Skip to content

Commit eda26a1

Browse files
authored
Merge pull request #158078 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 5da0bf8 + 2a273b8 commit eda26a1

File tree

253 files changed

+2783
-2597
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

253 files changed

+2783
-2597
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,9 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 04/28/2021
11+
ms.date: 05/10/2021
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
14-
ms.custom: contperf-fy21q2
1514
---
1615
# Tutorial: Develop and plan provisioning for a SCIM endpoint
1716

@@ -78,7 +77,7 @@ To design your schema, follow these steps:
7877
|lastName|name.familyName|surName|
7978
|workMail|emails[type eq “work”].value|Mail|
8079
|manager|manager|manager|
81-
|tag|urn:ietf:params:scim:schemas:extension:2.0:CustomExtension:tag|extensionAttribute1|
80+
|tag|urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag|extensionAttribute1|
8281
|status|active|isSoftDeleted (computed value not stored on user)|
8382

8483
**Example list of required attributes**
@@ -98,7 +97,7 @@ To design your schema, follow these steps:
9897
"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User": {
9998
"Manager": "123456"
10099
},
101-
"urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:CustomAttribute:User": {
100+
"urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User": {
102101
"tag": "701984",
103102
},
104103
"meta": {

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 05/07/2021
9+
ms.date: 05/10/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -50,8 +50,9 @@ The following Linux distributions are currently supported during the preview of
5050
The following Azure regions are currently supported during the preview of this feature:
5151

5252
- Azure Global
53-
- Azure Government
54-
- Azure China
53+
54+
> [!Note]
55+
> The preview of this feature will be supported in Azure Government and Azure China by June of 2021.
5556
5657
It's not supported to use this extension on Azure Kubernetes Service (AKS) clusters. For more information, see [Support policies for AKS](../../aks/support-policies.md).
5758

@@ -67,24 +68,24 @@ VM network configuration must permit outbound access to the following endpoints
6768

6869
For Azure Global
6970

70-
- https://packages.microsoft.com – For package installation and upgrades.
71-
- http://169.254.169.254 – Azure Instance Metadata Service endpoint.
72-
- https://login.microsoftonline.com – For PAM (pluggable authentication modules) based authentication flows.
73-
- https://pas.windows.net – For Azure RBAC flows.
71+
- `https://packages.microsoft.com` – For package installation and upgrades.
72+
- `http://169.254.169.254` – Azure Instance Metadata Service endpoint.
73+
- `https://login.microsoftonline.com` – For PAM (pluggable authentication modules) based authentication flows.
74+
- `https://pas.windows.net` – For Azure RBAC flows.
7475

7576
For Azure Government
7677

77-
- https://packages.microsoft.com – For package installation and upgrades.
78-
- http://169.254.169.254 – Azure Instance Metadata Service endpoint.
79-
- https://login.microsoftonline.us – For PAM (pluggable authentication modules) based authentication flows.
80-
- https://pasff.usgovcloudapi.net – For Azure RBAC flows.
78+
- `https://packages.microsoft.com` – For package installation and upgrades.
79+
- `http://169.254.169.254` – Azure Instance Metadata Service endpoint.
80+
- `https://login.microsoftonline.us` – For PAM (pluggable authentication modules) based authentication flows.
81+
- `https://pasff.usgovcloudapi.net` – For Azure RBAC flows.
8182

8283
For Azure China
8384

84-
- https://packages.microsoft.com – For package installation and upgrades.
85-
- http://169.254.169.254 – Azure Instance Metadata Service endpoint.
86-
- https://login.chinacloudapi.cn – For PAM (pluggable authentication modules) based authentication flows.
87-
- https://pas.chinacloudapi.cn – For Azure RBAC flows.
85+
- `https://packages.microsoft.com` – For package installation and upgrades.
86+
- `http://169.254.169.254` – Azure Instance Metadata Service endpoint.
87+
- `https://login.chinacloudapi.cn` – For PAM (pluggable authentication modules) based authentication flows.
88+
- `https://pas.chinacloudapi.cn` – For Azure RBAC flows.
8889

