Skip to content

Commit ba3e461

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents a450def + e729629 commit ba3e461

File tree

863 files changed

+4242
-4660
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

863 files changed

+4242
-4660
lines changed

.openpublishing.redirection.json

+85
Original file line numberDiff line numberDiff line change
@@ -36626,6 +36626,91 @@
3662636626
"redirect_url": "/azure/analysis-services/analysis-services-overview",
3662736627
"redirect_document_id": false
3662836628
},
36629+
{
36630+
"source_path": "articles/analysis-services/tutorials/aas-adventure-works-tutorial.md",
36631+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36632+
"redirect_document_id": false
36633+
},
36634+
{
36635+
"source_path": "articles/analysis-services/tutorials/aas-lesson-1-create-a-new-tabular-model-project.md",
36636+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36637+
"redirect_document_id": false
36638+
},
36639+
{
36640+
"source_path": "articles/analysis-services/tutorials/aas-lesson-2-Get-data.md",
36641+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36642+
"redirect_document_id": false
36643+
},
36644+
{
36645+
"source_path": "articles/analysis-services/tutorials/aas-lesson-3-mark-as-date-table.md",
36646+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36647+
"redirect_document_id": false
36648+
},
36649+
{
36650+
"source_path": "articles/analysis-services/tutorials/aas-lesson-4-create-relationships.md",
36651+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36652+
"redirect_document_id": false
36653+
},
36654+
{
36655+
"source_path": "articles/analysis-services/tutorials/aas-lesson-5-create-calculated-columns.md",
36656+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36657+
"redirect_document_id": false
36658+
},
36659+
{
36660+
"source_path": "articles/analysis-services/tutorials/aas-lesson-6-create-measures.md",
36661+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36662+
"redirect_document_id": false
36663+
},
36664+
{
36665+
"source_path": "articles/analysis-services/tutorials/aas-lesson-7-create-key-performance-indicators.md",
36666+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36667+
"redirect_document_id": false
36668+
},
36669+
{
36670+
"source_path": "articles/analysis-services/tutorials/aas-lesson-8-create-perspectives.md",
36671+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36672+
"redirect_document_id": false
36673+
},
36674+
{
36675+
"source_path": "articles/analysis-services/tutorials/aas-lesson-9-create-hierarchies.md",
36676+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36677+
"redirect_document_id": false
36678+
},
36679+
{
36680+
"source_path": "articles/analysis-services/tutorials/aas-lesson-10-create-partitions.md",
36681+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36682+
"redirect_document_id": false
36683+
},
36684+
{
36685+
"source_path": "articles/analysis-services/tutorials/aas-lesson-11-create-roles.md",
36686+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36687+
"redirect_document_id": false
36688+
},
36689+
{
36690+
"source_path": "articles/analysis-services/tutorials/aas-lesson-12-analyze-in-excel.md",
36691+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36692+
"redirect_document_id": false
36693+
},
36694+
{
36695+
"source_path": "articles/analysis-services/tutorials/aas-lesson-13-deploy.md",
36696+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36697+
"redirect_document_id": false
36698+
},
36699+
{
36700+
"source_path": "articles/analysis-services/tutorials/aas-supplemental-lesson-detail-rows.md",
36701+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36702+
"redirect_document_id": false
36703+
},
36704+
{
36705+
"source_path": "articles/analysis-services/tutorials/aas-supplemental-lesson-dynamic-security.md",
36706+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36707+
"redirect_document_id": false
36708+
},
36709+
{
36710+
"source_path": "articles/analysis-services/tutorials/aas-supplemental-lesson-ragged-hierarchies.md",
36711+
"redirect_url": "/azure/analysis-services/analysis-services-overview",
36712+
"redirect_document_id": false
36713+
},
3662936714
{
3663036715
"source_path": "articles/azure-monitor/app/java-live.md",
3663136716
"redirect_url": "/azure/azure-monitor/app/java-get-started",

articles/active-directory/authentication/concept-sspr-writeback.md

-3
Original file line numberDiff line numberDiff line change
@@ -82,9 +82,6 @@ When a federated or password hash synchronized user attempts to reset or change
8282

