Skip to content

Commit d63d7a4

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into deletecert
2 parents 97da7ec + f9bf126 commit d63d7a4

File tree

311 files changed

+6427
-3843
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

311 files changed

+6427
-3843
lines changed

.openpublishing.redirection.json

Lines changed: 85 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1715,6 +1715,66 @@
17151715
"redirect_url": "/azure/cosmos-db/manage-with-powershell",
17161716
"redirect_document_id": true
17171717
},
1718+
{
1719+
"source_path": "articles/cosmos-db/scripts/create-cassandra-database-account-cli.md",
1720+
"redirect_url": "/azure/cosmos-db/scripts/cli/cassandra/create",
1721+
"redirect_document_id": false
1722+
},
1723+
{
1724+
"source_path": "articles/cosmos-db/scripts/create-database-account-collections-cli.md",
1725+
"redirect_url": "/azure/cosmos-db/scripts/cli/sql/create",
1726+
"redirect_document_id": false
1727+
},
1728+
{
1729+
"source_path": "articles/cosmos-db/scripts/create-firewall-cli.md",
1730+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/ipfirewall",
1731+
"redirect_document_id": false
1732+
},
1733+
{
1734+
"source_path": "articles/cosmos-db/scripts/create-gremlin-database-account-cli.md",
1735+
"redirect_url": "/azure/cosmos-db/scripts/cli/gremlin/create",
1736+
"redirect_document_id": false
1737+
},
1738+
{
1739+
"source_path": "articles/cosmos-db/scripts/create-mongodb-database-account-cli.md",
1740+
"redirect_url": "/azure/cosmos-db/scripts/cli/mongodb/create",
1741+
"redirect_document_id": false
1742+
},
1743+
{
1744+
"source_path": "articles/cosmos-db/scripts/create-table-database-account-cli.md",
1745+
"redirect_url": "/azure/cosmos-db/scripts/cli/table/create",
1746+
"redirect_document_id": false
1747+
},
1748+
{
1749+
"source_path": "articles/cosmos-db/scripts/ha-failover-policy.md",
1750+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/regions",
1751+
"redirect_document_id": false
1752+
},
1753+
{
1754+
"source_path": "articles/cosmos-db/scripts/scale-collection-throughput-cli.md",
1755+
"redirect_url": "/azure/cosmos-db/scripts/cli/sql/throughput",
1756+
"redirect_document_id": false
1757+
},
1758+
{
1759+
"source_path": "articles/cosmos-db/scripts/scale-multiregion-cli.md",
1760+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/regions",
1761+
"redirect_document_id": false
1762+
},
1763+
{
1764+
"source_path": "articles/cosmos-db/scripts/secure-get-account-key-cli.md",
1765+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1766+
"redirect_document_id": false
1767+
},
1768+
{
1769+
"source_path": "articles/cosmos-db/scripts/secure-mongo-connection-string.md",
1770+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1771+
"redirect_document_id": false
1772+
},
1773+
{
1774+
"source_path": "articles/cosmos-db/scripts/secure-generate-key-cli.md",
1775+
"redirect_url": "/azure/cosmos-db/scripts/cli/common/keys",
1776+
"redirect_document_id": false
1777+
},
17181778
{
17191779
"source_path": "articles/cosmos-db/programming.md",
17201780
"redirect_url": "/azure/cosmos-db/storedprocedures-triggers-udfs",
@@ -3070,16 +3130,6 @@
30703130
"redirect_url": "/azure/virtual-machines/linux/expand-disks",
30713131
"redirect_document_id": true
30723132
},
3073-
{
3074-
"source_path": "articles/virtual-machines/linux/disks-upload-vhd-to-managed-disk-cli.md",
3075-
"redirect_url": "/azure/virtual-machines/linux/managed-disks-overview",
3076-
"redirect_document_id": false
3077-
},
3078-
{
3079-
"source_path": "articles/virtual-machines/windows/disks-upload-vhd-to-managed-disk-powershell.md",
3080-
"redirect_url": "/azure/virtual-machines/windows/managed-disks-overview",
3081-
"redirect_document_id": false
3082-
},
30833133
{
30843134
"source_path": "articles/virtual-machines/linux/install-mongodb-nodejs.md",
30853135
"redirect_url": "/azure/virtual-machines/linux/install-mongodb",
@@ -20538,6 +20588,11 @@
2053820588
"source_path": "articles/virtual-machines/virtual-machines-linux-quick-create-cli-nodejs.md",
2053920589
"redirect_url": "/azure/virtual-machines/linux/quick-create-cli-nodejs",
2054020590
"redirect_document_id": false
20591+
},
20592+
{
20593+
"source_path": "articles/virtual-machines/linux/quick-create-cli-nodejs.md",
20594+
"redirect_url": "/azure/virtual-machines/linux/quick-create-cli",
20595+
"redirect_document_id": false
2054120596
},
2054220597
{
2054320598
"source_path": "articles/virtual-machines/virtual-machines-linux-quick-create-cli.md",
@@ -41716,6 +41771,26 @@
4171641771
"redirect_url": "/azure/azure-monitor/app/java-get-started",
4171741772
"redirect_document_id": false
4171841773
},
41774+
{
41775+
"source_path": "articles/azure-monitor/app/java-get-started-25-beta.md",
41776+
"redirect_url": "/azure/azure-monitor/app/java-get-started",
41777+
"redirect_document_id": false
41778+
},
41779+
{
41780+
"source_path": "articles/azure-monitor/app/java-trace-logs-25-beta.md",
41781+
"redirect_url": "/azure/azure-monitor/app/java-trace-logs",
41782+
"redirect_document_id": false
41783+
},
41784+
{
41785+
"source_path": "articles/azure-monitor/app/java-agent-25-beta.md",
41786+
"redirect_url": "/azure/azure-monitor/app/java-agent",
41787+
"redirect_document_id": false
41788+
},
41789+
{
41790+
"source_path": "articles/azure-monitor/app/micrometer-java-25-beta.md",
41791+
"redirect_url": "/azure/azure-monitor/app/micrometer-java",
41792+
"redirect_document_id": false
41793+
},
4171941794
{
4172041795
"source_path": "articles/cognitive-services/Translator/quickstart-csharp-translate.md",
4172141796
"redirect_url": "/azure/cognitive-services/Translator/quickstart-translate",
Lines changed: 30 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Region availability & data residency in Azure Active Directory B2C | Microsoft Docs
2+
title: Region availability & data residency in Azure Active Directory B2C
33
description: A topic on the types of Azure Active Directory B2C tenants.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,50 +8,59 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/10/2017
11+
ms.date: 09/26/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
1515

