Skip to content

Commit fc718cc

Browse files
authored
Merge pull request #116614 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 64fc70f + 8c5efae commit fc718cc

File tree

164 files changed

+3052
-847
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

164 files changed

+3052
-847
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,11 @@
163163
"url": "https://github.com/Azure/azure-functions-templates",
164164
"branch": "dev"
165165
},
166+
{
167+
"path_to_root": "azure-functions-samples-java",
168+
"url": "https://github.com/Azure-Samples/azure-functions-samples-java",
169+
"branch": "master"
170+
},
166171
{
167172
"path_to_root": "functions-quickstart-java",
168173
"url": "https://github.com/Azure-Samples/functions-quickstarts-java",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39856,6 +39856,11 @@
3985639856
"redirect_url": "/azure/dev-spaces/",
3985739857
"redirect_document_id": false
3985839858
},
39859+
{
39860+
"source_path": "articles/dev-spaces/how-to/helm-3.md",
39861+
"redirect_url": "/azure/dev-spaces/",
39862+
"redirect_document_id": false
39863+
},
3985939864
{
3986039865
"source_path": "articles/monitoring/monitoring-overview.md",
3986139866
"redirect_url": "/azure/azure-monitor/overview",
@@ -48505,6 +48510,11 @@
4850548510
"redirect_url": "/azure/cognitive-services/form-recognizer/quickstarts/python-receipts",
4850648511
"redirect_document_id": false
4850748512
},
48513+
{
48514+
"source_path": "articles/cognitive-services/form-recognizer/quickstarts/dotnet-sdk.md",
48515+
"redirect_url": "/azure/cognitive-services/form-recognizer/quickstarts/client-library?pivots=programming-language-csharp",
48516+
"redirect_document_id": false
48517+
},
4850848518
{
4850948519
"source_path": "articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Upload-Images.md",
4851048520
"redirect_url": "/azure/cognitive-services/content-moderator",

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@
4747
href: synchronization.md
4848
- name: How password hash synchronization works
4949
href: ../active-directory/hybrid/how-to-connect-password-hash-synchronization.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
50+
- name: Classic deployment migration benefits
51+
href: concepts-migration-benefits.md
5052
- name: What is Azure Active Directory?
5153
href: ../active-directory/fundamentals/active-directory-whatis.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
5254
- name: Azure Active Directory architecture
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: Benefits of Classic deployment migration in Azure AD Domain Services | Microsoft Docs
3+
description: Learn more about the benefits of migrating a Classic deployment of Azure Active Directory Domain Services to the Resource Manager deployment model
4+
services: active-directory-ds
5+
author: iainfoulds
6+
manager: daveba
7+
8+
ms.service: active-directory
9+
ms.subservice: domain-services
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 05/26/2020
13+
ms.author: iainfou
14+
---
15+
16+
# Benefits of migration from the Classic to Resource Manager deployment model in Azure Active Directory Domain Services
17+
18+
Azure Active Directory Domain Services (AD DS) lets you migrate an existing managed domain that uses the Classic deployment model to the Resource Manager deployment model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
19+
20+
This article outlines the benefits for migration. To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager][howto-migrate].
21+
22+
> [!NOTE]
23+
> In 2017, Azure AD Domain Services became available to host in an Azure Resource Manager network. Since then, we have been able to build a more secure service using the Azure Resource Manager's modern capabilities. Because Azure Resource Manager deployments fully replace classic deployments, Azure AD DS classic virtual network deployments will be retired on March 1, 2023.
24+
>
25+
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/)
26+
27+
## Migration benefits
28+
29+
The migration process takes an existing Azure AD DS instance that uses the Classic deployment model and moves to use the Resource Manager deployment model. When you migrate an Azure AD DS managed domain from the Classic to Resource Manager deployment model, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
30+
31+
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager deployment model, such as the following:
32+
33+
* [Fine-grained password policy support][password-policy].
34+
* Faster synchronization speeds between Azure AD and Azure AD Domain Services.
35+
* Two new [attributes that synchronize from Azure AD][attributes] - *manager* and *employeeID*.
36+
* Access to higher-powered domain controllers when you [upgrade the SKU][skus].
37+
* AD account lockout protection.
38+
* [Email notifications for alerts on your managed domain][email-alerts].
39+
* [Use Azure Workbooks and Azure monitor to view audit logs and sign-in activity][workbooks].
40+
* In supported regions, [Azure Availability Zones][availability-zones].
41+
* Integrations with other Azure products such as [Azure Files][azure-files], [HD Insights][hd-insights], and [Windows Virtual Desktop][wvd].
42+
* Support has access to more telemetry and can help troubleshoot more effectively.
43+
* Encryption at rest using [Azure Managed Disks][managed-disks] for the data on the managed domain controllers.
44+
45+
Azure AD DS managed domains that use a Resource Manager deployment model help you stay up-to-date with the latest new features. New features aren't available for Azure AD DS managed domains that use the Classic deployment model.
46+
47+
## Next steps
48+
49+
To get started, see [Migrate Azure AD Domain Services from the Classic virtual network model to Resource Manager[howto-migrate].
50+
51+
<!-- LINKS - INTERNAL -->
52+
[password-policy]: password-policy.md
53+
[skus]: change-sku.md
54+
[email-alerts]: notifications.md
55+
[workbooks]: use-azure-monitor-workbooks.md
56+
[azure-files]: ../storage/files/storage-files-identity-auth-active-directory-domain-service-enable.md
57+
[hd-insights]: ../hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds.md
58+
[wvd]: ../virtual-desktop/overview.md
59+
[availability-zones]: ../availability-zones/az-overview.md
60+
[howto-migrate]: migrate-from-classic-vnet.md
61+
[attributes]: synchronization.md#attribute-synchronization-and-mapping-to-azure-ad-ds
62+
[managed-disks]: ../virtual-machines/windows/managed-disks-overview.md

