You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/alert-ldaps.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
10
10
ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.topic: troubleshooting
13
-
ms.date: 01/29/2023
13
+
ms.date: 09/15/2023
14
14
ms.author: justinha
15
15
16
16
---
@@ -30,7 +30,7 @@ This article helps you understand and resolve common alerts with secure LDAP acc
30
30
31
31
When you enable secure LDAP, it's recommended to create additional rules that restrict inbound LDAPS access to specific IP addresses. These rules protect the managed domain from brute force attacks. To update the network security group to restrict TCP port 636 access for secure LDAP, complete the following steps:
32
32
33
-
1. In the Azure portal, search for and select **Network security groups**.
33
+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Network security groups**.
34
34
1. Choose the network security group associated with your managed domain, such as *AADDS-contoso.com-NSG*, then select **Inbound security rules**
35
35
1. Select **+ Add** to create a rule for TCP port 636. If needed, select **Advanced** in the window to create a rule.
36
36
1. For the **Source**, choose *IP Addresses* from the drop-down menu. Enter the source IP addresses that you want to grant access for secure LDAP traffic.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/alert-service-principal.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.subservice: domain-services
11
11
ms.workload: identity
12
12
ms.custom: has-azure-ad-ps-ref
13
13
ms.topic: troubleshooting
14
-
ms.date: 01/29/2023
14
+
ms.date: 09/15/2023
15
15
ms.author: justinha
16
16
---
17
17
# Known issues: Service principal alerts in Azure Active Directory Domain Services
@@ -32,8 +32,7 @@ If a required service principal is deleted, the Azure platform can't perform aut
32
32
33
33
To check which service principal is missing and must be recreated, complete the following steps:
34
34
35
-
1. In the Azure portal, select **Azure Active Directory** from the left-hand navigation menu.
36
-
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
35
+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
37
36
1. Search for each of the following application IDs. For Azure Global, search for AppId value *2565bd9d-da50-47d4-8b85-4c97f669dc36*. For other Azure clouds, search for AppId value *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*. If no existing application is found, follow the *Resolution* steps to create the service principal or re-register the namespace.
38
37
39
38
| Application ID | Resolution |
@@ -66,7 +65,7 @@ The managed domain's health automatically updates itself within two hours and re
66
65
67
66
If application ID *443155a6-77f3-45e3-882b-22b3a8d431fb*, *abba844e-bc0e-44b0-947a-dc74e5d09022*, or *d87dcbc6-a371-462e-88e3-28ad15ec4e64* is missing from your Azure AD directory, complete the following steps to re-register the *Microsoft.AAD* resource provider:
68
67
69
-
1. In the Azure portal, search for and select **Subscriptions**.
68
+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Subscriptions**.
70
69
1. Choose the subscription associated with your managed domain.
71
70
1. From the left-hand navigation, choose **Resource Providers**.
72
71
1. Search for *Microsoft.AAD*, then select **Re-register**.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/change-sku.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: domain-services
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 03/23/2023
12
+
ms.date: 09/15/2023
13
13
ms.author: justinha
14
14
15
15
#Customer intent: As an identity administrator, I want to change the SKU for my Azure AD Domain Services managed domain to use different features as my business requirements change.
@@ -21,7 +21,7 @@ In Azure Active Directory Domain Services (Azure AD DS), the available performan
21
21
22
22
You select a SKU when you create the managed domain, and you can switch SKUs up or down as your business needs change after the managed domain has been deployed. Changes in business requirements could include the need for more frequent backups or to create additional forest trusts. For more information on the limits and pricing of the different SKUs, see [Azure AD DS SKU concepts][concepts-sku] and [Azure AD DS pricing][pricing] pages.
23
23
24
-
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the Azure portal.
24
+
This article shows you how to change the SKU for an existing Azure AD DS managed domain using the [Microsoft Entra admin center](https://entra.microsoft.com).
25
25
26
26
## Before you begin
27
27
@@ -44,18 +44,18 @@ For more information on these limits, see [Azure AD DS SKU features and limits][
44
44
45
45
## Select a new SKU
46
46
47
-
To change the SKU for a managed domain using the Azure portal, complete the following steps:
47
+
To change the SKU for a managed domain using the [Microsoft Entra admin center](https://entra.microsoft.com), complete the following steps:
48
48
49
-
1.At the top of the Azure portal, search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
49
+
1.In the [Microsoft Entra admin center](https://entra.microsoft.com), search for and select **Azure AD Domain Services**. Choose your managed domain from the list, such as *aaddscontoso.com*.
50
50
1. In the menu on the left-hand side of the Azure AD DS page, select **Settings > SKU**.
51
51
52
-

52
+

53
53
54
54
1. From the drop-down menu, select the SKU you wish for your managed domain. If you have a resource forest, you can't select *Standard* SKU as forest trusts are only available on the *Enterprise* SKU or higher.
55
55
56
56
Choose the SKU you want from the drop-down menu, then select **Save**.
57
57
58
-

58
+

59
59
60
60
It can take a minute or two to change the SKU type.
0 commit comments