Skip to content

Commit f41fe62

Browse files
authored
Merge pull request #188219 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 1b67fc5 + 1726fd0 commit f41fe62

22 files changed

+72
-44
lines changed

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,9 @@ To secure your cloud resource, set up a claims rule so that Active Directory Fed
4343
6. Give your rule a name.
4444
7. Select **Authentication Methods References** as the Incoming claim type.
4545
8. Select **Pass through all claim values**.
46+
4647
![Screenshot shows Add Transform Claim Rule Wizard where you select Pass through all claim values.](./media/howto-mfa-adfs/configurewizard.png)
48+
4749
9. Click **Finish**. Close the AD FS Management console.
4850

4951
## Trusted IPs for federated users
@@ -59,25 +61,34 @@ The first thing we need to do is to configure the AD FS claims. Create two claim
5961
1. Open AD FS Management.
6062
2. On the left, select **Relying Party Trusts**.
6163
3. Right-click on **Microsoft Office 365 Identity Platform** and select **Edit Claim Rules…**
64+
6265
![ADFS Console - Edit Claim Rules](./media/howto-mfa-adfs/trustedip1.png)
66+
6367
4. On Issuance Transform Rules, click **Add Rule.**
68+
6469
![Adding a Claim Rule](./media/howto-mfa-adfs/trustedip2.png)
70+
6571
5. On the Add Transform Claim Rule Wizard, select **Pass Through or Filter an Incoming Claim** from the drop-down and click **Next**.
72+
6673
![Screenshot shows Add Transform Claim Rule Wizard where you select Pass Through or Filter an Incoming Claim.](./media/howto-mfa-adfs/trustedip3.png)
74+
6775
6. In the box next to Claim rule name, give your rule a name. For example: InsideCorpNet.
6876
7. From the drop-down, next to Incoming claim type, select **Inside Corporate Network**.
77+
6978
![Adding Inside Corporate Network claim](./media/howto-mfa-adfs/trustedip4.png)
79+
7080
8. Click **Finish**.
7181
9. On Issuance Transform Rules, click **Add Rule**.
7282
10. On the Add Transform Claim Rule Wizard, select **Send Claims Using a Custom Rule** from the drop-down and click **Next**.
7383
11. In the box under Claim rule name: enter *Keep Users Signed In*.
7484
12. In the Custom rule box, enter:
7585

76-
```ad-fs-claim-rule
86+
```ad-fs-claim-rule
7787
c:[Type == "http://schemas.microsoft.com/2014/03/psso"]
78-
=> issue(claim = c);
88+
=> issue(claim = c);
89+
```
90+
7991
![Create custom claim to keep users signed in](./media/howto-mfa-adfs/trustedip5.png)
80-
```
8192
8293
13. Click **Finish**.
8394
14. Click **Apply**.
@@ -97,4 +108,4 @@ Now that the claims are in place, we can configure trusted IPs.
97108
4. On the Service Settings page, under **trusted IPs**, select **Skip multi-factor-authentication for requests from federated users on my intranet**.
98109
5. Click **save**.
99110
100-
That's it! At this point, federated Microsoft 365 users should only have to use MFA when a claim originates from outside the corporate intranet.
111+
That's it! At this point, federated Microsoft 365 users should only have to use MFA when a claim originates from outside the corporate intranet.

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The Office 365 suite makes it possible to target these services all at once. We
7878

7979
Targeting this group of applications helps to avoid issues that may arise because of inconsistent policies and dependencies. For example: The Exchange Online app is tied to traditional Exchange Online data like mail, calendar, and contact information. Related metadata may be exposed through different resources like search. To ensure that all metadata is protected by as intended, administrators should assign policies to the Office 365 app.
8080

81-
Administrators can exclude specific apps from policy if they wish, including the Office 365 suite and excluding the specific apps in policy.
81+
Administrators can exclude the entire Office 365 suite or specific Office 365 client apps from the Conditional Access policy.
8282

