Skip to content

Commit c9d1fb7

Browse files
authored
Merge pull request #42633 from MicrosoftDocs/master
5/31 AM Publish
2 parents 842e650 + 563c3c4 commit c9d1fb7

File tree

164 files changed

+3163
-1882
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

164 files changed

+3163
-1882
lines changed

.openpublishing.redirection.json

Lines changed: 65 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -8450,6 +8450,16 @@
84508450
"redirect_url": "/azure/vpn-gateway/vpn-gateway-howto-vnet-vnet-portal-classic",
84518451
"redirect_document_id": false
84528452
},
8453+
{
8454+
"source_path": "articles/virtual-network/virtual-network-routes-troubleshoot-portal.md",
8455+
"redirect_url": "/azure/virtual-network/diagnose-network-routing-problem",
8456+
"redirect_document_id": false
8457+
},
8458+
{
8459+
"source_path": "articles/virtual-network/virtual-network-routes-troubleshoot-powershell.md",
8460+
"redirect_url": "/azure/virtual-network/diagnose-network-routing-problem",
8461+
"redirect_document_id": true
8462+
},
84538463
{
84548464
"source_path": "articles/virtual-network/virtual-network-nsg-troubleshoot-portal.md",
84558465
"redirect_url": "/azure/virtual-network/diagnose-network-traffic-filter-problem",
@@ -8755,56 +8765,6 @@
87558765
"redirect_url": "/azure/cognitive-services/video-indexer/video-indexer-get-started",
87568766
"redirect_document_id": false
87578767
},
8758-
{
8759-
"source_path": "articles/iot-suite/iot-suite-v1-connecting-devices.md",
8760-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-connecting-devices.md",
8761-
"redirect_document_id": false
8762-
},
8763-
{
8764-
"source_path": "articles/iot-suite/iot-suite-v1-connecting-devices-linux.md",
8765-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-connecting-devices-linux.md",
8766-
"redirect_document_id": false
8767-
},
8768-
{
8769-
"source_path": "articles/iot-suite/iot-suite-v1-connecting-devices-node.md",
8770-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-connecting-devices-node.md",
8771-
"redirect_document_id": false
8772-
},
8773-
{
8774-
"source_path": "articles/iot-suite/iot-suite-v1-custom-rule.md",
8775-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-custom-rule.md",
8776-
"redirect_document_id": false
8777-
},
8778-
{
8779-
"source_path": "articles/iot-suite/iot-suite-v1-dynamic-telemetry.md",
8780-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-dynamic-telemetry.md",
8781-
"redirect_document_id": false
8782-
},
8783-
{
8784-
"source_path": "articles/iot-suite/iot-suite-v1-faq.md",
8785-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-faq.md",
8786-
"redirect_document_id": false
8787-
},
8788-
{
8789-
"source_path": "articles/iot-suite/iot-suite-v1-getstarted-preconfigured-solutions.md",
8790-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-getstarted-preconfigured-solutions.md",
8791-
"redirect_document_id": false
8792-
},
8793-
{
8794-
"source_path": "articles/iot-suite/iot-suite-v1-guidance-on-customizing-preconfigured-solutions.md",
8795-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-guidance-on-customizing-preconfigured-solutions.md",
8796-
"redirect_document_id": false
8797-
},
8798-
{
8799-
"source_path": "articles/iot-suite/iot-suite-v1-logic-apps-tutorial.md",
8800-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-logic-apps-tutorial.md",
8801-
"redirect_document_id": false
8802-
},
8803-
{
8804-
"source_path": "articles/iot-suite/iot-suite-v1-permissions.md",
8805-
"redirect_url": "https://github.com/Azure/azure-iot-remote-monitoring/blob/master/Tutorials/iot-suite-v1-permissions.md",
8806-
"redirect_document_id": false
8807-
},
88088768
{
88098769
"source_path": "articles/iot-suite/iot-solution-build-system.md",
88108770
"redirect_url": "https://github.com/Azure-Samples/MyDriving/blob/master/docs/iot-solution-build-system.md",
@@ -19070,6 +19030,46 @@
1907019030
"redirect_url": "/azure/monitoring/monitoring-walkthrough-servicemap",
1907119031
"redirect_document_id": false
1907219032
},
19033+
{
19034+
"source_path": "articles/operations-management-suite/oms-security-getting-started.md",
19035+
"redirect_url": "/azure/security-center/security-center-intro",
19036+
"redirect_document_id": false
19037+
},
19038+
{
19039+
"source_path": "articles/operations-management-suite/oms-security-monitoring-resources.md",
19040+
"redirect_url": "/azure/security-center/security-center-monitoring",
19041+
"redirect_document_id": false
19042+
},
19043+
{
19044+
"source_path": "articles/operations-management-suite/oms-security-responding-alerts.md",
19045+
"redirect_url": "/azure/security-center/security-center-managing-and-responding-alerts",
19046+
"redirect_document_id": false
19047+
},
19048+
{
19049+
"source_path": "articles/operations-management-suite/oms-security-baseline.md",
19050+
"redirect_url": "/azure/security-center/security-center-customize-os-security-config",
19051+
"redirect_document_id": false
19052+
},
19053+
{
19054+
"source_path": "articles/log-analytics/log-analytics-malware.md",
19055+
"redirect_url": "/azure/security-center/security-center-install-endpoint-protection",
19056+
"redirect_document_id": false
19057+
},
19058+
{
19059+
"source_path": "articles/operations-management-suite/oms-security-connect-products.md",
19060+
"redirect_url": "/azure/security-center/quick-security-solutions",
19061+
"redirect_document_id": false
19062+
},
19063+
{
19064+
"source_path": "articles/operations-management-suite/oms-security-web-baseline-assessment.md",
19065+
"redirect_url": "/azure/security-center/security-center-customize-os-security-config ",
19066+
"redirect_document_id": false
19067+
},
19068+
{
19069+
"source_path": "articles/operations-management-suite/oms-security-data-security.md",
19070+
"redirect_url": "/azure/security-center/security-center-data-security ",
19071+
"redirect_document_id": false
19072+
},
1907319073
{
1907419074
"source_path": "articles/azure-functions/durable-functions-counter.md",
1907519075
"redirect_url": "/azure/azure-functions/durable-functions-monitor",
@@ -22030,6 +22030,21 @@
2203022030
"source_path": "articles/java-add-certificate-ca-store.md",
2203122031
"redirect_url": "/java/azure/java-sdk-add-certificate-ca-store",
2203222032
"redirect_document_id": true
22033+
},
22034+
{
22035+
"source_path": "articles/cognitive-services/LUIS/Add-intents.md",
22036+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-intents",
22037+
"redirect_document_id": true
22038+
},
22039+
{
22040+
"source_path": "articles/cognitive-services/LUIS/Add-example-utterances.md",
22041+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-example-utterances",
22042+
"redirect_document_id": true
22043+
},
22044+
{
22045+
"source_path": "articles/cognitive-services/LUIS/Add-Features.md",
22046+
"redirect_url": "/azure/cognitive-services/LUIS/luis-how-to-add-features",
22047+
"redirect_document_id": true
2203322048
}
2203422049
]
2203522050
}

