You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/active-directory-ds-suspension.md
+63-21Lines changed: 63 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,56 +14,99 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: article
17
-
ms.date: 07/09/2018
17
+
ms.date: 07/16/2018
18
18
ms.author: ergreenl
19
19
20
20
---
21
21
# Suspended domains
22
22
When Azure AD Domain Services is unable to service a managed domain for a long period of time, the managed domain is put into a suspended state. This article will explain why managed domains are suspended, the length of suspension, and how to remediate a suspended domain.
The preceding graphic outlines how a domain is suspended, how long it will be suspended, and ultimately, the deletion of a managed domain. The following sections detail the reasons why a domain can be suspended and how to unsuspend a managed domain.
30
30
31
+
### 'Running' state
32
+
A managed domain that is configured correctly and operating regularly is in the **Running** state.
31
33
32
-
## Why are managed domains suspended?
34
+
**What you can expect:**
35
+
* Microsoft is able to regularly monitor the health of your managed domain.
36
+
* Domain controllers for your managed domain are patched and updated regularly.
37
+
* Changes from Azure Active Directory are regularly synchronized to your managed domain.
38
+
* Regular backups are taken for your managed domain.
33
39
34
-
Managed domains are suspended when they are in a state where Azure AD Domain Services is unable to manage the domain. This can be caused by a misconfiguration that blocks access to resources needed by Azure AD Domain Services, or an inactive Azure subscription. After 15 days of being unable to service a managed domain, Azure AD Domain Services will suspend the domain.
35
40
36
-
The exact reasons why your domain could be suspended are listed below:
37
-
* Having one or more of the following alerts present on your domain for 15 consecutive days:
A managed domain is in the **Needs Attention** state, if one or more issues require an administrator to take action. The health page of your managed domain will list one or more alerts in this state. For example, if you've configured a restrictive NSG for your virtual network, Microsoft may be unable to update and monitor your managed domain. This invalid configuration results in an alert being generated and your managed domain is put in the 'Needs Attention' state.
40
43
44
+
Each alert has a set of resolution steps. Some alerts are transient and will get automatically resolved by the service. You can resolve some other alerts by following the instructions in the corresponding resolution steps for that alert. To resolve some critical alerts, you need to contact Microsoft support.
41
45
42
-
## What happens when a domain is suspended?
46
+
For more information, see [how to troubleshoot alerts on a managed domain](active-directory-ds-troubleshoot-alerts.md).
43
47
44
-
When a domain is suspended, Azure AD Domain Services stops the virtual machines that service your managed domain. This means that backups are no longer taken, users are unable to sign-in to your domain, and synchronization with Azure AD is no longer performed.
48
+
**What you can expect:**
45
49
46
-
The domain will only stay in a suspension state for a maximum of 15 days. In order to ensure a timely recovery, it is recommended you address the suspension as soon as possible.
50
+
In some instances (for example, if you have an invalid network configuration), the domain controllers for your managed domain may be unreachable. Therefore, Microsoft cannot guarantee your managed domain is monitored, patched, updated or backed-up on a regular basis in this state.
47
51
48
-
## How do I know if my domain is suspended?
49
-
The managed domain will receive an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD Domain Services Health page in the Azure portal that declares the domain suspended. In addition, the state of the domain will be labelled "Suspended".
52
+
* Your managed domain is in an unhealthy state and ongoing health monitoring may be impacted, until the alert is resolved.
53
+
* Domain controllers for your managed domain may not be patched or updated.
54
+
* Changes from Azure Active Directory may not be synchronized to your managed domain.
55
+
* Backups for your managed domain may be taken, if possible.
56
+
* If you resolve the alerts impacting your managed domain, it may be possible to restore your managed domain to the 'Running' state.
57
+
* Critical alerts are triggered for configuration issues where Microsoft is unable to reach your domain controllers. If such alerts are not resolved within 15 days, your managed domain will be put in the 'Suspended' state.
50
58
51
59
52
-
## Unsuspending and restoring domains
60
+
### 'Suspended' state
61
+
A managed domain is put in the **Suspended** state for the following reasons:
62
+
* One or more critical alerts have not been remediated in 15 days. This can be caused by a misconfiguration that blocks access to resources needed by Azure AD Domain Services.
63
+
* For example, if the managed domain has alert [AADDS104: Network Error](active-directory-ds-troubleshoot-nsg.md) unresolved for over 15 days.
64
+
* There is a billing issue with your Azure subscription or if the Azure subscription has expired.