1616
# Azure Active Directory B2C: Region availability & data residency
17-
Region availability and data residency are two very different concepts that apply differently to Azure AD B2C from the rest of Azure. This article will explain the differences between these two concepts and compare how they apply to Azure versus Azure AD B2C.
1817

19-
## Summary
20-
Azure AD B2C is **generally available worldwide** with the option for **data residency in United States or Europe**.
18+
Region availability and data residency are two very different concepts that apply differently to Azure AD B2C from the rest of Azure. This article explains the differences between these two concepts, and compares how they apply to Azure versus Azure AD B2C.
2119

22-
## Concepts
23-
* **Region availability** refers to where a service is available for use.
24-
* **Data residency** refers to where user data is stored.
20+
Azure AD B2C is **generally available worldwide** with the option for **data residency** in the **United States, Europe, or Asia Pacific**.
21+
22+
[Region availability](#region-availability) refers to where a service is available for use.
23+
24+
[Data residency](#data-residency) refers to where user data is stored.
2525

2626
## Region availability
27-
Azure AD B2C is available worldwide via the Azure public cloud.
2827

29-
This differs from the model most other Azure services follow which couple availability with data residency. You can see examples of this in both Azure's [Products Available By Region](https://azure.microsoft.com/regions/services/) page and the [Active Directory B2C pricing calculator](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
28+
Azure AD B2C is available worldwide via the Azure public cloud.
29+
30+
This differs from the model followed by most other Azure services, which typically couple *availability* with *data residency*. You can see examples of this in both Azure's [Products Available By Region](https://azure.microsoft.com/regions/services/) page and the [Active Directory B2C pricing calculator](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
3031

3132
## Data residency
32-
Azure AD B2C stores user data in either United States or Europe.
3333

34-
Data residency is determined based on which country/region is selected when [creating an Azure AD B2C tenant](active-directory-b2c-get-started.md).
34+
Azure AD B2C stores user data in either United States, Europe, or the Asia Pacific region.
35+
36+
Data residency is determined by the country/region you select when you [create an Azure AD B2C tenant](active-directory-b2c-get-started.md):
3537

3638
![Screenshot of a preview tenant](./media/active-directory-b2c-reference-tenant-type/data-residency-b2c-tenant.png)
3739

38-
Data resides in the United States for the following countries/regions:
40+
Data resides in the **United States** for the following countries/regions:
3941

4042
> United States, Canada, Costa Rica, Dominican Republic, El Salvador, Guatemala, Mexico, Panama, Puerto Rico and Trinidad & Tobago
4143
42-
Data resides in Europe for the following countries/regions:
44+
Data resides in **Europe** for the following countries/regions:
4345