8990
### Virtual machine
9091

@@ -366,6 +367,9 @@ For customers who are using previous version of Azure AD login for Linux that wa
366367
--resource-group myResourceGroup \
367368
--vm-name myVM
368369
```
370+
## Using Azure Policy to ensure standards and assess compliance
371+
372+
Use Azure policy to ensure Azure AD login is enabled for your new and existing Linux virtual machines and assess compliance of your environment at scale on your Azure policy compliance dashboard. With this capability, you can use many levels of enforcement: you can flag new and existing Linux VMs within your environment that do not have Azure AD login enabled. You can also use Azure policy to deploy the Azure AD extension on new Linux VMs that do not have Azure AD login enabled, as well as remediate existing Linux VMs to the same standard. In addition to these capabilities, you can also use policy to detect and flag Linux VMs that have non-approved local accounts created on their machines. To learn more, review [Azure policy](https://www.aka.ms/AzurePolicy).
369373
370374
## Troubleshoot sign-in issues
371375
@@ -430,10 +434,6 @@ Solution 2: Perform these actions:
430434
431435
Virtual machine scale set VM connections may fail if the virtual machine scale set instances are running an old model. Upgrading virtual machine scale set instances to the latest model may resolve issues, especially if an upgrade has not been done since the Azure AD Login extension was installed. Upgrading an instance applies a standard virtual machine scale set configuration to the individual instance.
432436
433-
### Other limitations
434-
435-
Users that inherit access rights through nested groups or role assignments aren't currently supported. The user or group must be directly assigned the required role assignments. For example, the use of management groups or nested group role assignments won't grant the correct permissions to allow the user to sign in.
436-
437437
## Preview feedback
438438
439439
Share your feedback about this preview feature or report issues using it on the [Azure AD feedback forum](https://feedback.azure.com/forums/169401-azure-active-directory?category_id=166032).

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 07/20/2020
9+
ms.date: 05/10/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -27,7 +27,7 @@ There are many security benefits of using Azure AD based authentication to login
2727
- With Conditional Access, configure policies to require multi-factor authentication and other signals such as low user and sign in risk before you can RDP to Windows VMs.
2828
- Use Azure deploy and audit policies to require Azure AD login for Windows VMs and to flag use of no approved local account on the VMs.
2929
- Login to Windows VMs with Azure Active Directory also works for customers that use Federation Services.
30-
- Automate and scale Azure AD join with MDM auto enrollment with Intune of Azure Windows VMs that are part for your VDI deployments. MDM enrollment does not apply to Windows Server 2019 VM depolyments
30+
- Automate and scale Azure AD join with MDM auto enrollment with Intune of Azure Windows VMs that are part for your VDI deployments. Auto MDM enrollment requires Azure AD P1 license. Windows Server 2019 VMs do not support MDM enrollment.
3131

3232

3333
> [!NOTE]
@@ -75,7 +75,7 @@ For Azure China
7575
- `https://enterpriseregistration.partner.microsoftonline.cn` - For device registration.
7676
- `http://169.254.169.254` - Azure Instance Metadata Service endpoint.
7777
- `https://login.chinacloudapi.cn` - For authentication flows.
78-
- `https://pas.chinacloudapi.cn' - For Azure RBAC flows.
78+
- `https://pas.chinacloudapi.cn` - For Azure RBAC flows.
7979

8080

8181
## Enabling Azure AD login in for Windows VM in Azure
@@ -241,7 +241,7 @@ You are now signed in to the Windows Server 2019 Azure virtual machine with the
241241
242242
## Using Azure Policy to ensure standards and assess compliance
243243

244-
Use Azure policy to ensure Azure AD login is enabled for your new and existing Windows virtual machines and assess compliance of your environment at scale on your Azure policy compliance dashboard. With this capability, you can use many levels of enforcement: you can flag new and existing Windows VMs within your environment that do not have Azure AD login enabled. You can also use Azure policy to deploy the Azure AD extension on new Windows VMs that do not have Azure AD login enabled, as well as remediate existing Windows VMs to the same standard. In addition to these capabilities, you can also use policy to detect and flag VMs have non-approved local accounts on their machines. To learn more, review [Azure policy](https://www.aka.ms/AzurePolicy).
244+
Use Azure policy to ensure Azure AD login is enabled for your new and existing Windows virtual machines and assess compliance of your environment at scale on your Azure policy compliance dashboard. With this capability, you can use many levels of enforcement: you can flag new and existing Windows VMs within your environment that do not have Azure AD login enabled. You can also use Azure policy to deploy the Azure AD extension on new Windows VMs that do not have Azure AD login enabled, as well as remediate existing Windows VMs to the same standard. In addition to these capabilities, you can also use policy to detect and flag Windows VMs that have non-approved local accounts created on their machines. To learn more, review [Azure policy](https://www.aka.ms/AzurePolicy).
245245

246246
## Troubleshoot
247247

articles/active-directory/fundamentals/service-accounts-managed-identities.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,6 @@ For more information about control and data planes, see [Control plane and data
5151

5252
All Azure services will eventually support managed identities. For more information, see [Services that support managed identities for Azure resources](../managed-identities-azure-resources/services-support-managed-identities.md).
5353

54-
##
55-
5654
## Types of managed identities
5755

5856
There are two types of managed identities—system-assigned and user-assigned.

