Skip to content

Commit fbafedd

Browse files
authored
Merge pull request #202035 from MicrosoftDocs/main
6/17 PM Publish
2 parents 74244a2 + 6689ca7 commit fbafedd

File tree

657 files changed

+2209
-2896
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

657 files changed

+2209
-2896
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -955,6 +955,7 @@
955955
".openpublishing.redirection.defender-for-iot.json",
956956
".openpublishing.redirection.healthcare-apis.json",
957957
".openpublishing.redirection.iot-hub.json",
958+
".openpublishing.redirection.app-service.json",
958959
".openpublishing.redirection.key-vault.json",
959960
".openpublishing.redirection.sql-database.json",
960961
".openpublishing.redirection.security-benchmark.json",
@@ -997,6 +998,7 @@
997998
"articles/spring-cloud/.openpublishing.redirection.spring-cloud.json",
998999
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
9991000
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
1000-
"articles/machine-learning/.openpublishing.redirection.machine-learning.json"
1001+
"articles/machine-learning/.openpublishing.redirection.machine-learning.json",
1002+
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json"
10011003
]
10021004
}
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/app-service-web/web-sites-restore.md",
5+
"redirect_url": "/azure/app-service/manage-backup",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/app-service/web-sites-restore.md",
10+
"redirect_url": "/azure/app-service/manage-backup",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/app-service/app-service-web-restore-snapshots.md",
15+
"redirect_url": "/azure/app-service/manage-backup",
16+
"redirect_document_id": false
17+
}
18+
]
19+
}

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4955,11 +4955,6 @@
49554955
"redirect_url": "/azure/app-service/web-sites-monitor",
49564956
"redirect_document_id": false
49574957
},
4958-
{
4959-
"source_path_from_root": "/articles/app-service-web/web-sites-restore.md",
4960-
"redirect_url": "/azure/app-service/web-sites-restore",
4961-
"redirect_document_id": false
4962-
},
49634958
{
49644959
"source_path_from_root": "/articles/app-service-web/web-sites-traffic-manager.md",
49654960
"redirect_url": "/azure/app-service/web-sites-traffic-manager",

articles/active-directory-domain-services/csp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/09/2020
12+
ms.date: 06/16/2022
1313
ms.author: justinha
1414

1515
---

articles/active-directory-domain-services/powershell-create-instance.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: sample
13-
ms.date: 05/19/2021
13+
ms.date: 06/17/2022
1414
ms.author: justinha
1515
ms.custom: devx-track-azurepowershell
1616

@@ -48,7 +48,7 @@ To complete this article, you need the following resources:
4848

4949
Azure AD DS requires a service principal to authenticate and communicate and an Azure AD group to define which users have administrative permissions in the managed domain.
5050

51-
First, create an Azure AD service principal by using a specific application ID named *Domain Controller Services*. In public Azure, the ID value is *2565bd9d-da50-47d4-8b85-4c97f669dc36*. In other clouds, the value is *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*. Don't change this application ID.
51+
First, create an Azure AD service principal by using a specific application ID named *Domain Controller Services*. The ID value is *2565bd9d-da50-47d4-8b85-4c97f669dc36*. Don't change this application ID.
5252

5353
Create an Azure AD service principal using the [New-AzureADServicePrincipal][New-AzureADServicePrincipal] cmdlet:
5454

@@ -79,7 +79,7 @@ else {
7979
}
8080
```
8181

82-
With the *AAD DC Administrators* group created, get the desired user's object ID using the [Get-AzureADUser][Get-AzureADUser] cmdlet, then add the user to the group using the [Add-AzureADGroupMember][Add-AzureADGroupMember] cmdlet..
82+
With the *AAD DC Administrators* group created, get the desired user's object ID using the [Get-AzureADUser][Get-AzureADUser] cmdlet, then add the user to the group using the [Add-AzureADGroupMember][Add-AzureADGroupMember] cmdlet.
8383

8484
In the following example, the user object ID for the account with a UPN of `[email protected]`. Replace this user account with the UPN of the user you wish to add to the *AAD DC Administrators* group:
8585

@@ -194,7 +194,7 @@ $vnet | Set-AzVirtualNetwork
194194

195195
Now let's create a managed domain. Set your Azure subscription ID, and then provide a name for the managed domain, such as *aaddscontoso.com*. You can get your subscription ID using the [Get-AzSubscription][Get-AzSubscription] cmdlet.
196196

197-
If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for additional redundancy.
197+
If you choose a region that supports Availability Zones, the Azure AD DS resources are distributed across zones for redundancy.
198198

199199
Availability Zones are unique physical locations within an Azure region. Each zone is made up of one or more datacenters equipped with independent power, cooling, and networking. To ensure resiliency, there's a minimum of three separate zones in all enabled regions.
200200

@@ -251,7 +251,7 @@ Connect-AzureAD
251251
Connect-AzAccount
252252
253253
# Create the service principal for Azure AD Domain Services.
254-
New-AzureADServicePrincipal -AppId "2565bd9d-da50-47d4-8b85-4c97f669dc36"
254+
New-AzureADServicePrincipal -AppId "6ba9a5d4-8456-4118-b521-9c5ca10cdf84"
255255
256256
# First, retrieve the object ID of the 'AAD DC Administrators' group.
257257
$GroupObjectId = Get-AzureADGroup `

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/07/2022
11+
ms.date: 06/16/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to secure access to an Azure Active Directory Domain Services managed domain using secure lightweight directory access protocol (LDAPS)

articles/active-directory-domain-services/tutorial-configure-networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/07/2022
11+
ms.date: 06/16/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create and configure a virtual network subnet or network peering for application workloads in an Azure Active Directory Domain Services managed domain

articles/active-directory-domain-services/tutorial-configure-password-hash-sync.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 07/06/2020
11+
ms.date: 06/16/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an server administrator, I want to learn how to enable password hash synchronization with Azure AD Connect to create a hybrid environment using an on-premises AD DS domain.
@@ -44,7 +44,7 @@ To complete this tutorial, you need the following resources:
4444

4545
## Password hash synchronization using Azure AD Connect
4646

47-
Azure AD Connect is used to synchronize objects like user accounts and groups from an on-premises AD DS environment into an Azure AD tenant. As part of the process, password hash synchronization enables accounts to use the same password in the on-prem AD DS environment and Azure AD.
47+
Azure AD Connect is used to synchronize objects like user accounts and groups from an on-premises AD DS environment into an Azure AD tenant. As part of the process, password hash synchronization enables accounts to use the same password in the on-premises AD DS environment and Azure AD.
4848

4949
To authenticate users on the managed domain, Azure AD DS needs password hashes in a format that's suitable for NTLM and Kerberos authentication. Azure AD doesn't store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Azure AD DS for your tenant. For security reasons, Azure AD also doesn't store any password credentials in clear-text form. Therefore, Azure AD can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
5050

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 04/04/2022
11+
ms.date: 06/16/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 04/04/2022
11+
ms.date: 06/16/2022
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.

0 commit comments

Comments
 (0)