44-
> Algeria, Austria, Azerbaijan, Bahrain, Belarus, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Egypt, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Jordan, Kazakhstan, Kenya, Kuwait, Lativa, Lebanon, Liechtenstein, Lithuania, Luxembourg, North Macedonia, Malta, Montenegro, Morocco, Netherlands, Nigeria, Norway, Oman, Pakistan, Poland, Portugal, Qatar, Romania, Russia, Saudi Arabia, Serbia, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Tunisia, Turkey, Ukraine, United Arab Emirates and United Kingdom.
46+
> Algeria, Austria, Azerbaijan, Bahrain, Belarus, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Egypt, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Jordan, Kazakhstan, Kenya, Kuwait, Latvia, Lebanon, Liechtenstein, Lithuania, Luxembourg, North Macedonia, Malta, Montenegro, Morocco, Netherlands, Nigeria, Norway, Oman, Pakistan, Poland, Portugal, Qatar, Romania, Russia, Saudi Arabia, Serbia, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Tunisia, Turkey, Ukraine, United Arab Emirates and United Kingdom.
4547
46-
The remaining countries/regions are in the process of being added to the list. For now, you can still use Azure AD B2C by picking any of the countries/regions above.
48+
Data resides in **Asia Pacific** for the following countries/regions:
4749

48-
> Afghanistan, Argentina, Australia, Brazil, Chile, Colombia, Ecuador, Hong Kong SAR, India, Indonesia, Iraq, Japan, Korea, Malaysia, New Zealand, Paraguay, Peru, Philippines, Singapore, Sri Lanka, Taiwan, Thailand, Uruguay and Venezuela.
50+
> Afghanistan, Hong Kong SAR, India, Indonesia, Japan, Korea, Malaysia, Philippines, Singapore, Sri Lanka, Taiwan, and Thailand.
51+
52+
The following countries/regions are in the process of being added to the list. For now, you can still use Azure AD B2C by picking any of the countries/regions above.
53+
54+
> Argentina, Australia, Brazil, Chile, Colombia, Ecuador, Iraq, New Zealand, Paraguay, Peru, Uruguay, and Venezuela.
4955
5056
## Preview tenant
51-
If you had created a B2C tenant during Azure AD B2C's preview period, it is likely that your **Tenant type** says **Preview tenant**. If this is the case, you MUST use your tenant only for development and testing purposes, and NOT for production apps.
5257

53-
> [!IMPORTANT]
54-
> There is no migration path from a preview B2C tenant to a production-scale B2C tenant. Note that there are known issues when you delete a preview B2C tenant and re-create a production-scale B2C tenant with the same domain name. You have to create a production-scale B2C tenant with a different domain name.
58+
If you had created a B2C tenant during Azure AD B2C's preview period, it's likely that your **Tenant type** says **Preview tenant**.
59+
60+
If this is the case, you must use your tenant ONLY for development and testing purposes. DO NOT use a preview tenant for production applications.
61+
62+
**There is no migration path** from a preview B2C tenant to a production-scale B2C tenant. You must create a new B2C tenant for your production applications.
5563

64+
There are known issues when you delete a preview B2C tenant and create a production-scale B2C tenant with the same domain name. *You must create a production-scale B2C tenant with a different domain name*.
5665

57-
![Screenshot of a preview tenant](./media/active-directory-b2c-reference-tenant-type/preview-b2c-tenant.png)
66+
![Screenshot of a preview tenant](./media/active-directory-b2c-reference-tenant-type/preview-b2c-tenant.png)
-64.8 KB
Loading

articles/active-directory-b2c/tutorial-customize-ui.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Although you can store your files in many ways, for this tutorial, you store the
5959

6060
1. In the menu, select **CORS**.
6161
2. For **Allowed origins**, enter `https://your-tenant-name.b2clogin.com`. Replace `your-tenant-name` with the name of your Azure AD B2C tenant. For example, `https://fabrikam.b2clogin.com`. You need to use all lowercase letters when entering your tenant name.
62-
3. For **Allowed Methods**, select both `GET` and `OPTIONS`.
62+
3. For **Allowed Methods**, select `GET`,`PUT`, and `OPTIONS`.
6363
4. For **Allowed Headers**, enter an asterisk (*).
6464
5. For **Exposed Headers**, enter an asterisk (*).
6565
6. For **Max age**, enter 200.

articles/active-directory-domain-services/join-centos-linux-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ In the *hosts* file, update the *localhost* address. In the following example:
6565
Update these names with your own values:
6666

6767
```console
68-
127.0.0.1 centos centos.contoso.com
68+
127.0.0.1 centos.contoso.com centos
6969
```
7070

7171
When done, save and exit the *hosts* file using the `:wq` command of the editor.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,23 +40,24 @@ After the feature has been running in audit mode for a reasonable period, you ca
4040
## Deployment requirements
4141