8383
When the call comes in from the cloud, the synchronization engine uses the **cloudAnchor** attribute to look up the Azure Active Directory connector space object. It then follows the link back to the MV object, and then follows the link back to the Active Directory object. Because there can be multiple Active Directory objects (multi-forest) for the same user, the sync engine relies on the `Microsoft.InfromADUserAccountEnabled.xxx` link to pick the correct one.
8484

85-
> [!Note]
86-
> As a result of this logic, for password writeback to work Azure AD Connect must be able to communicate with the primary domain controller (PDC) emulator. If you need to enable this manually, you can connect Azure AD Connect to the PDC emulator. Right-click the **properties** of the Active Directory synchronization connector, then select **configure directory partitions**. From there, look for the **domain controller connection settings** section and select the box titled **only use preferred domain controllers**. Even if the preferred domain controller is not a PDC emulator, Azure AD Connect attempts to connect to the PDC for password writeback.
87-
8885
1. After the user account is found, an attempt to reset the password directly in the appropriate Active Directory forest is made.
8986
1. If the password set operation is successful, the user is told their password has been changed.
9087
> [!NOTE]

articles/active-directory/authentication/multi-factor-authentication-faq.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ If your organization doesn't have legacy clients, you should not allow your user
139139
> [!NOTE]
140140
> Modern authentication for Office 2013 clients
141141
>
142-
> App passwords are only necessary for apps that don't support modern authentication. Office 2013 clients support modern authentication protocols, but need to be configured. Now modern authentication is available to any customer running the March 2015 or later update for Office 2013. For more information, see the [Office 2013 modern authentication public preview announced](https://www.microsoft.com/en-us/microsoft-365/blog/2015/03/23/office-2013-modern-authentication-public-preview-announced/).
142+
> App passwords are only necessary for apps that don't support modern authentication. Office 2013 clients support modern authentication protocols, but need to be configured. Now modern authentication is available to any customer running the March 2015 or later update for Office 2013. For more information, see the blog post [Updated Office 365 modern authentication](https://www.microsoft.com/microsoft-365/blog/2015/11/19/updated-office-365-modern-authentication-public-preview/).
143143
144144
**Q: My users say that sometimes they don't receive the text message, or they reply to two-way text messages but the verification times out.**
145145

articles/active-directory/develop/single-sign-on-saml-protocol.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ If `NameIDPolicy` is provided, you can include its optional `Format` attribute.
8686
Azure AD ignores the `AllowCreate` attribute.
8787

8888
### RequestAuthnContext
89-
The `RequestedAuthnContext` element specifies the desired authentication methods. It is optional in `AuthnRequest` elements sent to Azure AD. Azure AD supports only one `AuthnContextClassRef` value: `urn:oasis:names:tc:SAML:2.0:ac:classes:Password`.
89+
The `RequestedAuthnContext` element specifies the desired authentication methods. It is optional in `AuthnRequest` elements sent to Azure AD. Azure AD supports `AuthnContextClassRef` values such as `urn:oasis:names:tc:SAML:2.0:ac:classes:Password`.
9090

9191
### Scoping
9292
The `Scoping` element, which includes a list of identity providers, is optional in `AuthnRequest` elements sent to Azure AD.

articles/active-directory/hybrid/reference-connect-sync-attributes-synchronized.md

+1-7
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: reference
15-
ms.date: 01/24/2019
15+
ms.date: 04/24/2019
1616
ms.subservice: hybrid
1717
ms.author: billmath
1818