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -631,7 +631,7 @@ You can now assign Azure AD built-in roles to cloud groups with this new feature
631631
**Service category:** Azure AD roles
632632
**Product capability:** Access Control
633633

634-
Users in the Insights Business Leader role can access a set of dashboards and insights via the [M365 Insights application](https://www.microsoft.com/microsoft-365/partners/workplaceanalytics). This includes full access to all dashboards and presented insights and data exploration functionality. However, users in this role don't have access to product configuration settings, which is the responsibility of the Insights Administrator role. To learn more about this role, see [Administrator role permissions in Azure Active Directory](../roles/permissions-reference.md#insights-business-leader)
634+
Users in the Insights Business Leader role can access a set of dashboards and insights via the [Microsoft 365 Insights application](https://www.microsoft.com/microsoft-365/partners/workplaceanalytics). This includes full access to all dashboards and presented insights and data exploration functionality. However, users in this role don't have access to product configuration settings, which is the responsibility of the Insights Administrator role. To learn more about this role, see [Administrator role permissions in Azure Active Directory](../roles/permissions-reference.md#insights-business-leader)
635635

636636
---
637637

@@ -641,7 +641,7 @@ Users in the Insights Business Leader role can access a set of dashboards and in
641641
**Service category:** Azure AD roles
642642
**Product capability:** Access Control
643643

644-
Users in the Insights Administrator role can access the full set of administrative capabilities in the [M365 Insights application](https://www.microsoft.com/microsoft-365/partners/workplaceanalytics). A user in this role can read directory information, monitor service health, file support tickets, and access the Insights administrator settings aspects. To learn more about this role, see [Administrator role permissions in Azure Active Directory](../roles/permissions-reference.md#insights-administrator)
644+
Users in the Insights Administrator role can access the full set of administrative capabilities in the [Microsoft 365 Insights application](https://www.microsoft.com/microsoft-365/partners/workplaceanalytics). A user in this role can read directory information, monitor service health, file support tickets, and access the Insights administrator settings aspects. To learn more about this role, see [Administrator role permissions in Azure Active Directory](../roles/permissions-reference.md#insights-administrator)
645645

646646
---
647647

articles/active-directory/fundamentals/whats-new.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -340,6 +340,17 @@ Azure AD Application Proxy native support for header-based authentication is now
340340

341341
---
342342

343+
### Azure AD Connect cloud sync general availability refresh
344+
**Type:** Changed feature
345+
**Service category:** Azure AD Connect Cloud Sync
346+
**Product capability:** Directory
347+
348+
Azure AD connect cloud sync now has an updated agent (version# - 1.1.359). For more details on agent updates, including bug fixes, check out the [version history](../cloud-sync/reference-version-history.md). With the updated agent, cloud sync customers can use GMSA cmdlets to set and reset their gMSA permission at a granular level. In addition that, we have changed the limit of syncing members using group scope filtering from 1499 to 50,000 (50K) members.
349+
350+
Check out the newly available [expression builder](../cloud-sync/how-to-expression-builder.md#deploy-the-expression) for cloud sync, which, helps you build complex expressions as well as simple expressions when you do transformations of attribute values from AD to Azure AD using attribute mapping.
351+
352+
---
353+
343354
### Two-way SMS for MFA Server is no longer supported
344355

345356
**Type:** Deprecated
@@ -349,7 +360,7 @@ Azure AD Application Proxy native support for header-based authentication is now
349360

350361
Two-way SMS for MFA Server was originally deprecated in 2018, and will not be supported after February 24, 2021. Administrators should enable another method for users who still use two-way SMS.
351362

352-
Email notifications and Azure Portal Service Health notifications were sent to affected admins on December 8, 2020 and January 28, 2021. The alerts went to the Owner, Co-Owner, Admin, and Service Admin RBAC roles tied to the subscriptions. [Learn more](../authentication/how-to-authentication-two-way-sms-unsupported.md).
363+
Email notifications and Azure portal Service Health notifications were sent to affected admins on December 8, 2020 and January 28, 2021. The alerts went to the Owner, Co-Owner, Admin, and Service Admin RBAC roles tied to the subscriptions. [Learn more](../authentication/how-to-authentication-two-way-sms-unsupported.md).
353364

354365
---
355366

@@ -1045,4 +1056,4 @@ Enhanced dynamic group service is now in Public Preview. New customers that crea
10451056

10461057
The new service also aims to complete member addition and removal because of attribute changes within a few minutes. Also, single processing failures won't block tenant processing. To learn more about creating dynamic groups, see our [documentation](../enterprise-users/groups-create-rule.md).
10471058

1048-
---
1059+
---

articles/active-directory/reports-monitoring/plan-monitoring-and-reporting.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,6 @@ Learn More About [Azure AD Administrative Roles](../roles/permissions-reference.
153153

154154
*Always apply the concept of least privileges to reduce the risk of an account compromise*. Consider implementing [Privileged Identity Management](../privileged-identity-management/pim-configure.md) to further secure your organization.
155155

156-
##
157156

158157
## Deploy Azure AD reporting and monitoring
159158

0 commit comments

Comments
 (0)