Skip to content

Commit f784720

Browse files
Merge pull request #251649 from Justinha/steps-auth-ds1
revised portal steps
2 parents 80db3a5 + 86cb0c7 commit f784720

File tree

4 files changed

+14
-15
lines changed

4 files changed

+14
-15
lines changed

articles/active-directory-domain-services/alert-ldaps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 01/29/2023
13+
ms.date: 09/15/2023
1414
ms.author: justinha
1515

1616
---
@@ -30,7 +30,7 @@ This article helps you understand and resolve common alerts with secure LDAP acc
3030

3131
When you enable secure LDAP, it's recommended to create additional rules that restrict inbound LDAPS access to specific IP addresses. These rules protect the managed domain from brute force attacks. To update the network security group to restrict TCP port 636 access for secure LDAP, complete the following steps:
3232

33-
1. In the Azure portal, search for and select **Network security groups**.
33+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
3434
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*, then select **Inbound security rules**
3535
1. Select **+ Add** to create a rule for TCP port 636. If needed, select **Advanced** in the window to create a rule.
3636
1. For the **Source**, choose *IP Addresses* from the drop-down menu. Enter the source IP addresses that you want to grant access for secure LDAP traffic.

articles/active-directory-domain-services/alert-nsg.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 01/29/2023
13+
ms.date: 09/15/2023
1414
ms.author: justinha
1515

1616
---
@@ -63,7 +63,7 @@ The following default inbound and outbound security rules are applied to the net
6363

6464
To verify the existing security rules and make sure the default ports are open, complete the following steps:
6565

66-
1. In the Azure portal, search for and select **Network security groups**.
66+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
6767
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*.
6868
1. On the **Overview** page, the existing inbound and outbound security rules are shown.
6969

@@ -75,7 +75,7 @@ To verify the existing security rules and make sure the default ports are open,
7575

7676
To add a missing security rule, complete the following steps:
7777

78-
1. In the Azure portal, search for and select **Network security groups**.
78+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
7979
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*.
8080
1. Under **Settings** in the left-hand panel, click *Inbound security rules* or *Outbound security rules* depending on which rule you need to add.
8181
1. Select **Add**, then create the required rule based on the port, protocol, direction, etc. When ready, select **OK**.

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.custom: has-azure-ad-ps-ref
1313
ms.topic: troubleshooting
14-
ms.date: 01/29/2023
14+
ms.date: 09/15/2023
1515
ms.author: justinha
1616
---
1717
# Known issues: Service principal alerts in Azure Active Directory Domain Services
@@ -32,8 +32,7 @@ If a required service principal is deleted, the Azure platform can't perform aut
3232

3333
To check which service principal is missing and must be recreated, complete the following steps:
3434

35-
1. In the Azure portal, select **Azure Active Directory** from the left-hand navigation menu.
36-
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
35+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
3736
1. Search for each of the following application IDs. For Azure Global, search for AppId value *2565bd9d-da50-47d4-8b85-4c97f669dc36*. For other Azure clouds, search for AppId value *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*. If no existing application is found, follow the *Resolution* steps to create the service principal or re-register the namespace.
3837

3938
| Application ID | Resolution |
@@ -66,7 +65,7 @@ The managed domain's health automatically updates itself within two hours and re
6665
6766
If application ID *443155a6-77f3-45e3-882b-22b3a8d431fb*, *abba844e-bc0e-44b0-947a-dc74e5d09022*, or *d87dcbc6-a371-462e-88e3-28ad15ec4e64* is missing from your Azure AD directory, complete the following steps to re-register the *Microsoft.AAD* resource provider:
6867
69-
1. In the Azure portal, search for and select **Subscriptions**.
68+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Subscriptions**.
7069
1. Choose the subscription associated with your managed domain.
7170
1. From the left-hand navigation, choose **Resource Providers**.
7271
1. Search for *Microsoft.AAD*, then select **Re-register**.

articles/active-directory-domain-services/change-sku.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/23/2023
12+
ms.date: 09/15/2023
1313
ms.author: justinha
1414

1515
#Customer intent: As an identity administrator, I want to change the SKU for my Azure AD Domain Services managed domain to use different features as my business requirements change.
@@ -21,7 +21,7 @@ In Azure Active Directory Domain Services (Azure AD DS), the available performan
2121

2222
You select a SKU when you create the managed domain, and you can switch SKUs up or down as your business needs change after the managed domain has been deployed. Changes in business requirements could include the need for more frequent backups or to create additional forest trusts. For more information on the limits and pricing of the different SKUs, see [Azure AD DS SKU concepts][concepts-sku] and [Azure AD DS pricing][pricing] pages.
2323

24-
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the Azure portal.
24+
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the [Microsoft Entra admin center](https://entra.microsoft.com).
2525

2626
## Before you begin
2727

@@ -44,18 +44,18 @@ For more information on these limits, see [Azure AD DS SKU features and limits][
4444

4545
## Select a new SKU
4646

47-
To change the SKU for a managed domain using the Azure portal, complete the following steps:
47+
To change the SKU for a managed domain using the [Microsoft Entra admin center](https://entra.microsoft.com), complete the following steps:
4848

49-
1. At the top of the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
49+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
5050
1. In the menu on the left-hand side of the Azure AD DS page, select **Settings > SKU**.
5151

52-
![Select the SKU menu option for your Azure AD DS managed domain in the Azure portal](media/change-sku/overview-change-sku.png)
52+
![Select the SKU menu option for your Azure AD DS managed domain in the Microsoft Entra admin center](media/change-sku/overview-change-sku.png)
5353

5454
1. From the drop-down menu, select the SKU you wish for your managed domain. If you have a resource forest, you can't select *Standard* SKU as forest trusts are only available on the *Enterprise* SKU or higher.
5555

5656
Choose the SKU you want from the drop-down menu, then select **Save**.
5757

58-
![Choose the required SKU from the drop-down menu in the Azure portal](media/change-sku/change-sku-selection.png)
58+
![Choose the required SKU from the drop-down menu in the Microsoft Entra admin center](media/change-sku/change-sku-selection.png)
5959

6060
It can take a minute or two to change the SKU type.
6161

0 commit comments

Comments
 (0)