@@ -153,7 +153,6 @@ In this case, start with the list of attributes in this topic and identify those
153153
| pwdLastSet |X | | |mechanical property. Used to know when to invalidate already issued tokens. Used by both password sync and federation. |
154154
| reportToOriginator | | |X | |
155155
| reportToOwner | | |X | |
156-
| securityEnabled | | |X |Derived from groupType |
157156
| sn |X |X | | |
158157
| sourceAnchor |X |X |X |mechanical property. Immutable identifier to maintain relationship between ADDS and Azure AD. |
159158
| st |X |X | | |
@@ -236,7 +235,6 @@ In this case, start with the list of attributes in this topic and identify those
236235
| pwdLastSet |X | | |mechanical property. Used to know when to invalidate already issued tokens. Used by both password hash sync, pass-through authentication and federation. |
237236
| reportToOriginator | | |X | |
238237
| reportToOwner | | |X | |
239-
| securityEnabled | | |X |Derived from groupType |
240238
| sn |X |X | | |
241239
| sourceAnchor |X |X |X |mechanical property. Immutable identifier to maintain relationship between ADDS and Azure AD. |
242240
| st |X |X | | |
@@ -289,7 +287,6 @@ In this case, start with the list of attributes in this topic and identify those
289287
| preferredLanguage |X | | | |
290288
| proxyAddresses |X |X |X | |
291289
| pwdLastSet |X | | |mechanical property. Used to know when to invalidate already issued tokens. Used by both password hash sync, pass-through authentication and federation. |
292-
| securityEnabled | | |X |Derived from groupType |
293290
| sn |X |X | | |
294291
| sourceAnchor |X |X |X |mechanical property. Immutable identifier to maintain relationship between ADDS and Azure AD. |
295292
| st |X |X | | |
@@ -312,7 +309,6 @@ In this case, start with the list of attributes in this topic and identify those
312309
| objectSID |X | |X |mechanical property. AD user identifier used to maintain sync between Azure AD and AD. |
313310
| proxyAddresses |X |X |X |mechanical property. Used by Azure AD. Contains all secondary email addresses for the user. |
314311
| pwdLastSet |X | | |mechanical property. Used to know when to invalidate already issued tokens. |
315-
| securityEnabled | | |X |Derived from groupType. |
316312
| sourceAnchor |X |X |X |mechanical property. Immutable identifier to maintain relationship between ADDS and Azure AD. |
317313
| usageLocation |X | | |mechanical property. The user’s country. Used for license assignment. |
318314
| userPrincipalName |X | | |This UPN is the login ID for the user. Most often the same as [mail] value. |
@@ -331,7 +327,6 @@ In this case, start with the list of attributes in this topic and identify those
331327
| objectSID |X | |X |mechanical property. AD user identifier used to maintain sync between Azure AD and AD. |
332328
| proxyAddresses |X |X |X | |
333329
| pwdLastSet |X | | |mechanical property. Used to know when to invalidate already issued tokens. Used by both password hash sync, pass-through authentication and federation. |
334-
| securityEnabled | | |X |Derived from groupType |
335330
| sourceAnchor |X |X |X |mechanical property. Immutable identifier to maintain relationship between ADDS and Azure AD. |
336331
| usageLocation |X | | |mechanical property. The user’s country. Used for license assignment. |
337332
| userPrincipalName |X | | |UPN is the login ID for the user. Most often the same as [mail] value. |
@@ -359,7 +354,6 @@ In this case, start with the list of attributes in this topic and identify those
359354
| postalCode |X |X | | |
360355
| preferredLanguage |X | | | |
361356
| pwdLastSet |X | | |mechanical property. Used to know when to invalidate already issued tokens. Used by both password hash sync, pass-through authentication and federation. |
362-
| securityEnabled | | |X |Derived from groupType |
363357
| sn |X |X | | |
364358
| sourceAnchor |X |X |X |mechanical property. Immutable identifier to maintain relationship between ADDS and Azure AD. |
365359
| st |X |X | | |

articles/active-directory/hybrid/tutorial-phs-backup.md

+53-3
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 01/30/2019
11+
ms.date: 04/25/2019
1212
ms.subservice: hybrid
1313
ms.author: billmath
1414

@@ -19,9 +19,18 @@ ms.collection: M365-identity-device-management
1919

2020
The following tutorial will walk you through setting up password hash sync as a backup and fail-over for AD FS. This document will also demonstrate how to enable password hash sync as the primary authentication method, if AD FS has failed or become unavailable.
2121

22+
>[!NOTE]
23+
>Although these steps are usually performed during emergency or outage situations, it is recommended that you test these steps and verify your procedures before an outage occurs.
24+
25+
>[!NOTE]
26+
>In the event that you do not have access to Azure AD Connect server or the server does not have access to the internet, you can contact [Microsoft Support](https://support.microsoft.com/en-us/contactus/) to assist with the changes to the Azure AD side.
27+
2228
## Prerequisites
2329
This tutorial builds upon the [Tutorial: Federate a single AD forest environment to the cloud](tutorial-federation.md) and is a per-requisite before attempting this tutorial. If you have not completed this tutorial, do so before attempting the steps in this document.
2430

