Skip to content

Commit f3f0681

Browse files
authored
Merge pull request #50186 from MicrosoftDocs/master
8/27 PM Publish
2 parents 161d268 + 1932bd1 commit f3f0681

File tree

292 files changed

+1964
-1622
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

292 files changed

+1964
-1622
lines changed

articles/active-directory/connect/active-directory-aadconnect-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ If you need help upgrading to a newer version of Azure AD Connect, open a suppor
185185
## Troubleshooting
186186
**Q: How can I get help with Azure AD Connect?**
187187

188-
[Search the Microsoft Knowledge Base (KB)](https://www.microsoft.com/Search/result.aspx?q=azure%20active%20directory%20connect&form=mssupport)
188+
[Search the Microsoft Knowledge Base (KB)](https://www.microsoft.com/en-us/search/result.aspx?q=azure+active+directory+connect)
189189

190190
* Search the KB for technical solutions to common break-fix issues about support for Azure AD Connect.
191191

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,7 @@ Beginning with version 1.1.819.0, Azure AD Connect provides you with a wizard to
128128

129129
- [Configure hybrid Azure Active Directory join for federated domains](hybrid-azuread-join-federated-domains.md)
130130

131+
131132
- [Configure hybrid Azure Active Directory join for managed domains](hybrid-azuread-join-managed-domains.md)
132133

133134

44.3 KB
Loading
Loading

articles/active-directory/privileged-identity-management/pim-how-to-activate-role.md

Lines changed: 42 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.component: pim
14-
ms.date: 02/14/2017
14+
ms.date: 08/21/2018
1515
ms.author: rolyon
1616
ms.custom: pim
1717
---
@@ -26,25 +26,48 @@ This article is for admins who need to activate their role in Azure AD Privilege
2626
Use the Azure AD Privileged Identity Management application in the [Azure portal](https://portal.azure.com/) to request a role activation, even if you're going to operate in another portal or PowerShell. If you don't have the Azure AD Privileged Identity Management application on your Azure portal, follow these steps to get started.
2727

2828
1. Sign in to the [Azure portal](https://portal.azure.com/).
29-
2. Select your username in the upper right-hand corner of the Azure portal, and select the directory where you will you be operating.
30-
3. Select **All services** and use the Filter textbox to search for **Azure AD Privileged Identity Management**.
31-
4. Check **Pin to dashboard** and then click **Create**. The Privileged Identity Management application opens.
29+
30+
1. Select your username in the upper right-hand corner of the Azure portal, and select the directory where you will you be operating.
31+
32+
1. Select **All services** and use the Filter textbox to search for **Azure AD Privileged Identity Management**.
33+
34+
1. Check **Pin to dashboard** and then click **Create**. The Privileged Identity Management application opens.
3235

3336
## Activate a role
3437
When you need to take on a role, you can request activation by selecting the **My Roles** navigation option in the Azure AD Privileged Identity Management application's left navigation column.
3538

3639
1. Sign in to the [Azure portal](https://portal.azure.com/) and select the Azure AD Privileged Identity Management tile.
37-
2. Select **My Roles**. A list of your assigned eligible roles appear in the grouping at the top of the page.
38-
3. Select a role to activate.
39-
4. Select **Activate**. The **Request role activation** blade appears.
40-
5. Some roles require Multi-Factor Authentication (MFA) before you can activate the role. You only have to authenticate once per session.
41-
40+
41+
1. Select **My Roles**. A list of your assigned eligible roles appear in the grouping at the top of the page.
42+
43+
1. Select a role to activate.
44+
45+
1. Select **Activate**. The **Request role activation** blade appears.
46+
47+
1. Some roles require Multi-Factor Authentication (MFA) before you can activate the role. You only have to authenticate once per session.
48+
4249
![Verify with MFA before role activation - screenshot](./media/pim-how-to-activate-role/PIM_activation_MFA.png)
43-
6. Enter the reason for the activation request in the text field. Some roles require you to supply a trouble ticket number.
44-
7. Select **OK**. If the role does not require approval, it is now activated, and the role appears in the list of active roles (directly below the list of eligible role assignments). If the [role requires approval](./azure-ad-pim-approval-workflow.md) to activate, a toast notification will briefly appear in the upper right-hand corner of your browser informing you the request is pending approval.
50+
51+
1. Enter the reason for the activation request in the text field. Some roles require you to supply a trouble ticket number.
52+
53+
1. Select **OK**. If the role does not require approval, it is now activated, and the role appears in the list of active roles (directly below the list of eligible role assignments). If the [role requires approval](./azure-ad-pim-approval-workflow.md) to activate, a toast notification will briefly appear in the upper right-hand corner of your browser informing you the request is pending approval.
4554

