Skip to content

Commit f2e250b

Browse files
authored
Merge pull request #91733 from MicrosoftDocs/master
10/14 PM Publish
2 parents 9dec035 + 98304a2 commit f2e250b

File tree

162 files changed

+1865
-1272
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

162 files changed

+1865
-1272
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,12 @@
6262
},
6363
{
6464
"source_path": "articles/machine-learning/data-science-virtual-machine/dsvm-tools-overview.md",
65-
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/overview#included",
65+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/tools-included",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/machine-learning/data-science-virtual-machine/reference-windows-vm.md",
70+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/tools-included",
6671
"redirect_document_id": false
6772
},
6873
{
@@ -1920,6 +1925,11 @@
19201925
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
19211926
"redirect_document_id": false
19221927
},
1928+
{
1929+
"source_path": "articles/search/search-traffic-analytics.md",
1930+
"redirect_url": "/azure/search/search-monitor-usage",
1931+
"redirect_document_id": false
1932+
},
19231933
{
19241934
"source_path": "articles/search/knowledge-store-howto.md",
19251935
"redirect_url": "/azure/search/knowledge-store-create-rest",

articles/active-directory/develop/access-tokens.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,8 +112,11 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
112112
| `ver` | String, either `1.0` or `2.0` | Indicates the version of the access token. |
113113

114114

115-
> [!Groups overage claim]
115+
> [!NOTE]
116+
> **Groups overage claim**
117+
>
116118
> To ensure that the token size doesn’t exceed HTTP header size limits, Azure AD limits the number of object Ids that it includes in the groups claim. If a user is member of more groups than the overage limit (150 for SAML tokens, 200 for JWT tokens), then Azure AD does not emit the groups claim in the token. Instead, it includes an overage claim in the token that indicates to the application to query the Graph API to retrieve the user’s group membership.
119+
```csharp
117120
{
118121
...
119122
"_claim_names": {
@@ -124,9 +127,11 @@ Claims are present only if a value exists to fill it. So, your app shouldn't tak
124127
"src1": {
125128
"endpoint":"[Graph Url to get this user's group membership from]"
126129
}
127-
}
130+
}
131+
}
128132
...
129-
}
133+
}
134+
```
130135
> You can use the `BulkCreateGroups.ps1` provided in the [App Creation Scripts](https://github.com/Azure-Samples/active-directory-dotnet-webapp-groupclaims/blob/master/AppCreationScripts/) folder to help test overage scenarios.
131136
132137
#### v1.0 basic claims

articles/active-directory/develop/authentication-flows-app-scenarios.md

Lines changed: 146 additions & 101 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 05/17/2019
15+
ms.date: 10/14/2019
1616
ms.author: ryanwi
1717
ms.reviewer: tomfitz
1818
ms.custom: aaddev, seoapril2019, identityplatformtop40
@@ -58,7 +58,7 @@ You can set the scope at the level of the subscription, resource group, or resou
5858

5959
1. Select **Access control (IAM)**.
6060
1. Select **Add role assignment**.
61-
1. Select the role you wish to assign to the application. To allow the application to execute actions like **reboot**, **start** and **stop** instances, select the **Contributor** role. By default, Azure AD applications aren't displayed in the available options. To find your application, search for the name and select it.
61+
1. Select the role you wish to assign to the application. For example, to allow the application to execute actions like **reboot**, **start** and **stop** instances, select the **Contributor** role. Read more about the [available roles](../../role-based-access-control/built-in-roles.md) By default, Azure AD applications aren't displayed in the available options. To find your application, search for the name and select it.
6262

6363
![Select the role to assign to the application](./media/howto-create-service-principal-portal/select-role.png)
6464

@@ -85,7 +85,13 @@ Daemon applications can use two forms of credentials to authenticate with Azure
8585

8686
### Upload a certificate
8787

88-
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for testing purposes. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer: `$cert=New-SelfSignedCertificate -Subject "CN=DaemonConsoleCert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature`. Export this certificate using the [Manage User Certificate](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in) MMC snap-in accessible from the Windows Control Panel.
88+
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for testing purposes. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
89+
90+
```powershell
91+
$cert=New-SelfSignedCertificate -Subject "CN=DaemonConsoleCert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature
92+
```
93+
94+
Export this certificate to a file using the [Manage User Certificate](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in) MMC snap-in accessible from the Windows Control Panel.
8995