articles/active-directory-domain-services/active-directory-ds-synchronization.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,41 +14,41 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: article
17-
ms.date: 03/06/2017
17+
ms.date: 05/30/2018
1818
ms.author: maheshu
1919

2020
---
2121
# Synchronization in an Azure AD Domain Services managed domain
2222
The following diagram illustrates how synchronization works in Azure AD Domain Services managed domains.
2323

24-
![Synchronization topology in Azure AD Domain Services](./media/active-directory-domain-services-design-guide/sync-topology.png)
24+
![Synchronization in Azure AD Domain Services](./media/active-directory-domain-services-design-guide/sync-topology.png)
2525

2626
## Synchronization from your on-premises directory to your Azure AD tenant
2727
Azure AD Connect sync is used to synchronize user accounts, group memberships, and credential hashes to your Azure AD tenant. Attributes of user accounts such as the UPN and on-premises SID (security identifier) are synchronized. If you use Azure AD Domain Services, legacy credential hashes required for NTLM and Kerberos authentication are also synchronized to your Azure AD tenant.
2828

29-
If you configure write-back, changes occurring in your Azure AD directory are synchronized back to your on-premises Active Directory. For example, if you change your password using Azure AD's self-service password change features, the changed password is updated in your on-premises AD domain.
29+
If you configure write-back, changes occurring in your Azure AD directory are synchronized back to your on-premises Active Directory. For example, if you change your password using Azure AD self-service password management, the changed password is updated in your on-premises AD domain.
3030