4655
![Request pending notification - screenshot](./media/pim-how-to-activate-role/PIM_Request_Pending_Toast2.png)
4756

57+
## Use a role immediately after activation
58+
59+
Because of caching, activations do not occur immediately in the Azure portal without a refresh. If you need to reduce the possibility of delays after activating a role, you can use the **Application access** page in the portal. Applications accessed from this page check for new role assignments immediately.
60+
61+
1. Open Azure AD Privileged Identity Management.
62+
63+
1. Click the **Application access** page.
64+
65+
![PIM Application access - screenshot](./media/pim-how-to-activate-role/pim-application-access.png)
66+
67+
1. Click **Azure Active Directory** to reopen the portal on the **All Users** page.
68+
69+
When you click this link, you force a refresh and there is a check for new Azure AD role assignments.
70+
4871
## Deactivate a role
4972
Once a role has been activated, it automatically deactivates when its time limit (eligible duration) is reached.
5073

@@ -54,10 +77,14 @@ If you complete your admin tasks early, you can also deactivate a role manually
5477
In the event you do not require activation of a role that requires approval, you may cancel a pending request at any time. Simply select the **My Roles** navigation option in the Azure AD Privileged Identity Management application's left navigation column.
5578

5679
1. Sign in to the [Azure portal](https://portal.azure.com/) and select the Azure AD Privileged Identity Management tile.
57-
2. Select **My Roles**. A list of your assigned eligible roles appear in the grouping at the top of the page.
58-
3. Select a role.
59-
4. Select the **Activation is pending approval** banner on the role activation details blade.
60-
5. Select **Cancel** at the top of the **Pending approval** blade.
80+
81+
1. Select **My Roles**. A list of your assigned eligible roles appear in the grouping at the top of the page.
82+
83+
1. Select a role.
84+
85+
1. Select the **Activation is pending approval** banner on the role activation details blade.
86+
87+
1. Select **Cancel** at the top of the **Pending approval** blade.
6188

6289
![Cancel pending request screenshot](./media/pim-how-to-activate-role/PIM_Request_Pending_Banner_Cancel.png)
6390

articles/active-directory/privileged-identity-management/pim-resource-roles-activate-your-roles.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.component: pim
14-
ms.date: 04/02/2018
14+
ms.date: 08/21/2018
1515
ms.author: rolyon
1616
ms.custom: pim
1717
---
1818

1919
# Activate roles for Azure resources by using Privileged Identity Management
2020
Privileged Identity Management (PIM) introduces a new experience in activating roles for Azure resources. Eligible role members can schedule activation for a future date and time. They can also select a specific activation duration within the maximum (configured by administrators). For more information, see [How to activate or deactivate roles in Azure AD Privileged Identity Management](pim-how-to-activate-role.md).
2121

22-
## Activate roles
22+
## Activate a role
2323
Browse to the **My roles** section in the left pane. Select **Activate** for the role that you want to activate.
2424

2525
!["Eligible roles" tab in the "My roles" pane.](media/azure-pim-resource-rbac/rbac-roles.png)
@@ -34,6 +34,19 @@ If the activation is scheduled for a future date and time, the pending request a
3434

3535
![List of pending requests with "Cancel" buttons](media/azure-pim-resource-rbac/rbac-activate-pending.png)
3636

