You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-configure-ldaps.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ The certificate you request or create must meet the following requirements. Your
66
66
***Key usage** - The certificate must be configured for *digital signatures* and *key encipherment*.
67
67
***Certificate purpose** - The certificate must be valid for SSL server authentication.
68
68
69
-
In this tutorial, let's create a self-signed certificate for secure LDAP using the [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet. Open a PowerShell window as **Administrator** and run the following commands. Replace the *$dnsName* variable with the DNS name used by your own managed domain, such as *aaddscontoso.com*:
69
+
There are several tools available to create self-signed certificate such as OpenSSL, Keytool, MakeCert, [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet etc. In this tutorial, let's create a self-signed certificate for secure LDAP using the [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet. Open a PowerShell window as **Administrator** and run the following commands. Replace the *$dnsName* variable with the DNS name used by your own managed domain, such as *aaddscontoso.com*:
70
70
71
71
```powershell
72
72
# Define your own DNS name used by your Azure AD DS managed domain
@@ -140,7 +140,7 @@ Before you can use the digital certificate created in the previous step with you
140
140
1. As this certificate is used to decrypt data, you should carefully control access. A password can be used to protect the use of the certificate. Without the correct password, the certificate can't be applied to a service.
141
141
142
142
On the **Security** page, choose the option for **Password** to protect the *.PFX* certificate file. Enter and confirm a password, then select **Next**. This password is used in the next section to enable secure LDAP for your Azure AD DS managed domain.
143
-
1. On the **File to Export** page, specify the file name and location where you'd like to export the certificate, such as *C:\Users\accountname\azure-ad-ds.pfx*.
143
+
1. On the **File to Export** page, specify the file name and location where you'd like to export the certificate, such as *C:\Users\accountname\azure-ad-ds.pfx*. Keep a note of the password and location of the *.PFX* file as this information would be required in next steps.
144
144
1. On the review page, select **Finish** to export the certificate to a *.PFX* certificate file. A confirmation dialog is displayed when the certificate has been successfully exported.
145
145
1. Leave the MMC open for use in the following section.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-ops-guide-iam.md
+15-15Lines changed: 15 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Managing Azure Active Directory requires the continuous execution of key operati
36
36
| Troubleshoot and remediate license assignment errors | IAM Operations Team |
37
37
| Provision identities to applications in Azure AD | IAM Operations Team |
38
38
39
-
As you review your list, you may find you need to either assign an owner for tasks that are missing an owner or adjust ownership for tasks with owners that aren’t aligned with the recommendations above.
39
+
As you review your list, you may find you need to either assign an owner for tasks that are missing an owner or adjust ownership for tasks with owners that aren't aligned with the recommendations above.
40
40
41
41
#### Assigning owners recommended reading
42
42
@@ -53,25 +53,25 @@ Microsoft recommends you have a good baseline and understanding of the issues in
53
53
54
54
To enable all hybrid experiences, device-based security posture, and integration with Azure AD, it is required that you synchronize user accounts that your employees use to login to their desktops.
55
55
56
-
If you don’t synchronize the forest users log into, then you should change the synchronization to come from the proper forest.
56
+
If you don't synchronize the forest users log into, then you should change the synchronization to come from the proper forest.
57
57
58
58
#### Synchronization scope and object filtering
59
59
60
60
Removing known buckets of objects that aren't required to be synchronized has the following operational benefits:
61
61
62
62
- Fewer sources of sync errors
63
63
- Faster sync cycles
64
-
- Less "garbage" to carry forward from on-premises, for example, pollution of the global address list for on-premises service accounts that aren’t relevant in the cloud
64
+
- Less "garbage" to carry forward from on-premises, for example, pollution of the global address list for on-premises service accounts that aren't relevant in the cloud
65
65
66
66
> [!NOTE]
67
-
> If you find you are importing many objects that aren’t being exported to the cloud, you should filter by OU or specific attributes.
67
+
> If you find you are importing many objects that aren't being exported to the cloud, you should filter by OU or specific attributes.
68
68
69
69
Examples of objects to exclude are:
70
70
71
-
- Service Accounts that aren’t used for cloud applications
72
-
- Groups that aren’t meant to be used in cloud scenarios such as those used to grant access to resources
71
+
- Service Accounts that aren't used for cloud applications
72
+
- Groups that aren't meant to be used in cloud scenarios such as those used to grant access to resources
73
73
- Users or contacts that are external identities that are meant to be represented with Azure AD B2B Collaboration
74
-
- Computer Accounts where employees aren’t meant to access cloud applications from, for example, servers
74
+
- Computer Accounts where employees aren't meant to access cloud applications from, for example, servers
75
75
76
76
> [!NOTE]
77
77
> If a single human identity has multiple accounts provisioned from something such as a legacy domain migration, merger, or acquisition, you should only synchronize the account used by the user on a day-to-day basis, for example, what they use to log in to their computer.
@@ -88,7 +88,7 @@ Azure AD Connect plays a key role in the provisioning process. If the Sync Serve
88
88
-**Deploy Azure AD Connect Server(s) in Staging Mode** - allows an administrator to "promote" the staging server to production by a simple configuration switch.