31+
>[!IMPORTANT]
32+
>Prior to switching to PHS you should create a backup of your AD FS environment. This can be done using the [AD FS Rapid Restore Tool](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/ad-fs-rapid-restore-tool#how-to-use-the-tool).
33+
2534
## Enable PHS in Azure AD Connect
2635
The first step, now that we have an Azure AD Connect environment that is using federation, is to turn on password hash sync and allow Azure AD Connect to synchronize the hashes.
2736

@@ -42,6 +51,9 @@ Do the following:
4251
## Switch to password hash synchronization
4352
Now, we will show you how to switch over to password hash synchronization. Before you start, consider under which conditions should you make the switch. Don't make the switch for temporary reasons, like a network outage, a minor AD FS problem, or a problem that affects a subset of your users. If you decide to make the switch because fixing the problem will take too long, do the following:
4453

54+
> [!IMPORTANT]
55+
> Be aware that it will take some time for the password hashes to synchronize to Azure AD. This means that it may take up 3 hours for the synchronizations to complete and before you can start authenticating using the password hashes.
56+
4557
1. Double-click the Azure AD Connect icon that was created on the desktop
4658
2. Click **Configure**.
4759
3. Select **Change user sign-in** and click **Next**.
@@ -60,9 +72,47 @@ Now, we will show you how to switch over to password hash synchronization. Befor
6072
2. Sign in with a user account that was created in our new tenant. You will need to sign in using the following format: (user@domain.onmicrosoft.com). Use the same password that the user uses to sign in on-premises.</br>
6173
![Verify](media/tutorial-password-hash-sync/verify1.png)</br>
6274

63-
## Next Steps
75+
## Switch back to federation
76+
Now, we will show you how to switch back to federation. To do this, do the following:
77+
78+
1. Double-click the Azure AD Connect icon that was created on the desktop
79+
2. Click **Configure**.
80+
3. Select **Change user sign-in** and click **Next**.
81+
4. Enter the username and password for your global administrator. This is the account that was created [here](tutorial-federation.md#create-a-global-administrator-in-azure-ad) in the previous tutorial.
82+
5. On the **User sign-in** screen, select **Federation with AD FS** and click **Next**.
83+
6. On the Domain Administrator credentials page, enter the contoso\Administrator username and password and click **Next.**
84+
7. On the AD FS farm screen, click **Next**.
85+
8. On the **Azure AD domain** screen, select the domain from the drop-down and click **Next**.
86+
9. On the **Ready to configure** screen, click **Configure**.
87+
10. Once configuration is complete, click **Next**.
88+
![Configure](media/tutorial-phs-backup/backup4.png)</br>
89+
11. On the **Verify federation connectivity** screen, click **Verify**. You may need to configure DNS records (add A and AAAA records) for this to complete successfully.
90+
![Verify](media/tutorial-phs-backup/backup5.png)</br>
91+
12. Click **Exit**.
92+
93+
## Reset the AD FS and Azure trust
94+
Now we need to reset the trust between AD FS and Azure.
95+
96+
1. Double-click the Azure AD Connect icon that was created on the desktop
97+
2. Click **Configure**.
98+
3. Select **Manage Federation** and click **Next**.
99+
4. Select **Reset Azure AD trust** and click **Next**.
100+
![Reset](media/tutorial-phs-backup/backup6.png)</br>
101+
5. On the **Connect to Azure AD** screen enter the username and password for your global administrator.
102+
6. On the **Connect to AD FS** screen, enter the contoso\Administrator username and password and click **Next.**
103+
7. On the **Certificates** screen, click **Next**.
104+
105+
## Test signing in with one of our users
106+
107+
1. Browse to [http://myapps.microsoft.com](http://myapps.microsoft.com)
108+
2. Sign-in with a user account that was created in our new tenant. You will need to sign-in using the following format: (user@domain.onmicrosoft.com). Use the same password that the user uses to sign-in on-premises.
109+
![Verify](media/tutorial-password-hash-sync/verify1.png)
110+
111+
You have now successfully setup a hybrid identity environment that you can use to test and familiarize yourself with what Azure has to offer.
112+
113+
## Next steps
64114

65115

66116
- [Hardware and prerequisites](how-to-connect-install-prerequisites.md)
67117
- [Express settings](how-to-connect-install-express.md)
68-
- [Password hash synchronization](how-to-connect-password-hash-synchronization.md)|
118+
- [Password hash synchronization](how-to-connect-password-hash-synchronization.md)

0 commit comments

Comments
 (0)