Skip to content

Commit c330d55

Browse files
committed
fix merge conflict
2 parents 310d7b6 + 9bb0244 commit c330d55

File tree

64 files changed

+2843
-1049
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+2843
-1049
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52437,8 +52437,17 @@
5243752437
{
5243852438
"source_path": "articles/azure-monitor/app/usage-workbook.md",
5243952439
"redirect_url": "/azure/azure-monitor/platform/workbooks-overview",
52440+
"redirect_document_id": false
52441+
},
52442+
{
52443+
"source_path": "articles/batch/batch-api-basics.md",
52444+
"redirect_url": "/azure/batch/batch-service-workflow-features",
52445+
"redirect_document_id": false
52446+
},
52447+
{
52448+
"source_path": "articles/batch/batch-retry-after-errors.md",
52449+
"redirect_url": "/azure/batch/error-handling",
5244052450
"redirect_document_id": false
5244152451
}
52442-
5244352452
]
5244452453
}

articles/active-directory/devices/hybrid-azuread-join-federated-domains.md

Lines changed: 52 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -178,25 +178,69 @@ The installer creates a scheduled task on the system that runs in the user conte
178178

179179
## Verify the registration
180180

181-
To verify the device registration state in your Azure tenant, you can use the **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)** cmdlet in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
181+
Here are 3 ways to locate and verify the device state:
182+
183+
### Locally on the device
184+
185+
1. Open Windows PowerShell.
186+
2. Enter `dsregcmd /status`.
187+
3. Verify that both **AzureAdJoined** and **DomainJoined** are set to **YES**.
188+
4. You can use the **DeviceId** and compare the status on the service using either the Azure portal or PowerShell.
189+
190+
### Using the Azure portal
191+
192+
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
193+
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](https://docs.microsoft.com/azure/active-directory/devices/device-management-azure-portal#locate-devices).
194+
3. If the **Registered** column says **Pending**, then Hybrid Azure AD Join has not completed. In federated environments, this can happen only if it failed to register and AAD connect is configured to sync the devices.
195+
4. If the **Registered** column contains a **date/time**, then Hybrid Azure AD Join has completed.
196+
197+
### Using PowerShell
198+
199+
Verify the device registration state in your Azure tenant by using **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)**. This cmdlet is in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
182200

183201
When you use the **Get-MSolDevice** cmdlet to check the service details:
184202

185203
- An object with the **device ID** that matches the ID on the Windows client must exist.
186-
- The value for **DeviceTrustType** must be **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state under **Devices** in the Azure AD portal.
187-
- For devices that are used in Conditional Access, the value for **Enabled** must be **True** and **DeviceTrustLevel** must be **Managed**.
188-
189-
**To check the service details**:
204+
- The value for **DeviceTrustType** is **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state on the **Devices** page in the Azure AD portal.
205+
- For devices that are used in Conditional Access, the value for **Enabled** is **True** and **DeviceTrustLevel** is **Managed**.
190206

191207
1. Open Windows PowerShell as an administrator.
192-
1. Enter `Connect-MsolService` to connect to your Azure tenant.
193-
1. Enter `get-msoldevice -deviceId <deviceId>`.
194-
1. Verify that **Enabled** is set to **True**.
208+
2. Enter `Connect-MsolService` to connect to your Azure tenant.
209+
210+
#### Count all Hybrid Azure AD joined devices (excluding **Pending** state)
211+
212+
```azurepowershell
213+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
214+
```
215+
216+
#### Count all Hybrid Azure AD joined devices with **Pending** state
217+
218+
```azurepowershell
219+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
220+
```
221+
222+
#### List all Hybrid Azure AD joined devices
223+
224+
```azurepowershell
225+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
226+
```
227+
228+
#### List all Hybrid Azure AD joined devices with **Pending** state
229+
230+
```azurepowershell
231+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
232+
```
233+
234+
#### List details of a single device:
235+
236+
1. Enter `get-msoldevice -deviceId <deviceId>` (This is the **DeviceId** obtained locally on the device).
237+
2. Verify that **Enabled** is set to **True**.
195238

196239
## Troubleshoot your implementation
197240

198241
If you experience issues with completing hybrid Azure AD join for domain-joined Windows devices, see:
199242

243+
- [Troubleshooting devices using dsregcmd command](https://docs.microsoft.com/azure/active-directory/devices/troubleshoot-device-dsregcmd)
200244
- [Troubleshoot hybrid Azure AD join for Windows current devices](troubleshoot-hybrid-join-windows-current.md)
201245
- [Troubleshoot hybrid Azure AD join for Windows downlevel devices](troubleshoot-hybrid-join-windows-legacy.md)
202246

articles/active-directory/devices/hybrid-azuread-join-managed-domains.md

Lines changed: 49 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,24 @@ The installer creates a scheduled task on the system that runs in the user conte
158158