4242
* Licensing requirements for Azure AD password protection can be found in the article [Eliminate bad passwords in your organization](concept-password-ban-bad.md#license-requirements).
43-
* All domain controllers that get the DC Agent service for Azure AD password protection installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
43+
* All machines where the Azure AD Password Protection DC Agent software will be installed must run Windows Server 2012 or later. This requirement does not imply that the Active Directory domain or forest must also be at Windows Server 2012 domain or forest functional level. As mentioned in [Design Principles](concept-password-ban-bad-on-premises.md#design-principles), there is no minimum DFL or FFL required for either the DC agent or proxy software to run.
4444
* All machines that get the DC agent service installed must have .NET 4.5 installed.
45-
* All machines that get the proxy service for Azure AD password protection installed must run Windows Server 2012 R2 or later.
45+
* All machines where the Azure AD Password Protection Proxy service will be installed must run Windows Server 2012 R2 or later.
4646
> [!NOTE]
47-
> Proxy service deployment is a mandatory requirement for deploying Azure AD password protection even though the Domain controller may have outbound direct internet connectivity.
47+
> Proxy service deployment is a mandatory requirement for deploying Azure AD password protection even though the domain controller may have outbound direct internet connectivity.
4848
>
4949
* All machines where the Azure AD Password Protection Proxy service will be installed must have .NET 4.7 installed.
5050
.NET 4.7 should already be installed on a fully updated Windows Server. If this is not the case, download and run the installer found at [The .NET Framework 4.7 offline installer for Windows](https://support.microsoft.com/help/3186497/the-net-framework-4-7-offline-installer-for-windows).
51-
* All machines, including domain controllers, that get Azure AD password protection components installed must have the Universal C Runtime installed. You can get the runtime by making sure you have all updates from Windows Update. Or you can get it in an OS-specific update package. For more information, see [Update for Universal C Runtime in Windows](https://support.microsoft.com/help/2999226/update-for-uniersal-c-runtime-in-windows).
51+
* All machines, including domain controllers, that have Azure AD password protection components installed must have the Universal C Runtime installed. You can get the runtime by making sure you have all updates from Windows Update. Or you can get it in an OS-specific update package. For more information, see [Update for Universal C Runtime in Windows](https://support.microsoft.com/help/2999226/update-for-uniersal-c-runtime-in-windows).
5252
* Network connectivity must exist between at least one domain controller in each domain and at least one server that hosts the proxy service for password protection. This connectivity must allow the domain controller to access RPC endpoint mapper port 135 and the RPC server port on the proxy service. By default, the RPC server port is a dynamic RPC port, but it can be configured to [use a static port](#static).
53-
* All machines that host the proxy service must have network access to the following endpoints:
53+
* All machines where the Azure AD Password Protection Proxy service will be installed must have network access to the following endpoints:
5454

5555
|**Endpoint**|**Purpose**|
5656
| --- | --- |
5757
|`https://login.microsoftonline.com`|Authentication requests|
5858
|`https://enterpriseregistration.windows.net`|Azure AD password protection functionality|
5959

60+
You must also enable network access for the set of ports and urls specified in the [Application Proxy environment setup procedures](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy-add-on-premises-application#prepare-your-on-premises-environment). These configuration steps are required in order for the Microsoft Azure AD Connect Agent Updater service to be able to function (this service is installed side-by-side with the Proxy service). It is not recommended to install Azure AD Password Protection Proxy and Application Proxy side by side on the same machine, due to incompatibilities between the versions of the Microsoft Azure AD Connect Agent Updater software.
6061
* All machines that host the proxy service for password protection must be configured to grant domain controllers the ability to logon to the proxy service. This is controlled via the "Access this computer from the network" privilege assignment.
6162
* All machines that host the proxy service for password protection must be configured to allow outbound TLS 1.2 HTTP traffic.
6263
* A Global Administrator account to register the proxy service for password protection and forest with Azure AD.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,8 @@ No. Since the proxy server is stateless, it's not important which specific proxy
9898

9999
Yes. The Azure AD Password Protection Proxy service and Azure AD Connect should never conflict directly with each other.
100100

101+
Unfortunately, an incompatibility has been found between the version of the Microsoft Azure AD Connect Agent Updater service that is installed by the Azure AD Password Protection Proxy software and the version of the service that is installed by the [Azure Active Directory Application Proxy](https://docs.microsoft.com/azure/active-directory/manage-apps/application-proxy) software. This incompatibility may result in the Agent Updater service being unable to contact Azure for software updates. It is not recommended to install Azure AD Password Protection Proxy and Azure Active Directory Application Proxy on the same machine.
102+
101103
**Q: In what order should the DC agents and proxies be installed and registered?**
102104

103105
Any ordering of Proxy agent installation, DC agent installation, forest registration, and Proxy registration is supported.

0 commit comments

Comments
 (0)