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,16 @@ ms.author: iainfou
1717

1818
Azure Active Directory Domain Services (AD DS) supports a one-time move for customers currently using the Classic virtual network model to the Resource Manager virtual network model. Azure AD DS managed domains that use the Resource Manager deployment model provide additional features such as fine-grained password policy, audit logs, and account lockout protection.
1919

20-
This article outlines the benefits and considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance.
20+
This article outlines considerations for migration, then the required steps to successfully migrate an existing Azure AD DS instance. For some of the benefits, see [Benefits of migration from the Classic to Resource Manager deployment model in Azure AD DS][migration-benefits].
2121

2222
> [!NOTE]
2323
> In 2017, Azure AD Domain Services became available to host in an Azure Resource Manager network. Since then, we have been able to build a more secure service using the Azure Resource Manager's modern capabilities. Because Azure Resource Manager deployments fully replace classic deployments, Azure AD DS classic virtual network deployments will be retired on March 1, 2023.
2424
>
25-
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/)
25+
> For more information, see the [official deprecation notice](https://azure.microsoft.com/updates/we-are-retiring-azure-ad-domain-services-classic-vnet-support-on-march-1-2023/).
2626
2727
## Overview of the migration process
2828

29-
The migration process takes an existing Azure AD DS instance that runs in a Classic virtual network and moves it to an existing Resource Manager virtual network. The migration is performed using PowerShell, and has two main stages of execution - *preparation* and *migration*.
29+
The migration process takes an existing Azure AD DS instance that runs in a Classic virtual network and moves it to an existing Resource Manager virtual network. The migration is performed using PowerShell, and has two main stages of execution: *preparation* and *migration*.
3030

3131
![Overview of the migration process for Azure AD DS](media/migrate-from-classic-vnet/migration-overview.png)
3232

@@ -38,21 +38,6 @@ In the *migration* stage, the underlying virtual disks for the domain controller
3838

3939
![Migration of Azure AD DS](media/migrate-from-classic-vnet/migration-process.png)
4040

41-
## Migration benefits
42-
43-
When you move an Azure AD DS managed domain using this migration process, you avoid the need to rejoin machines to the managed domain or delete the Azure AD DS instance and create one from scratch. VMs continue to be joined to the Azure AD DS managed domain at the end of the migration process.
44-
45-
After migration, Azure AD DS provides many features that are only available for domains using Resource Manager virtual networks, such as:
46-
47-
* Fine-grained password policy support.
48-
* AD account lockout protection.
49-
* Email notifications of alerts on the Azure AD DS managed domain.
50-
* Audit logs using Azure Monitor.
51-
* Azure Files integration
52-
* HD Insights integration
53-
54-
Azure AD DS managed domains that use a Resource Manager virtual network help you stay up-to-date with the latest new features. Support for Azure AD DS using Classic virtual networks is to be deprecated in the future.
55-
5641
## Example scenarios for migration
5742

5843
Some common scenarios for migrating an Azure AD DS managed domain include the following examples.
@@ -364,6 +349,7 @@ With your Azure AD DS managed domain migrated to the Resource Manager deployment
364349
[troubleshoot-sign-in]: troubleshoot-sign-in.md
365350
[tshoot-ldaps]: tshoot-ldaps.md
366351
[get-credential]: /powershell/module/microsoft.powershell.security/get-credential
352+
[migration-benefits]: concepts-migration-benefits.md
367353

368354
<!-- EXTERNAL LINKS -->
369355
[powershell-script]: https://www.powershellgallery.com/packages/Migrate-Aadds/

