15 +79,15 @@ $results | Export-Csv "$outputCsv" -NoTypeInformation
7779
7880
```
7981

80-
Next, we use the generated output CSV file to stamp the `mS-DS-ConsistencyGuid` attribute on the target object in forest F2.
82+
Next, we use the generated output CSV file to stamp the `mS-DS-ConsistencyGuid` attribute on the target object in forest F2:
8183

8284

8385
```
8486
<#
8587
DESCRIPTION
8688
============
87-
This script will take DN of a group as input and the CSV file that was generated by Import-Group script
88-
It copies either the objectGUID or mS-DS-ConsistencyGuid value from CSV file to the given object.
89+
This script will take DN of a group as input and the CSV file that was generated by the Import-Group script.
90+
It copies either the objectGUID or the mS-DS-ConsistencyGuid value from the CSV file to the given object.
8991
9092
#>
9193
Param(
@@ -119,4 +121,4 @@ Set-ADGroup -Identity $dn -Replace @{'mS-DS-ConsistencyGuid'=$targetGuid} -Error
119121
```
120122

121123
## Next steps
122-
Learn more about [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md).
124+
Learn more about [integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md).

articles/active-directory/hybrid/how-to-connect-pta-quick-start.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Azure Active Directory (Azure AD) Pass-through Authentication allows your users
2727
>[!IMPORTANT]
2828
>If you are migrating from AD FS (or other federation technologies) to Pass-through Authentication, we highly recommend that you follow our detailed deployment guide published [here](https://aka.ms/adfstoPTADPDownload).
2929
30+
>[!NOTE]
31+
>If you deploying Pass Through Authentication with the Azure Government cloud, view [Hybrid Identity Considerations for Azure Government](https://docs.microsoft.com/azure/active-directory/hybrid/reference-connect-government-cloud).
32+
3033
Follow these instructions to deploy Pass-through Authentication on your tenant:
3134

3235
## Step 1: Check the prerequisites
@@ -69,7 +72,7 @@ Ensure that the following prerequisites are in place.
6972
- For certificate validation, unblock the following URLs: **mscrl.microsoft.com:80**, **crl.microsoft.com:80**, **ocsp.msocsp.com:80**, and **www\.microsoft.com:80**. Since these URLs are used for certificate validation with other Microsoft products you may already have these URLs unblocked.
7073

7174
### Azure Government cloud prerequisite
72-
Prior to enabling Pass-through Authentication through Azure AD Connect with Step 2, download the latest release of the PTA agent from the Azure portal. You need to ensure that your agent is versions **x.x.xxx.x** or later. To verify your agent see [Upgrade authentication agents](how-to-connect-pta-upgrade-preview-authentication-agents.md)
75+
Prior to enabling Pass-through Authentication through Azure AD Connect with Step 2, download the latest release of the PTA agent from the Azure portal. You need to ensure that your agent is versions **1.5.1742.0.** or later. To verify your agent see [Upgrade authentication agents](how-to-connect-pta-upgrade-preview-authentication-agents.md)
7376

7477
After downloading the latest release of the agent, proceed with the below instructions to configure Pass-Through Authentication through Azure AD Connect.
7578

0 commit comments

Comments
 (0)