89
89
-**Use Virtualization** - If the Azure AD connect is deployed in a virtual machine (VM), admins can leverage their virtualization stack to live migrate or quickly redeploy the VM and therefore resume synchronization.
90
90
91
-
If your organization is lacking a disaster recovery and failover strategy for Sync, you shouldn’t hesitate to deploy Azure AD Connect in Staging Mode. Likewise, if there is a mismatch between your production and staging configuration, you should re-baseline Azure AD Connect staging mode to match the production configuration, including software versions and configurations.
91
+
If your organization is lacking a disaster recovery and failover strategy for Sync, you shouldn't hesitate to deploy Azure AD Connect in Staging Mode. Likewise, if there is a mismatch between your production and staging configuration, you should re-baseline Azure AD Connect staging mode to match the production configuration, including software versions and configurations.
92
92
93
93

94
94
@@ -102,7 +102,7 @@ If your Azure AD Connect version is more than six months behind, you should upgr
102
102
103
103
Using **ms-DS-consistencyguid** as the [source anchor](https://docs.microsoft.com/azure/active-directory/hybrid/plan-connect-design-concepts) allows an easier migration of objects across forests and domains, which is common in AD Domain consolidation/cleanup, mergers, acquisitions, and divestitures.
104
104
105
-
If you’re currently using **ObjectGuid** as the source anchor, we recommend you switch to using **ms-DS-ConsistencyGuid**.
105
+
If you're currently using **ObjectGuid** as the source anchor, we recommend you switch to using **ms-DS-ConsistencyGuid**.
106
106
107
107
#### Custom rules
108
108
@@ -113,7 +113,7 @@ Azure AD Connect custom rules provide the ability to control the flow of attribu
113
113
- Higher probability of divergence of configuration between the production server and staging server
114
114
- Additional overhead when upgrading Azure AD Connect if custom rules are created within the precedence greater than 100 (used by built-in rules)
115
115
116
-
If you are using overly complex rules, you should investigate the reasons for the complexity and find opportunities for simplification. Likewise, if you have created custom rules with precedence value over 100, you should fix the rules so they aren’t at risk or conflict with the default set.
116
+
If you are using overly complex rules, you should investigate the reasons for the complexity and find opportunities for simplification. Likewise, if you have created custom rules with precedence value over 100, you should fix the rules so they aren't at risk or conflict with the default set.
117
117
118
118
Examples of misusing custom rules include:
119
119
@@ -143,7 +143,7 @@ Azure Active Directory streamlines the management of licenses through [group-bas
143
143
144
144
If you are currently using a manual process to assign licenses and components to users, we recommend you implement group-based licensing. If your current process does not monitor licensing errors or what is Assigned versus Available, you should define improvements to the process to address licensing errors and monitor licensing assignment.
145
145
146
-
Another aspect of license management is the definition of service plans (components of the license) that should be enabled based on job functions in the organization. Granting access to service plans that aren’t necessary, can result in users seeing tools in the Office portal that they have not been trained for or should not be using. It can drive additional help desk volume, unnecessary provisioning, and put your compliance and governance at risk, for example, when provisioning OneDrive for Business to individuals that might not be allowed to share content.
146
+
Another aspect of license management is the definition of service plans (components of the license) that should be enabled based on job functions in the organization. Granting access to service plans that aren't necessary, can result in users seeing tools in the Office portal that they have not been trained for or should not be using. It can drive additional help desk volume, unnecessary provisioning, and put your compliance and governance at risk, for example, when provisioning OneDrive for Business to individuals that might not be allowed to share content.
147
147
148
148
Use the following guidelines to define service plans to users:
149
149
@@ -158,26 +158,26 @@ Use the following guidelines to define service plans to users:
158
158
159
159
#### Lifecycle management
160
160
161
-
If you are currently using a tool, such as [Microsoft Identity Manager](https://docs.microsoft.com/microsoft-identity-manager/) or third-party system, that relies on an on-premises infrastructure, we recommend you offload assignment from the existing tool, implement group-based licensing and define a group lifecycle management based on [groups](https://docs.microsoft.com/azure/active-directory/users-groups-roles/licensing-group-advanced#use-group-based-licensing-with-dynamic-groups). Likewise, if your existing process doesn’t account for new employees or employees that leave the organization, you should deploy group-based licensing based on dynamic groups and define a group membership lifecycle. Finally, if group-based licensing is deployed against on-premises groups that lack lifecycle management, consider using cloud groups to enable capabilities such as delegated ownership or attribute-based dynamic membership.
161
+
If you are currently using a tool, such as [Microsoft Identity Manager](https://docs.microsoft.com/microsoft-identity-manager/) or third-party system, that relies on an on-premises infrastructure, we recommend you offload assignment from the existing tool, implement group-based licensing and define a group lifecycle management based on [groups](https://docs.microsoft.com/azure/active-directory/users-groups-roles/licensing-group-advanced#use-group-based-licensing-with-dynamic-groups). Likewise, if your existing process doesn't account for new employees or employees that leave the organization, you should deploy group-based licensing based on dynamic groups and define a group membership lifecycle. Finally, if group-based licensing is deployed against on-premises groups that lack lifecycle management, consider using cloud groups to enable capabilities such as delegated ownership or attribute-based dynamic membership.