9096
To upload the certificate:
9197

@@ -110,6 +116,14 @@ If you choose not to use a certificate, you can create a new application secret.
110116

111117
![Copy the secret value because you can't retrieve this later](./media/howto-create-service-principal-portal/copy-secret.png)
112118

119+
## Configure access policies on resources
120+
Keep in mind, you might need to configure addition permissions on resources that your application needs to access. For example, you must also [update a key vault's access policies](/azure/key-vault/key-vault-secure-your-key-vault#data-plane-and-access-policies) to give your application access to keys, secrets, or certificates.
121+
122+
1. In the [Azure portal](https://portal.azure.com), navigate to your key vault and select **Access policies**.
123+
1. Select **Add access policy**, then select the key, secret, and certificate permissions you want to grant your application. Select the service principal you created previously.
124+
1. Select **Add** to add the access policy, then **Save** to commit your changes.
125+
![Add access policy](./media/howto-create-service-principal-portal/add-access-policy.png)
126+
113127
## Required permissions
114128

115129
You must have sufficient permissions to register an application with your Azure AD tenant, and assign the application to a role in your Azure subscription.
@@ -121,7 +135,7 @@ You must have sufficient permissions to register an application with your Azure
121135

122136
![Find your role. If you're a User, ensure non-admins can register apps](./media/howto-create-service-principal-portal/view-user-info.png)
123137

124-
1. Select **User settings**.
138+
1. In the left pane, select **User settings**.
125139
1. Check the **App registrations** setting. This value can only be set by an administrator. If set to **Yes**, any user in the Azure AD tenant can register an app.
126140

127141
If the app registrations setting is set to **No**, only users with an administrator role may register these types of applications. See [available roles](../users-groups-roles/directory-assign-admin-roles.md#available-roles) and [role permissions](../users-groups-roles/directory-assign-admin-roles.md#role-permissions) to learn about available administrator roles and the specific permissions in Azure AD that are given to each role. If your account is assigned to the User role, but the app registration setting is limited to admin users, ask your administrator to either assign you to one of the administrator roles that can create and manage all aspects of app registrations, or to enable users to register apps.
48.7 KB
Loading
-4.31 KB
Loading
-1.88 KB
Loading
18.3 KB
Loading

articles/active-directory/hybrid/how-to-connect-health-agent-install.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,15 @@ The following table is a list of requirements for using Azure AD Connect Health.
3434
|Outbound connectivity based on IP Addresses | For IP address based filtering on firewalls, refer to the [Azure IP Ranges](https://www.microsoft.com/download/details.aspx?id=41653).|
3535
| SSL Inspection for outbound traffic is filtered or disabled | The agent registration step or data upload operations may fail if there is SSL inspection or termination for outbound traffic at the network layer. Read more about [how to setup SSL inspection](https://technet.microsoft.com/library/ee796230.aspx) |
3636
| Firewall ports on the server running the agent |The agent requires the following firewall ports to be open in order for the agent to communicate with the Azure AD Health service endpoints.<br /><br /><li>TCP port 443</li><li>TCP port 5671</li> <br />Note that port 5671 is no longer required for the latest version of agent. Upgrade to the latest version so only port 443 is required. Read more about [enable firewall ports](https://technet.microsoft.com/library/ms345310(v=sql.100).aspx) |
37-
| Allow the following websites if IE Enhanced Security is enabled |If IE Enhanced Security is enabled, then the following websites must be allowed on the server that is going to have the agent installed.<br /><br /><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com</li><li>https:\//login.windows.net</li><li>https:\//aadcdn.msftauth.net</li><li>The federation server for your organization trusted by Azure Active Directory. For example: https:\//sts.contoso.com</li> Read more about [how to configure IE](https://support.microsoft.com/help/815141/internet-explorer-enhanced-security-configuration-changes-the-browsing) |
37+
| Allow the following websites if IE Enhanced Security is enabled |If IE Enhanced Security is enabled, then the following websites must be allowed on the server that is going to have the agent installed.<br /><br /><li>https:\//login.microsoftonline.com</li><li>https:\//secure.aadcdn.microsoftonline-p.com</li><li>https:\//login.windows.net</li><li>https:\//aadcdn.msftauth.net</li><li>The federation server for your organization trusted by Azure Active Directory. For example: https:\//sts.contoso.com</li> Read more about [how to configure IE](https://support.microsoft.com/help/815141/internet-explorer-enhanced-security-configuration-changes-the-browsing). In case you have a proxy within your network , please see note below.|
3838
| Ensure PowerShell v4.0 or newer is installed | <li>Windows Server 2008 R2 ships with PowerShell v2.0, which is insufficient for the agent. Update PowerShell as explained below under [Agent installation on Windows Server 2008 R2 Servers](#agent-installation-on-windows-server-2008-r2-servers).</li><li>Windows Server 2012 ships with PowerShell v3.0, which is insufficient for the agent. [Update](https://www.microsoft.com/download/details.aspx?id=40855) the Windows Management Framework.</li><li>Windows Server 2012 R2 and later ship with a sufficiently recent version of PowerShell.</li>|
3939
|Disable FIPS|FIPS is not supported by Azure AD Connect Health agents.|
4040