53
65
54
-
To unsuspend a domain, the following steps are needed:
66
+
Managed domains are suspended when Microsoft is unable to manage, monitor, patch or backup the domain on an ongoing basis.
67
+
68
+
**What you can expect:**
69
+
* Domain controllers for your managed domain are de-provisioned and are not reachable within the virtual network.
70
+
* Secure LDAP access to the managed domain over the internet (if enabled) stops working.
71
+
* You will see failures in authenticating to the managed domain, logging on to domain joined virtual machines, connecting over LDAP/LDAPS etc.
72
+
* Backups for your managed domain are no longer taken.
73
+
* You need to resolve the alert causing your managed domain to be in the 'Suspended' state and then contact support.
74
+
* Support may be able to restore your managed domain, only if there is an existing backup that is less than 30 days old.
75
+
76
+
77
+
### 'Deleted' state
78
+
A managed domain that stays in the 'Suspended' state for 15 days is **Deleted**.
79
+
80
+
**What you can expect:**
81
+
* All resources and backups for the managed domain are deleted.
82
+
* You cannot restore the managed domain and will need to create a new managed domain to use Azure AD Domain Services.
83
+
* You will not be billed for the managed domain.
84
+
85
+
86
+
## What happens when a managed domain is suspended?
87
+
When a domain is suspended, Azure AD Domain Services stops and de-provisions the domain controllers for your managed domain. As a result, backups are no longer taken, users are unable to sign-in to your domain, and synchronization with Azure AD stops.
88
+
89
+
The managed domain will only stay in a suspended state for a maximum of 15 days. In order to ensure a timely recovery, it is recommended you address the suspension as soon as possible.
90
+
91
+
92
+
## How do I know if my managed domain is suspended?
93
+
You will see an [alert](active-directory-ds-troubleshoot-alerts.md) on the Azure AD Domain Services Health page in the Azure portal that declares the domain suspended. In addition, the state of the domain shows "Suspended".
94
+
95
+
96
+
## How do I restore a suspended domain?
97
+
To restore a domain in the 'Suspended' state, complete the following steps:
55
98
56
99
1. Navigate to the [Azure AD Domain Services page](https://portal.azure.com/#blade/HubsExtension/Resources/resourceType/Microsoft.AAD%2FdomainServices) on the Azure portal
57
100
2. Click on the domain you wish to unsuspend
58
101
3. On the left-hand navigation, click **Health**
59
-
4. Click on the suspension alert (The Alert ID will be either AADDS503 or AADDS504, depending on the cause of suspension).
60
-
5. Click on the resolution link provided in the alert and follow the steps to resolving your suspension.
102
+
4. Click on the alert. The alert ID will be either AADDS503 or AADDS504, depending on the cause of suspension.
103
+
5. Click on the resolution link provided in the alert and follow the steps to resolve the alert.
61
104
62
-
Your domain can only be restored from the date of last backup. The date of your last backup is displayed on the Health page of your managed domain. Any changes since the last backup will not be restored upon unsuspension. In addition, Azure AD Domain Services can only store backups for up to 30 days. If the latest backup is more than 30 days old, the backup must be deleted and Azure AD Domain Services will be unable to restore from a backup.
105
+
Your domain can only be restored to the date of last backup. The date of your last backup is displayed on the Health page of your managed domain. Any changes that occurred after the last backup will not be restored. Backups for a managed domain are stored for up to 30 days. Backups older than 30 days are deleted.
63
106
64
-
## Deleting domains
65
107
66
-
If the domain is suspended for more than 15 days, Azure AD Domain Services deletes the managed domain due to inactivity and the inability to service the domain. You will no longer be billed for Azure AD Domain Services. To restore your managed domain, you will need to recreate it.
108
+
## Deleting domains
109
+
If the domain is suspended for more than 15 days, Azure AD Domain Services deletes the managed domain due to inactivity and the inability to service the domain. You will no longer be billed for Azure AD Domain Services. At this point, you cannot restore your managed domain and need to recreate it.
67
110
68
111
69
112
## Next steps
@@ -72,5 +115,4 @@ If the domain is suspended for more than 15 days, Azure AD Domain Services delet
72
115
-[Contact the product team](active-directory-ds-contact-us.md)
73
116
74
117
## Contact Us
75
-
76
118
Contact the Azure Active Directory Domain Services product team to [share feedback or for support](active-directory-ds-contact-us.md).