159159
## Verify the registration
160160

161+
Here are 3 ways to locate and verify the device state:
162+
163+
### Locally on the device
164+
165+
1. Open Windows PowerShell.
166+
2. Enter `dsregcmd /status`.
167+
3. Verify that both **AzureAdJoined** and **DomainJoined** are set to **YES**.
168+
4. You can use the **DeviceId** and compare the status on the service using either the Azure portal or PowerShell.
169+
170+
### Using the Azure portal
171+
172+
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
173+
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](https://docs.microsoft.com/azure/active-directory/devices/device-management-azure-portal#locate-devices).
174+
3. If the **Registered** column says **Pending**, then Hybrid Azure AD Join has not completed.
175+
4. If the **Registered** column contains a **date/time**, then Hybrid Azure AD Join has completed.
176+
177+
### Using PowerShell
178+
161179
Verify the device registration state in your Azure tenant by using **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)**. This cmdlet is in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
162180

163181
When you use the **Get-MSolDevice** cmdlet to check the service details:
@@ -166,17 +184,43 @@ When you use the **Get-MSolDevice** cmdlet to check the service details:
166184
- The value for **DeviceTrustType** is **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state on the **Devices** page in the Azure AD portal.
167185
- For devices that are used in Conditional Access, the value for **Enabled** is **True** and **DeviceTrustLevel** is **Managed**.
168186

169-
To check the service details:
170-
171187
1. Open Windows PowerShell as an administrator.
172-
1. Enter `Connect-MsolService` to connect to your Azure tenant.
173-
1. Enter `get-msoldevice -deviceId <deviceId>`.
174-
1. Verify that **Enabled** is set to **True**.
188+
2. Enter `Connect-MsolService` to connect to your Azure tenant.
189+
190+
#### Count all Hybrid Azure AD joined devices (excluding **Pending** state)
191+
192+
```azurepowershell
193+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
194+
```
195+
196+
#### Count all Hybrid Azure AD joined devices with **Pending** state
197+
198+
```azurepowershell
199+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
200+
```
201+
202+
#### List all Hybrid Azure AD joined devices
203+
204+
```azurepowershell
205+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
206+
```
207+
208+
#### List all Hybrid Azure AD joined devices with **Pending** state
209+
210+
```azurepowershell
211+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
212+
```
213+
214+
#### List details of a single device:
215+
216+
1. Enter `get-msoldevice -deviceId <deviceId>` (This is the **DeviceId** obtained locally on the device).
217+
2. Verify that **Enabled** is set to **True**.
175218

176219
## Troubleshoot your implementation
177220

178221
If you experience issues completing hybrid Azure AD join for domain-joined Windows devices, see:
179222

223+
- [Troubleshooting devices using dsregcmd command](https://docs.microsoft.com/azure/active-directory/devices/troubleshoot-device-dsregcmd)
180224
- [Troubleshooting hybrid Azure Active Directory joined devices](troubleshoot-hybrid-join-windows-current.md)
181225
- [Troubleshooting hybrid Azure Active Directory joined down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
182226

articles/active-directory/devices/hybrid-azuread-join-manual.md

Lines changed: 60 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -548,16 +548,71 @@ To register Windows down-level devices, you need to download and install a Windo
548548

549549
## Verify joined devices
550550

551-
You can check for successfully joined devices in your organization by using the [Get-MsolDevice](/powershell/msonline/v1/get-msoldevice) cmdlet in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
551+
Here are 3 ways to locate and verify the device state:
552552