41+
42+
> [!NOTE]
43+
> If you have a highly locked-down and extremely restricted environment, you would require to whitelist the URLs mentioned in the Service endpoint lists below in addition to the ones listed in the Allowed IE enhanced Security configuration above.
44+
>
45+
4146
### Outbound connectivity to the Azure service endpoints
4247

4348
During installation and runtime, the agent requires connectivity to Azure AD Connect Health service endpoints. If outbound connectivity is blocked using Firewalls, make sure that the following URLs are not blocked by default. Do not disable security monitoring or inspection of these URLs, but allow them as you would other internet traffic. They permit communication with Azure AD Connect Health service endpoints. Learn how to [check outbound connectivity with Test-AzureADConnectHealthConnectivity](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-health-agent-install#test-connectivity-to-azure-ad-connect-health-service).

articles/active-directory/manage-apps/user-provisioning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ Use the Azure Active Directory portal to configure the Azure AD provisioning ser
9797

9898
1. Select the Automatic option for the **Provisioning Mode** to specify settings for admin credentials, mappings, starting and stopping, and synchronization.
9999

100-
- Expand **Admin credentials** to enter the credentials required for Azure AD to connect to the application's user management API. This section also lets you enable email notifications if the credentials fail, or the provisioning job goes into [quarantine](#quarantine).
100+
- Expand **Admin credentials** to enter the credentials required for Azure AD to connect to the application's user management API. This section also lets you enable email notifications if the credentials fail, or the provisioning job goes into [quarantine](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-quarantine-status).
101101
- Expand **Mappings** to view and edit the user attributes that flow between Azure AD and the target application when user accounts are provisioned or updated. If the target application supports it, this section lets you optionally configure provisioning of groups and user accounts. Select a mapping in the table to open the mapping editor to the right, where you can view and customize user attributes.
102102

103103
**Scoping filters** tell the provisioning service which users and groups in the source system should be provisioned or deprovisioned to the target system. In the **Attribute mapping** pane, select **Source Object Scope** to filter on specific attribute values. For example, you can specify that only users with a "Department" attribute of "Sales" should be in scope for provisioning. For more information, see [Using scoping filters](define-conditional-rules-for-provisioning-user-accounts.md).
@@ -171,7 +171,7 @@ If most or all of the calls made against the target system consistently fail bec
171171

172172
When in quarantine, the frequency of incremental cycles is gradually reduced to once per day.
173173

174-
The provisioning job will be removed from quarantine after all of the offending errors are fixed and the next sync cycle starts. If the provisioning job stays in quarantine for more than four weeks, the provisioning job is disabled.
174+
The provisioning job will be removed from quarantine after all of the offending errors are fixed and the next sync cycle starts. If the provisioning job stays in quarantine for more than four weeks, the provisioning job is disabled. Learn more here about quarantine status [here](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-quarantine-status).
175175

176176
## How long will it take to provision users?
177177

0 commit comments

Comments
 (0)