37+
## Use a role immediately after activation
38+
39+
Because of caching, activations do not occur immediately in the Azure portal without a refresh. If you need to reduce the possibility of delays after activating a role, you can use the **Application access** page in the portal. Applications accessed from this page check for new role assignments immediately.
40+
41+
1. Open Azure AD Privileged Identity Management.
42+
43+
1. Click the **Application access** page.
44+
45+
![PIM Application access - screenshot](./media/pim-resource-roles-activate-your-roles/pim-application-access.png)
46+
47+
1. Click **Azure resources** to reopen the portal on the **All resources** page.
48+
49+
When you click this link, you force a refresh and there is a check for new Azure resource role assignments.
3750

3851
## Apply Just Enough Administration practices
3952

articles/active-directory/privileged-identity-management/pim-resource-roles-discover-resources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Learn how to discover and manage Azure resources when you use Privileged Identit
2222
When you first set up PIM for Azure resources, you need to discover and select resources to protect with PIM. There's no limit to the number of resources that you can manage with PIM. However, we recommend starting with your most critical (production) resources.
2323

2424
> [!NOTE]
25-
> You can only search for and select subscription resources to manage by using PIM. When you manage a subscription in PIM, you can also manage child resources in the subscription.
25+
> You can only search for and select management group or subscription resources to manage using PIM. When you manage a management group or a subscription in PIM, you can also manage its child resources.
2626
2727
## Discover resources
2828

articles/aks/create-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following options are available with the `az aks create` command. See the [A
4444
| `--enable-rbac` `-r` | Enable Kubernetes Role-Based Access Control. | no |
4545
| `--generate-ssh-keys` | Generate SSH public and private key files if missing. | no |
4646
| `--kubernetes-version` `-k` | The version of Kubernetes to use for creating the cluster, such as '1.7.9' or '1.9.6'. | no |
47-
| `--locaton` `-l` | Location for the auto-created resource group | no |
47+
| `--location` `-l` | Location for the auto-created resource group | no |
4848
| `--max-pods` `-m` | The maximum number of pods deployable to a node. | no |
4949
| `--network-plugin` | The Kubernetes network plugin to use. | no |
5050
| `--no-ssh-key` `-x` | Do not use or create a local SSH key. | no |

articles/aks/intro-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ For more information, see [Upgrade an Azure Kubernetes Service (AKS) cluster][ak
5050

5151
## HTTP application routing
5252

53-
The HTTP Application Routing solution makes it easy to access applications deployed to your AKS cluster. When enabled, the HTTP application routing solution configures an ingress controller in your AKS cluster. As applications are deployed, publically accessible DNS names are auto configured.
53+
The HTTP Application Routing solution makes it easy to access applications deployed to your AKS cluster. When enabled, the HTTP application routing solution configures an ingress controller in your AKS cluster. As applications are deployed, publicly accessible DNS names are auto configured.
5454

5555
For more information, see [HTTP application routing][aks-http-routing].
5656

articles/aks/kubernetes-draft.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: iainfou
1212

1313
# Use Draft with Azure Kubernetes Service (AKS)
1414

15-
Draft is an open-source tool that helps package and deploy application containers in a Kubernetes cluster, leaving you free to concentrate on the dev cycle -- the "inner loop" of concentrated development. Draft works as the code is being developed, but before committing to version control. With Draft, you can quickly redeploy an application to Kubernetes as code changes occur. For more information on Draft, see the [Draft documentation on Github][draft-documentation].
15+
Draft is an open-source tool that helps package and deploy application containers in a Kubernetes cluster, leaving you free to concentrate on the dev cycle - the "inner loop" of concentrated development. Draft works as the code is being developed, but before committing to version control. With Draft, you can quickly redeploy an application to Kubernetes as code changes occur. For more information on Draft, see the [Draft documentation on Github][draft-documentation].
1616

1717
This article shows you how to use Draft with a Kubernetes cluster on AKS.
1818

0 commit comments

Comments
 (0)