553-
The output of this cmdlet shows devices that are registered and joined with Azure AD. To get all devices, use the **-All** parameter, and then filter them by using the **deviceTrustType** property. Domain-joined devices have a value of **Domain Joined**.
553+
### Locally on the device
554+
555+
1. Open Windows PowerShell.
556+
2. Enter `dsregcmd /status`.
557+
3. Verify that both **AzureAdJoined** and **DomainJoined** are set to **YES**.
558+
4. You can use the **DeviceId** and compare the status on the service using either the Azure portal or PowerShell.
559+
560+
### Using the Azure portal
561+
562+
1. Go to the devices page using a [direct link](https://portal.azure.com/#blade/Microsoft_AAD_IAM/DevicesMenuBlade/Devices).
563+
2. Information on how to locate a device can be found in [How to manage device identities using the Azure portal](https://docs.microsoft.com/azure/active-directory/devices/device-management-azure-portal#locate-devices).
564+
3. If the **Registered** column says **Pending**, then Hybrid Azure AD Join has not completed. In federated environments, this can happen only if it failed to register and AAD connect is configured to sync the devices.
565+
4. If the **Registered** column contains a **date/time**, then Hybrid Azure AD Join has completed.
566+
567+
### Using PowerShell
568+
569+
Verify the device registration state in your Azure tenant by using **[Get-MsolDevice](/powershell/msonline/v1/get-msoldevice)**. This cmdlet is in the [Azure Active Directory PowerShell module](/powershell/azure/install-msonlinev1?view=azureadps-2.0).
570+
571+
When you use the **Get-MSolDevice** cmdlet to check the service details:
572+
573+
- An object with the **device ID** that matches the ID on the Windows client must exist.
574+
- The value for **DeviceTrustType** is **Domain Joined**. This setting is equivalent to the **Hybrid Azure AD joined** state on the **Devices** page in the Azure AD portal.
575+
- For devices that are used in Conditional Access, the value for **Enabled** is **True** and **DeviceTrustLevel** is **Managed**.
576+
577+
1. Open Windows PowerShell as an administrator.
578+
2. Enter `Connect-MsolService` to connect to your Azure tenant.
579+
580+
#### Count all Hybrid Azure AD joined devices (excluding **Pending** state)
581+
582+
```azurepowershell
583+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
584+
```
585+
586+
#### Count all Hybrid Azure AD joined devices with **Pending** state
587+
588+
```azurepowershell
589+
(Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}).count
590+
```
591+
592+
#### List all Hybrid Azure AD joined devices
593+
594+
```azurepowershell
595+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
596+
```
597+
598+
#### List all Hybrid Azure AD joined devices with **Pending** state
599+
600+
```azurepowershell
601+
Get-MsolDevice -All -IncludeSystemManagedDevices | where {($_.DeviceTrustType -eq 'Domain Joined') -and (-not([string]($_.AlternativeSecurityIds)).StartsWith("X509:"))}
602+
```
603+
604+
#### List details of a single device:
605+
606+
1. Enter `get-msoldevice -deviceId <deviceId>` (This is the **DeviceId** obtained locally on the device).
607+
2. Verify that **Enabled** is set to **True**.
554608

555609
## Troubleshoot your implementation
556610

557-
If you're experiencing issues with completing hybrid Azure AD join for domain-joined Windows devices, see:
611+
If you experience issues completing hybrid Azure AD join for domain-joined Windows devices, see:
558612

559-
* [Troubleshooting Hybrid Azure AD join for Windows current devices](troubleshoot-hybrid-join-windows-current.md)
560-
* [Troubleshooting Hybrid Azure AD join for Windows down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
613+
- [Troubleshooting devices using dsregcmd command](https://docs.microsoft.com/azure/active-directory/devices/troubleshoot-device-dsregcmd)
614+
- [Troubleshooting hybrid Azure Active Directory joined devices](troubleshoot-hybrid-join-windows-current.md)
615+
- [Troubleshooting hybrid Azure Active Directory joined down-level devices](troubleshoot-hybrid-join-windows-legacy.md)
561616

562617
## Next steps
563618

articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,6 @@ Once you've configured provisioning, use the following resources to monitor your
137137
* **InvalidLookupReference:** When provisioning certain attributes such as Department and Location in ServiceNow, the values must already exist in a reference table in ServiceNow. For example, you may have two locations (Seattle, Los Angeles) and three departments (Sales, Finance, Marketing) in the **insert table name** table in ServiceNow. If you attempt to provision a user where his department is "Sales" and location is "Seattle" he will be provisioned successfully. If you attempt to provision a user with department "Sales" and location "LA" the user won't be provisioned. The location LA must either be added to the reference table in ServiceNow or the user attribute in Azure AD must be updated to match the format in ServiceNow.
138138
* **EntryJoiningPropertyValueIsMissing:** Review your [attribute mappings](https://docs.microsoft.com/azure/active-directory/manage-apps/customize-application-attributes) to identify the matching attribute. This value must be present on the user or group you're attempting to provision.
139139
* Review the [ServiceNow SOAP API](https://docs.servicenow.com/bundle/newyork-application-development/page/integrate/web-services-apis/reference/r_DirectWebServiceAPIFunctions.html) to understand any requirements or limitations (for example, format to specify country code for a user)
140-
* Some ServiceNow deployments require permitting IP ranges for the Azure AD provisioning service. The reserved IP ranges for the Azure AD provisioning service can be found [here](https://www.microsoft.com/download/details.aspx?id=56519) under "AzureActiveDirectoryDomainServices".
141140
* Provisioning requests are sent by default to https://{your-instance-name}.service-now.com/{table-name} . If you require a custom tenant URL, you can provide the entire URL in the instance name field.
142141

143142
## Additional resources

articles/app-service/app-service-undelete.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ The detailed information includes:
4343
- **Deletion Time**: When was the app deleted
4444