162
162
163
163
### Assignment of apps with "All users" group
164
164
165
165
Resource owners may believe that the **All users** group contains only **Enterprise Employees** when they may actually contain both **Enterprise Employees** and **Guests**. As a result, you should take special care when using the **All users** group for application assignment and granting access to resources such as SharePoint content or applications.
166
166
167
167
> [!IMPORTANT]
168
-
> If the **All users** group is enabled and used for conditional access policies, app or resource assignment, make sure to [secure the group](https://docs.microsoft.com/azure/active-directory/b2b/use-dynamic-groups#hardening-the-all-users-dynamic-group) if you don't want it to include guest users. Furthermore, you should fix your licensing assignments by creating and assigning to groups that contain **Enterprise Employees** only. On the other hand, if you find that the **All users** group is enabled but not being used to grant access to resources, make sure your organization’s operational guidance is to intentionally use that group (which includes both **Enterprise Employees** and **Guests**).
168
+
> If the **All users** group is enabled and used for conditional access policies, app or resource assignment, make sure to [secure the group](https://docs.microsoft.com/azure/active-directory/b2b/use-dynamic-groups) if you don't want it to include guest users. Furthermore, you should fix your licensing assignments by creating and assigning to groups that contain **Enterprise Employees** only. On the other hand, if you find that the **All users** group is enabled but not being used to grant access to resources, make sure your organization's operational guidance is to intentionally use that group (which includes both **Enterprise Employees** and **Guests**).
169
169
170
170
### Automated user provisioning to apps
171
171
172
172
[Automated user provisioning](https://docs.microsoft.com/azure/active-directory/manage-apps/user-provisioning) to applications is the best way to create a consistent provisioning, deprovisioning, and lifecycle of identities across multiple systems.
173
173
174
-
If you are currently provisioning apps in an ad-hoc manner or using things like CSV files, JIT, or an on-premises solution that does not address lifecycle management, we recommend you [implement application provisioning](https://docs.microsoft.com/azure/active-directory/manage-apps/user-provisioning#how-do-i-set-up-automatic-provisioning-to-an-application) with Azure AD for supported applications and define a consistent pattern for applications that aren’t yet supported by Azure AD.
174
+
If you are currently provisioning apps in an ad-hoc manner or using things like CSV files, JIT, or an on-premises solution that does not address lifecycle management, we recommend you [implement application provisioning](https://docs.microsoft.com/azure/active-directory/manage-apps/user-provisioning#how-do-i-set-up-automatic-provisioning-to-an-application) with Azure AD for supported applications and define a consistent pattern for applications that aren't yet supported by Azure AD.
175
175
176
176

177
177
178
178
### Azure AD Connect delta sync cycle baseline
179
179
180
-
It is important to understand the volume of changes in your organization and make sure that it isn’t taking too long to have a predictable synchronization time.
180
+
It is important to understand the volume of changes in your organization and make sure that it isn't taking too long to have a predictable synchronization time.
181
181
182
182
The [default delta sync](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-sync-feature-scheduler) frequency is 30 minutes. If the delta sync is taking longer than 30 minutes consistently, or there are significant discrepancies between the delta sync performance of staging and production, you should investigate and review the [factors influencing the performance of Azure AD Connect](https://docs.microsoft.com/azure/active-directory/hybrid/plan-connect-performance-factors).
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ In this article, you learn how to view the service principal of a managed identi
28
28
29
29
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md).
30
30
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/).
31
-
- Enable [system assigned identity on a virtual machine](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) or [application](/azure/app-service/overview-managed-identity#adding-a-system-assigned-identity).
31
+
- Enable [system assigned identity on a virtual machine](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) or [application](/azure/app-service/overview-managed-identity#add-a-system-assigned-identity).
32
32
- To run the CLI script examples, you have three options:
33
33
- Use [Azure Cloud Shell](../../cloud-shell/overview.md) from the Azure portal (see next section).
34
34
- Use the embedded Azure Cloud Shell via the "Try It" button, located in the top right corner of each code block.
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ In this article, you learn how to view the service principal of a managed identi
31
31
32
32
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md).
33
33
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/).
34
-
- Enable [system assigned identity on a virtual machine](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) or [application](/azure/app-service/overview-managed-identity#adding-a-system-assigned-identity).
34
+
- Enable [system assigned identity on a virtual machine](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) or [application](/azure/app-service/overview-managed-identity#add-a-system-assigned-identity).
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ In this article, you learn how to view the service principal of a managed identi
30
30
31
31
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](overview.md).
32
32
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/).
33
-
- Enable [system assigned identity on a virtual machine](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) or [application](/azure/app-service/overview-managed-identity#adding-a-system-assigned-identity).
33
+
- Enable [system assigned identity on a virtual machine](/azure/active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm#system-assigned-managed-identity) or [application](/azure/app-service/overview-managed-identity#add-a-system-assigned-identity).
34
34
- Install the latest version of [Azure PowerShell](/powershell/azure/install-az-ps)
0 commit comments