3131
> [!NOTE]
3232
> Always use the latest version of Azure AD Connect to ensure you have fixes for all known bugs.
3333
>
3434
>
3535
3636
## Synchronization from your Azure AD tenant to your managed domain
37-
User accounts, group memberships, and credential hashes are synchronized from your Azure AD tenant to your Azure AD Domain Services managed domain. This synchronization process is automatic. You do not need to configure, monitor, or manage this synchronization process. After the one-time initial synchronization of your directory is complete, it typically takes about 20 minutes for changes made in Azure AD to be reflected in your managed domain. This synchronization interval applies to password changes or changes to attributes made in Azure AD.
37+
User accounts, group memberships, and credential hashes are synchronized from your Azure AD tenant to your Azure AD Domain Services managed domain. This synchronization process is automatic. You do not need to configure, monitor, or manage this synchronization process. Initial synchronization may take from a few hours to a couple of days depending on the number of objects in your Azure AD directory. After initial synchronization completes, it takes about 20-30 minutes for changes that are made in Azure AD to be updated in your managed domain. This synchronization interval applies to password changes or changes to attributes made in Azure AD.
3838

3939
The synchronization process is also one-way/unidirectional in nature. Your managed domain is largely read-only except for any custom OUs you create. Therefore, you cannot make changes to user attributes, user passwords, or group memberships within the managed domain. As a result, there is no reverse synchronization of changes from your managed domain back to your Azure AD tenant.
4040

4141
## Synchronization from a multi-forest on-premises environment
4242
Many organizations have a fairly complex on-premises identity infrastructure consisting of multiple account forests. Azure AD Connect supports synchronizing users, groups, and credential hashes from multi-forest environments to your Azure AD tenant.
4343

44-
In contrast, your Azure AD tenant is a much simpler and flat namespace. To enable users to reliably access applications secured by Azure AD, resolve UPN conflicts across user accounts in different forests. Your Azure AD Domain Services managed domain bears close resemblance to your Azure AD tenant. Therefore, you see a flat OU structure in your managed domain. All users and groups are stored within the 'AADDC Users' container, regardless of the on-premises domain or forest from which they were synced in. You may have configured a hierarchical OU structure on-premises. However, your managed domain still has a simple flat OU structure.
44+
In contrast, your Azure AD tenant is a much simpler and flat namespace. To enable users to reliably access applications secured by Azure AD, resolve UPN conflicts across user accounts in different forests. Your Azure AD Domain Services managed domain bears close resemblance to your Azure AD tenant. You see a flat OU structure in your managed domain. All user accounts and groups are stored within the 'AADDC Users' container, despite being synchronized from different on-premises domains or forests. You may have configured a hierarchical OU structure on-premises. Your managed domain still has a simple flat OU structure.
4545

4646
## Exclusions - what isn't synchronized to your managed domain
4747
The following objects or attributes are not synchronized to your Azure AD tenant or to your managed domain:
4848

4949
* **Excluded attributes:** You may choose to exclude certain attributes from synchronizing to your Azure AD tenant from your on-premises domain using Azure AD Connect. These excluded attributes are not available in your managed domain.
5050
* **Group Policies:** Group Policies configured in your on-premises domain are not synchronized to your managed domain.
51-
* **SYSVOL share:** Similarly, the contents of the SYSVOL share on your on-premises domain are not synchronized to your managed domain.
51+
* **Sysvol share:** Similarly, the contents of the Sysvol share on your on-premises domain are not synchronized to your managed domain.
5252
* **Computer objects:** Computer objects for computers joined to your on-premises domain are not synchronized to your managed domain. These computers do not have a trust relationship with your managed domain and belong to your on-premises domain only. In your managed domain, you find computer objects only for computers you have explicitly domain-joined to the managed domain.
5353
* **SidHistory attributes for users and groups:** The primary user and primary group SIDs from your on-premises domain are synchronized to your managed domain. However, existing SidHistory attributes for users and groups are not synchronized from your on-premises domain to your managed domain.
5454
* **Organization Units (OU) structures:** Organizational Units defined in your on-premises domain do not synchronize to your managed domain. There are two built-in OUs in your managed domain. By default, your managed domain has a flat OU structure. You may however choose to [create a custom OU in your managed domain](active-directory-ds-admin-guide-create-ou.md).
@@ -111,6 +111,15 @@ The following table illustrates how specific attributes for group objects in you
111111
| onPremiseSecurityIdentifier |sidHistory |
112112
| securityEnabled |groupType |
113113