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -744,6 +744,17 @@ TLS 1.2 Cipher Suites minimum bar:
744744
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
745745
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
746746

747+
### IP Ranges
748+
The Azure AD Provisionong service currently operates under the following IP ranges.
749+
750+
13.86.239.205; 52.188.178.195; 13.86.61.156; 40.67.254.206; 51.105.237.71; 20.44.38.166; 40.81.88.68; 52.184.94.250;
751+
20.43.180.59; 20.193.16.105; 20.40.167.232; 13.86.3.57; 52.188.72.113; 13.88.140.233; 52.142.121.156; 51.124.0.213;
752+
40.81.92.36; 20.44.39.175; 20.189.114.130; 20.44.193.163; 20.193.23.17; 20.40.173.237; 13.86.138.128; 52.142.29.23;
753+
13.86.2.238; 40.127.246.167; 51.136.72.4; 20.44.39.244; 40.81.92.186; 20.189.114.131; 20.44.193.210; 20.193.2.21; 20.40.174.46;
754+
13.86.219.18; 40.71.13.10; 20.44.16.38; 13.89.174.16; 13.69.66.182; 13.69.229.118; 104.211.147.176; 40.78.195.176;
755+
13.67.9.240; 13.75.38.48; 13.70.73.48; 13.77.52.176;
756+
757+
747758

748759
## Step 3: Build a SCIM endpoint
749760

articles/active-directory/conditional-access/concept-conditional-access-session.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Conditional Access App Control enables user app access and sessions to be monito
4545

4646
For more information, see the article [Deploy Conditional Access App Control for featured apps](/cloud-app-security/proxy-deployment-aad).
4747

48-
## Sign-in frequency (Preview)
48+
## Sign-in frequency
4949

5050
Sign-in frequency defines the time period before a user is asked to sign in again when attempting to access a resource.
5151

@@ -63,7 +63,7 @@ Sign-in frequency setting works with apps that have implemented OAUTH2 or OIDC p
6363

6464
For more information, see the article [Configure authentication session management with Conditional Access](howto-conditional-access-session-lifetime.md#user-sign-in-frequency).
6565

66-
## Persistent browser session (Preview)
66+
## Persistent browser session
6767

6868
A persistent browser session allows users to remain signed in after closing and reopening their browser window.
6969

articles/active-directory/conditional-access/howto-conditional-access-insights-reporting.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,19 @@ You can also investigate the sign-ins of a specific user by searching for sign-i
9696

9797
## Troubleshooting
9898

99+
### Why are queries failing due to a permissions error?
100+
101+
In order to access the workbook, you need the proper Azure AD permissions as well as Log Analytics workspace permissions. To test whether you have the proper workspace permissions by running a sample log analytics query:
102+
103+
1. Sign in to the **Azure portal**.
104+
1. Browse to **Azure Active Directory** > **Logs**.
105+
1. Type `SigninLogs` into the query box and select **Run**.
106+
1. If the query does not return any results, your workspace may not have been configured correctly.
107+
108+
![Troubleshoot failing queries](./media/howto-conditional-access-insights-reporting/query-troubleshoot-sign-in-logs.png)
109+
110+
For more information about how to stream Azure AD sign-in logs to a Log Analytics workspace, see the article [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
111+
99112
### Why is the workbook taking a long time to load?
100113

101114
Depending on the time range selected and the size of your tenant, the workbook may be evaluating an extraordinarily large number of sign-in events. For large tenants, the volume of sign-ins may exceed the query capacity of Log Analytics. Try shortening the time range to 4 hours to see if the workbook loads.

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ description: Create a custom Conditional Access policy to require administrators
55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
8-
ms.topic: conceptual
9-
ms.date: 04/02/2020
8+
ms.topic: how-to
9+
ms.date: 05/26/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ description: Create a custom Conditional Access policy to require all users to p
55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
8-
ms.topic: conceptual
9-
ms.date: 04/02/2020
8+
ms.topic: how-to
9+
ms.date: 05/26/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -50,7 +50,7 @@ The following steps will help create a Conditional Access policy to require All
5050
1. Select **Done**.
5151
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
5252
1. Under **Exclude**, select any applications that do not require multi-factor authentication.
53-
1. Under **Conditions** > **Client apps (Preview)**, set **Configure** to **Yes**, and select **Done**.
53+
1. Under **Conditions** > **Client apps (Preview)**, set **Configure** to **Yes**. Under **Select the client apps this policy will apply to** leave all defaults selected and select **Done**.
5454
1. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and select **Select**.
5555
1. Confirm your settings and set **Enable policy** to **On**.
5656
1. Select **Create** to create to enable your policy.

0 commit comments

Comments
 (0)