8383
The following key applications are included in the Office 365 client app:
8484

articles/active-directory/hybrid/how-to-connect-pta-faq.yml

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ sections:
2525
- name: Ignored
2626
questions:
2727
- question: |
28-
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS), should I choose?
28+
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS) should I choose?
2929
answer: |
3030
Review [this guide](./choose-ad-authn.md) for a comparison of the various Azure AD sign-in methods and how to choose the right sign-in method for your organization.
3131
@@ -180,20 +180,34 @@ sections:
180180
If you uninstall a Pass-through Authentication Agent from a server, it causes the server to stop accepting sign-in requests. To avoid breaking the user sign-in capability on your tenant, ensure that you have another Authentication Agent running before you uninstall a Pass-through Authentication Agent.
181181
182182
- question: |
183-
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
183+
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA, but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
184184
answer: |
185-
A: Under the following circumstances your on-premises UPN changes may not synchronize if:
185+
Under the following circumstances your on-premises UPN changes might not synchronize if:
186186
187-
- Your Azure AD tenant was created prior to June 15th 2015
188-
- You initially were federated with your Azure AD tenant using AD FS for authentication
189-
- You switched to having managed users using PTA as authentication
187+
- Your Azure AD tenant was created prior to June 15, 2015.
188+
- You initially were federated with your Azure AD tenant using AD FS for authentication.
189+
- You switched to having managed users using PTA as authentication.
190190
191-
This is because the default behavior of tenants created prior to June 15th 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlt:
191+
This is because the default behavior of tenants created prior to June 15, 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlet:
192192
193193
`Set-MsolDirSyncFeature -Feature SynchronizeUpnForManagedUsers -Enable $True`
194194
195-
Tenants created after June 15th 2015 have the default behavior of synchronizing UPN changes.
195+
Tenants created after June 15, 2015 have the default behavior of synchronizing UPN changes.
196196
197+
- question: |
198+
How do I capture the PTA Agent ID from Azure AD sign-in logs and the PTA server to validate which PTA server was used for a sign-in event?
199+
answer: |
200+
To validate which local server or authentication agent was used for a specific sign-in event:
201+
202+
1. In the Azure portal, go to the sign-in event.
203+
2. Select **Authentication Details**. In the **Authentication Method Detail** column, Agent ID details are shown in the format "Pass-through Authentication; PTA AgentId: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX".
204+
3. To get Agent ID details for the agent that's installed on your local server, log in to your local server and run following cmdlet:
205+
206+
`Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Azure AD Connect Agents\Azure AD Connect Authentication Agent' | Select *Instance*`
207+
208+
The GUID value that's returned is the Agent ID of the authentication agent that's installed on that specific server. If you have multiple agents in your environment, you can run this cmdlet on each agent server and capture the Agent ID details.
209+
4. Correlate the Agent ID that you get from the local server and from the Azure AD sign-in logs to validate which agent or server acknowledged the sign-request.
210+
197211
additionalContent: |
198212
199213
## Next steps

articles/analysis-services/analysis-services-refresh-azure-automation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The Service Principal you create must have server administrator permissions on t
6262
4. Browse for the [Refresh-Model.ps1](#sample-powershell-runbook) file, provide a **Name** and **Description**, and then click **Create**.
6363

6464
> [!NOTE]
65-
> Use script from [Sample Powershell Runbook](#sample-powershell-runbook) section at the bottom of this document to create a file called Refresh-Model.ps1 and save to local machine to import into Runbook.
65+
> Use script from [Sample PowerShell Runbook](#sample-powershell-runbook) section at the bottom of this document to create a file called Refresh-Model.ps1 and save to local machine to import into Runbook.
6666
6767
![Import Runbook](./media/analysis-services-refresh-azure-automation/9.png)
6868

articles/api-management/api-management-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ sections:
103103
answer: |
104104
Yes. This can be done through PowerShell or by directly submitting to the API. This will disable certificate chain validation and will allow you to use self-signed or privately-signed certificates when communicating from API Management to the back end services.
105105
106-
### Powershell method
106+
### PowerShell method
107107
Use the [`New-AzApiManagementBackend`](/powershell/module/az.apimanagement/new-azapimanagementbackend) (for new back end) or [`Set-AzApiManagementBackend`](/powershell/module/az.apimanagement/set-azapimanagementbackend) (for existing back end) PowerShell cmdlets and set the `-SkipCertificateChainValidation` parameter to `True`.
108108
109109
```powershell

articles/api-management/automation-manage-api-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Reduce operational overhead and free up IT and DevOps staff to focus on work tha
2929
## How can Azure Automation help manage Azure API Management?
3030
API Management can be managed in Azure Automation by using the [Windows PowerShell cmdlets for Azure API Management API](/powershell/module/az.apimanagement). Within Azure Automation, you can write PowerShell workflow scripts to perform many of your API Management tasks using the cmdlets. You can also pair these cmdlets in Azure Automation with the cmdlets for other Azure services, to automate complex tasks across Azure services and 3rd party systems.
3131

32-
Here are some examples of using API Management with Powershell:
32+
Here are some examples of using API Management with PowerShell:
3333

3434
* [Azure PowerShell samples for API Management](./powershell-samples.md)
3535

articles/app-service/scripts/powershell-backup-delete.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,4 +44,4 @@ This script uses the following commands. Each command in the table links to comm
4444

4545
For more information on the Azure PowerShell module, see [Azure PowerShell documentation](/powershell/azure/).
4646

47-
Additional Azure Powershell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).
47+
Additional Azure PowerShell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).

articles/app-service/scripts/powershell-backup-onetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,4 @@ This script uses the following commands. Each command in the table links to comm
5050

5151
For more information on the Azure PowerShell module, see [Azure PowerShell documentation](/powershell/azure/).
5252

53-
Additional Azure Powershell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).
53+
Additional Azure PowerShell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).

articles/app-service/scripts/powershell-backup-restore-diff-sub.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,4 +46,4 @@ This script uses the following commands. Each command in the table links to comm
4646

4747
For more information on the Azure PowerShell module, see [Azure PowerShell documentation](/powershell/azure/).
4848

49-
Additional Azure Powershell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).
49+
Additional Azure PowerShell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).

articles/app-service/scripts/powershell-backup-restore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,4 +44,4 @@ This script uses the following commands. Each command in the table links to comm
4444

4545
For more information on the Azure PowerShell module, see [Azure PowerShell documentation](/powershell/azure/).
4646

47-
Additional Azure Powershell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).
47+
Additional Azure PowerShell samples for Azure App Service Web Apps can be found in the [Azure PowerShell samples](../samples-powershell.md).

0 commit comments

Comments
 (0)