Copy file name to clipboardExpand all lines: articles/active-directory/connect/active-directory-aadconnect-feature-automatic-upgrade.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,13 +13,13 @@ ms.devlang: na
13
13
ms.topic: article
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
-
ms.date: 07/13/2017
16
+
ms.date: 06/16/2018
17
17
ms.component: hybrid
18
18
ms.author: billmath
19
19
20
20
---
21
21
# Azure AD Connect: Automatic upgrade
22
-
This feature was introduced with build 1.1.105.0 (released February 2016).
22
+
This feature was introduced with build [1.1.105.0 (released February 2016)](active-directory-aadconnect-version-history.md#111050). This feature was updated in [build 1.1.561](active-directory-aadconnect-version-history.md#115610) and now supports additional scenarios that were previously not supported.
23
23
24
24
## Overview
25
25
Making sure your Azure AD Connect installation is always up to date has never been easier with the **automatic upgrade** feature. This feature is enabled by default for express installations and DirSync upgrades. When a new version is released, your installation is automatically upgraded.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/plan-an-application-integration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.devlang: na
13
13
ms.topic: article
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: identity
16
-
ms.date: 06/27/2018
16
+
ms.date: 07/16/2018
17
17
ms.author: barbkess
18
18
ms.reviewer: asteen
19
19
@@ -59,7 +59,7 @@ Maybe you don't have the answers to all of these questions up front but that's o
59
59
## Application integration with Azure AD
60
60
### Finding unsanctioned cloud applications with Cloud Discovery
61
61
As mentioned above, there may be applications that haven't been managed by your organization until now. As part of the inventory process, it is possible to find unsanctioned cloud applications. See
62
-
[Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery.md).
62
+
[Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery).
63
63
64
64
### Authentication Types
65
65
Each of your applications may have different authentication requirements. With Azure AD, signing certificates can be used with applications that use SAML 2.0, WS-Federation, or OpenID Connect Protocols as well as Password Single Sign On. For more information about application authentication types for use with Azure AD see [Managing Certificates for Federated Single Sign-On in Azure Active Directory](manage-certificates-for-federated-single-sign-on.md) and [Password based single sign on](what-is-single-sign-on.md).
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/what-is-single-sign-on.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.component: app-mgmt
12
12
ms.workload: identity
13
13
ms.component: users-groups-roles
14
14
ms.topic: article
15
-
ms.date: 06/27/2018
15
+
ms.date: 07/16/2018
16
16
ms.author: barbkess
17
17
ms.reviewer: asmalser
18
18
ms.custom: it-pro
@@ -42,8 +42,7 @@ When users sign in to an application, they go through an authentication process
42
42
Azure AD supports three different ways to sign in to applications:
43
43
44
44
***Federated single sign-on** enables applications to redirect to Azure AD for user authentication instead of prompting for its own password. Federated single sign-on is supported for applications that support protocols such as SAML 2.0, WS-Federation, or OpenID Connect, and is the richest mode of single sign-on.
45
-
***Password-based single sign-on** enables secure application password storage and replay using a web browser extension or mobile app. Password-based single sign-on uses the existing
46
-
* process provided by the application, but enables an administrator to manage the passwords and does not require the user to know the password.
45
+
***Password-based single sign-on** enables secure application password storage and replay using a web browser extension or mobile app. Password-based single sign-on uses the existing process provided by the application, but enables an administrator to manage the passwords and does not require the user to know the password.
47
46
***Existing single sign-on** enables Azure AD to leverage any existing single sign-on that has been set up for the application, but enables these applications to be linked to the Office 365 or Azure AD access panel portals, and also enables additional reporting in Azure AD when the applications are launched there.
48
47
49
48
Once a user has authenticated with an application, they also need to have an account record provisioned at the application that tells the application where the permissions and level of access are inside the application. The provisioning of this account record can either occur automatically, or it can occur manually by an administrator before the user is provided single sign-on access.
@@ -191,7 +190,7 @@ These links use the same access control mechanisms as the access panel and Offic
191
190
## Related articles
192
191
*[Article Index for Application Management in Azure Active Directory](../active-directory-apps-index.md)
193
192
*[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](../saas-apps/tutorial-list.md)
194
-
*[Set up Cloud Discovery](/cloud-app/security/set-up-cloud-discovery)
193
+
*[Set up Cloud Discovery](/cloud-app-security/set-up-cloud-discovery)
195
194
*[Introduction to Managing Access to Apps](what-is-access-management.md)
196
195
*[Comparing Capabilities for Managing External Identities in Azure AD](../active-directory-b2b-compare-b2c.md)
0 commit comments