You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
if (myMSALObj.getAccount() && !myMSALObj.isCallback(window.location.hash)) {// avoid duplicate code execution on page load in case of iframe and popup window.
247
+
};
248
+
if (myMSALObj.getAccount() &&!myMSALObj.isCallback(window.location.hash)) {// avoid duplicate code execution on page load in case of iframe and popup window.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-version-history.md
+43-4Lines changed: 43 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,6 +38,49 @@ Download| [Download Azure AD Connect](https://go.microsoft.com/fwlink/?LinkId=61
38
38
While we go through this process, the version number of the release will be shown with an "X" in the minor release number position, as in "1.3.X.0" - this indicates that the release notes in this document are valid for all versions beginning with "1.3.". As soon as we have finalized the release process the release version number will be updated to the most recently released version and the release status will be updated to "Released for download and auto upgrade".
39
39
Not all releases of Azure AD Connect will be made available for auto upgrade. The release status will indicate whether a release is made available for auto upgrade or for download only. If auto upgrade was enabled on your Azure AD Connect server then that server will automatically upgrade to the latest version of Azure AD Connect that is released for auto upgrade. Note that not all Azure AD Connect configurations are eligible for auto upgrade. Please follow this link to read more about [auto upgrade](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-install-automatic-upgrade)
40
40
41
+
## 1.4.X.0
42
+
43
+
### Release status
44
+
9/10/2019: Released for auto-upgrade only
45
+
46
+
### New features and improvements
47
+
- New troubleshooting tooling helps troubleshoot "user not syncing", "group not syncing" or "group member not syncing" scenarios.
48
+
- Add support for national clouds in AAD Connect troubleshooting script
49
+
- Customers should be informed that the deprecated WMI endpoints for MIIS_Service have now been removed. Any WMI operations should now be done via PS cmdlets.
50
+
- Security improvement by resetting constrained delegation on AZUREADSSOACC object
51
+
- When adding/editing a sync rule, if there are any attributes used in the rule that are in the connector schema but not added to the connector, the attributes automatically added to the connector. The same is true for the object type the rule affects. If anything is added to the connector, the connector will be marked for full import on the next sync cycle.
52
+
- Using an Enterprise or Domain admin as the connector account is no longer supported.
53
+
- In the Synchronization Manager a full sync is run on rule creation/edit/deletion. A popup will appear on any rule change notifying the user if full import or full sync is going to be run.
54
+
- Added mitigation steps for password errors to 'connectors > properties > connectivity' page
55
+
- Added a deprecation warning for the sync service manager on the connector properties page. This warning notifies the user that changes should be made through the AADC wizard.
56
+
- Added new error for issues with a user's password policy.
57
+
- Prevent misconfiguration of group filtering by domain and OU filters. Group filtering will show an error when the domain/OU of the entered group is already filtered out and keep the user from moving forward until the issue is resolved.
58
+
- Users can no longer create a connector for Active Directory Domain Services or Windows Azure Active Directory in the old UI.
59
+
- Fixed accessibility of custom UI controls in the Sync Service Manager
60
+
- Enabled six federation management tasks for all sign-in methods in Azure AD Connect. (Previously, only the “Update AD FS SSL certificate” task was available for all sign-ins.)
61
+
- Added a warning when changing the sign-in method from federation to PHS or PTA that all Azure AD domains and users will be converted to managed authentication.
62
+
- Removed token-signing certificates from the “Reset Azure AD and AD FS trust” task and added a separate sub-task to update these certificates.
63
+
- Added a new federation management task called “Manage certificates” which has sub-tasks to update the SSL or token-signing certificates for the AD FS farm.
64
+
- Added a new federation management sub-task called “Specify primary server” which allows administrators to specify a new primary server for the AD FS farm.
65
+
- Added a new federation management task called “Manage servers” which has sub-tasks to deploy an AD FS server, deploy a Web Application Proxy server, and specify primary server.
66
+
- Added a new federation management task called “View federation configuration” that displays the current AD FS settings. (Because of this addition, AD FS settings have been removed from the “Review your solution” page.)