4545
## Restore deleted app
46+
>[!NOTE]
47+
> `Restore-AzDeletedWebApp` isn't supported for function apps.
4648
4749
Once the app you want to restore has been identified, you can restore it using `Restore-AzDeletedWebApp`.
4850

articles/app-service/overview-managed-identity.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,11 @@ To set up a managed identity in the portal, you will first create an application
3737

3838
![Managed identity in App Service](media/app-service-managed-service-identity/system-assigned-managed-identity-in-azure-portal.png)
3939

40+
41+
> [!NOTE]
42+
> To find the managed identity for your web or slot app in the Azure portal, go to the User settings section under Enterprise applications.
43+
44+
4045
### Using the Azure CLI
4146

4247
To set up a managed identity using the Azure CLI, you will need to use the `az webapp identity assign` command against an existing application. You have three options for running the examples in this section:

articles/application-gateway/quick-create-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: vhorne
77
ms.service: application-gateway
88
ms.topic: quickstart
9-
ms.date: 03/09/2020
9+
ms.date: 05/21/2020
1010
ms.author: victorh
1111
ms.custom: mvc
1212
---
@@ -226,4 +226,4 @@ To delete the resource group:
226226
## Next steps
227227
228228
> [!div class="nextstepaction"]
229-
> [Manage web traffic with an application gateway using the Azure CLI](./tutorial-manage-web-traffic-cli.md)
229+
> [Tutorial: Configure an application gateway with TLS termination using the Azure portal](create-ssl-portal.md)

articles/azure-databricks/TOC.yml

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1618,20 +1618,6 @@
16181618
- name: Azure Databricks personal access tokens
16191619
href: /azure/databricks/dev-tools/api/latest/authentication
16201620
maintainContext: true
1621-
- name: Azure Active Directory tokens
1622-
items:
1623-
- name: Azure AD token authentication overview
1624-
href: /azure/databricks/dev-tools/api/latest/aad/index
1625-
maintainContext: true
1626-
- name: Get an Azure AD token using the Azure AD Authentication Library
1627-
href: /azure/databricks/dev-tools/api/latest/aad/app-aad-token
1628-
maintainContext: true
1629-
- name: Get an Azure AD token using a service principal
1630-
href: /azure/databricks/dev-tools/api/latest/aad/service-prin-aad-token
1631-
maintainContext: true
1632-
- name: Troubleshoot Azure AD access tokens
1633-
href: /azure/databricks/dev-tools/api/latest/aad/troubleshoot-aad-token
1634-
maintainContext: true
16351621
- name: Azure Active Directory tokens
16361622
items:
16371623
- name: Azure AD token authentication overview

articles/azure-monitor/app/asp-net-troubleshoot-no-data.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Troubleshooting no data - Application Insights for .NET
33
description: Not seeing data in Azure Application Insights? Try here.
44
ms.topic: conceptual
5-
ms.date: 07/23/2018
5+
ms.date: 05/21/2020
66

77
---
88

@@ -245,6 +245,14 @@ For more information,
245245
- [Recording performance traces with PerfView](https://github.com/dotnet/roslyn/wiki/Recording-performance-traces-with-PerfView).
246246
- [Application Insights Event Sources](https://github.com/microsoft/ApplicationInsights-Home/tree/master/Samples/ETW)
247247

248+
## Collect logs with dotnet-trace
249+
250+
An alternate method of collecting logs for troubleshooting that may be particularly helpful for linux-based environments is [`dotnet-trace`](https://docs.microsoft.com/dotnet/core/diagnostics/dotnet-trace)
251+
252+
```bash
253+
dotnet-trace collect --process-id <PID> --providers Microsoft-ApplicationInsights-Core,Microsoft-ApplicationInsights-Data,Microsoft-ApplicationInsights-WindowsServer-TelemetryChannel,Microsoft-ApplicationInsights-Extensibility-AppMapCorrelation-Dependency,Microsoft-ApplicationInsights-Extensibility-AppMapCorrelation-Web,Microsoft-ApplicationInsights-Extensibility-DependencyCollector,Microsoft-ApplicationInsights-Extensibility-HostingStartup,Microsoft-ApplicationInsights-Extensibility-PerformanceCollector,Microsoft-ApplicationInsights-Extensibility-EventCounterCollector,Microsoft-ApplicationInsights-Extensibility-PerformanceCollector-QuickPulse,Microsoft-ApplicationInsights-Extensibility-Web,Microsoft-ApplicationInsights-Extensibility-WindowsServer,Microsoft-ApplicationInsights-WindowsServer-Core,Microsoft-ApplicationInsights-Extensibility-EventSourceListener,Microsoft-ApplicationInsights-AspNetCore
254+
```
255+
248256
## How to remove Application Insights
249257

250258
Learn how to remove Application Insights in Visual Studio by following the steps provide in the removal [article](../../azure-monitor/app/remove-application-insights.md).

0 commit comments

Comments
 (0)