114+
## Password hash synchronization and security considerations
115+
When you enable Azure AD Domain Services, your Azure AD directory generates and stores password hashes in NTLM & Kerberos compatible formats.
116+
117+
For existing cloud user accounts, since Azure AD never stores their clear-text passwords, these hashes cannot be automatically generated. Therefore, Microsoft requires [cloud-users to reset/change their passwords](active-directory-ds-getting-started-password-sync.md) in order for their password hashes to be generated and stored in Azure AD. For any cloud user account created in Azure AD after enabling Azure AD Domain Services, the password hashes are generated and stored in the NTLM and Kerberos compatible formats.
118+
119+
For user accounts synced from on-premises AD using Azure AD Connect Sync, you need to [configure Azure AD Connect to synchronize password hashes in the NTLM and Kerberos compatible formats](active-directory-ds-getting-started-password-sync-synced-tenant.md).
120+
121+
The NTLM and Kerberos compatible password hashes are always stored in an encrypted manner in Azure AD. These hashes are encrypted such that only Azure AD Domain Services has access to the decryption keys. No other service or component in Azure AD has access to the decryption keys. The encryption keys are unique per-Azure AD tenant. Azure AD Domain Services synchronizes the password hashes into the domain controllers for your managed domain. These password hashes are stored and secured on these domain controllers similar to how passwords are stored and secured on Windows Server AD domain controllers. The disks for these managed domain controllers are encrypted at rest.
122+
114123
## Objects that are not synchronized to your Azure AD tenant from your managed domain
115124
As described in a preceding section of this article, there is no synchronization from your managed domain back to your Azure AD tenant. You may choose to [create a custom Organizational Unit (OU)](active-directory-ds-admin-guide-create-ou.md) in your managed domain. Further, you can create other OUs, users, groups, or service accounts within these custom OUs. None of the objects created within custom OUs are synchronized back to your Azure AD tenant. These objects are available for use only within your managed domain. Therefore, these objects are not visible using Azure AD PowerShell cmdlets, Azure AD Graph API or using the Azure AD management UI.
116125

articles/active-directory/active-directory-azure-ad-controls-manage-user-access-with-access-reviews.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,10 +29,6 @@ With Azure Active Directory (Azure AD), you can easily ensure that users have ap
2929

3030
Access reviews are available with the Premium P2 edition of Azure AD, which is included in Microsoft Enterprise Mobility + Security, E5. For more information, see [Azure Active Directory editions](active-directory-editions.md). Each user who interacts with this feature, including to create a review, fill out a review or confirm their access, requires a license.
3131

32-
Access reviews are available with the Premium P2 edition of Azure AD, which is included in Microsoft Enterprise Mobility + Security, E5. For more information, see [Azure Active Directory editions](active-directory-whatis.md). Each user who interacts with this feature to create a review, access a review, or apply a review requires a license.
33-
34-
35-
3632
## Create and perform an access review
3733

3834
You can have one or more users as reviewers in an access review.

articles/active-directory/managed-service-identity/how-to-manage-ua-identity-arm.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,7 @@ As with the Azure portal and scripting, Azure Resource Manager templates provide
4949

5050
To create a user assigned identity, use the following template. Replace the `<USER ASSIGNED IDENTITY NAME>` value with your own values:
5151

52-
> [!IMPORTANT]
53-
> Creating user assigned identities only supports alphanumeric and hyphen (0-9 or a-z or A-Z or -) characters. Additionally, name should be limited to 24 character length for the assignment to VM/VMSS to work properly. Check back for updates. For more information, see [FAQs and known issues](known-issues.md)
52+
[!INCLUDE[ua-character-limit](~/includes/managed-identity-ua-character-limits.md)]
5453

5554
```json
5655
{

articles/active-directory/managed-service-identity/how-to-manage-ua-identity-powershell.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,8 +36,7 @@ In this article, you learn how to create, list and delete a user assigned identi
3636

3737
To create a user assigned identity, use the [New-AzureRmUserAssignedIdentity](/powershell/module/azurerm.managedserviceidentity/new-azurermuserassignedidentity) command. The `ResourceGroupName` parameter specifies the resource group where to create the user assigned identity, and the `-Name` parameter specifies its name. Replace the `<RESOURCE GROUP>` and `<USER ASSIGNED IDENTITY NAME>` parameter values with your own values:
3838

39-
> [!IMPORTANT]
40-
> Creating user assigned identities only supports alphanumeric and hyphen (0-9 or a-z or A-Z or -) characters. Additionally, name should be limited to 24 character length for the assignment to VM/VMSS to work properly. Check back for updates. For more information, see [FAQs and known issues](known-issues.md)
39+
[!INCLUDE[ua-character-limit](~/includes/managed-identity-ua-character-limits.md)]
4140

4241
```azurepowershell-interactive
4342
New-AzureRmUserAssignedIdentity -ResourceGroupName <RESOURCEGROUP> -Name <USER ASSIGNED IDENTITY NAME>

0 commit comments

Comments
 (0)