67
+
68
+
### Fixed issues
69
+
- Resolved sync error issue for the scenario where a user object taking over its corresponding contact object has a self-reference (e.g. user is their own manager).
70
+
- Help popups now show on keyboard focus.
71
+
- For Auto upgrade, if any conflicting app is running from 6 hours, kill it and continue with upgrade.
72
+
- Limit the number of attributes a customer can select to 100 per object when selecting directory extensions. This will prevent the error from occurring during export as Azure has a maximum of 100 extension attributes per object.
73
+
- Fixed a bug to make the AD Connectivity script more robust
74
+
- Fixed a bug to make AADConnect install on a machine using an existing Named Pipes WCF service more robust.
75
+
- Improved diagnostics and troubleshooting around group policies that do not allow the ADSync service to start when initially installed.
76
+
- Fixed a bug where display name for a Windows computer was written incorrectly.
77
+
- Fix a bug where OS type for a Windows computer was written incorrectly.
78
+
- Fixed a bug where non-Windows 10 computers were syncing unexpectedly. Note that the effect of this change is that non-Windows-10 computers that were previously synced will now be deleted. This does not affect any features as the sync of Windows computers is only used for Hybrid Azure AD domain join, which only works for Windows-10 devices.
79
+
- Fix a bug where display name for a Windows computer was written incorrectly.
80
+
- Fix a bug where OS type for a Windows computer was written incorrectly.
81
+
- Added several new (internal) cmdlets to the ADSync PowerShell module.
82
+
83
+
41
84
## 1.3.21.0
42
85
>[!IMPORTANT]
43
86
>There is a known issue with upgrading Azure AD Connect from an earlier version to 1.3.21.0 where the O365 portal does not reflect the updated version even though Azure AD Connect upgraded successfully.
@@ -48,13 +91,10 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
48
91
>2. Run `Import-Module "ADSync"`
49
92
>3. Run `Set-ADSyncDirSyncConfiguration -AnchorAttribute ""`
50
93
51
-
52
-
53
94
### Release status
54
95
55
96
05/14/2019: Released for download
56
97
57
-
58
98
### Fixed issues
59
99
60
100
- Fixed an elevation of privilege vulnerability that exists in Microsoft Azure Active Directory Connect build 1.3.20.0. This vulnerability, under certain conditions, may allow an attacker to execute two powershell cmdlets in the context of a privileged account, and perform privileged actions. This security update addresses the issue by disabling these cmdlets. For more information see [security update](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1000).
@@ -90,7 +130,6 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
90
130
91
131
### Fixed issues
92
132
93
-
94
133
- Fix the SQL reconnect logic for ADSync service
95
134
- Fix to allow clean Install using an empty SQL AOA DB
96
135
- Fix PS Permissions script to refine GWB permissions
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/known-issues.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ No. Managed identities do not currently support cross-directory scenarios.
79
79
80
80
### What Azure RBAC permissions are required to managed identity on a resource?
81
81
82
-
- System-assigned managed identity: You need write permissions over the resource. For exampl, for virtual machines you need Microsoft.Compute/virtualMachines/write. This action is included in resource specific built-in roles like [Virtual Machine Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#virtual-machine-contributor).
82
+
- System-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need Microsoft.Compute/virtualMachines/write. This action is included in resource specific built-in roles like [Virtual Machine Contributor](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#virtual-machine-contributor).
83
83
- User-assigned managed identity: You need write permissions over the resource. For example, for virtual machines you need Microsoft.Compute/virtualMachines/write. In addition to [Managed Identity Operator](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignment over the managed identity.
84
84
85
85
### How do you restart the managed identities for Azure resources extension?
To clone an existing app including all associated deployment slots, you need to use the `IncludeSourceWebAppSlots` parameter. The following PowerShell command demonstrates the use of that parameter with the `New-AzWebApp` command:
49
+
To clone an existing app including all associated deployment slots, you need to use the `IncludeSourceWebAppSlots` parameter. Note that the `IncludeSourceWebAppSlots` parameter is only supported for cloning an entire app including all of its slots. The following PowerShell command demonstrates the use of that parameter with the `New-AzWebApp` command:
0 commit comments