Skip to content

Commit

Permalink
[BULK] - DocuTune - Switch to site-relative links
Browse files Browse the repository at this point in the history
  • Loading branch information
alexbuckgit committed Sep 26, 2023
1 parent 4545f26 commit 21a6078
Show file tree
Hide file tree
Showing 30 changed files with 101 additions and 101 deletions.
6 changes: 3 additions & 3 deletions articles/active-directory-domain-services/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -52,15 +52,15 @@
- name: How Domain Services synchronization works
href: synchronization.md
- name: How password hash synchronization works
href: ../active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
href: /azure/active-directory/hybrid/connect/how-to-connect-password-hash-synchronization?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
- name: Custom attributes
href: concepts-custom-attributes.md
- name: Virtual network considerations
href: network-considerations.md
- name: What is Microsoft Entra ID?
href: ../active-directory/fundamentals/whatis.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
href: /azure/active-directory/fundamentals/whatis?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
- name: Microsoft Entra architecture
href: ../active-directory/architecture/architecture.md?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
href: /azure/active-directory/architecture/architecture?context=/azure/active-directory-domain-services/context/azure-ad-ds-context
- name: How to
items:
- name: Configure common settings
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -224,11 +224,11 @@ The final step is to check that the flow works properly. To check this, try logg
[centosuser@centos8 ~]su - [email protected]
Last login: Wed Oct 12 15:13:39 UTC 2022 on pts/0
[ADUser@Centos8 ~]$ exit
```

Now you are ready to use AD authentication on your Linux VM.

<!-- INTERNAL LINKS -->
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
[create-azure-ad-tenant]: /azure/active-directory/fundamentals/sign-up-organization.md
[associate-azure-ad-tenant]: /azure/active-directory/fundamentals/how-subscriptions-associated-directory.md
[create-azure-ad-ds-instance]: tutorial-create-instance.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ To get started, [create a Domain Services managed domain][create-instance].
[password-policy]: password-policy.md
[hybrid-phs]: tutorial-configure-password-hash-sync.md#enable-synchronization-of-password-hashes
[secure-domain]: secure-your-domain.md
[azure-ad-password-sync]: ../active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md#password-hash-sync-process-for-azure-ad-domain-services
[azure-ad-password-sync]: /azure/active-directory/hybrid/connect/how-to-connect-password-hash-synchronization#password-hash-sync-process-for-azure-ad-domain-services
[create-instance]: tutorial-create-instance.md
[tutorial-create-instance-advanced]: tutorial-create-instance-advanced.md
[concepts-forest]: ./concepts-forest-trust.md
Expand Down
2 changes: 1 addition & 1 deletion articles/active-directory-domain-services/alert-ldaps.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,4 +59,4 @@ Create a replacement secure LDAP certificate by following the steps to [create a
If you still have issues, [open an Azure support request][azure-support] for more troubleshooting help.

<!-- INTERNAL LINKS -->
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support
4 changes: 2 additions & 2 deletions articles/active-directory-domain-services/alert-nsg.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,5 +87,5 @@ It takes a few moments for the security rule to be added and show in the list.
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.

<!-- INTERNAL LINKS -->
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
[configure-ldaps]: tutorial-configure-ldaps.md
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support
[configure-ldaps]: ./tutorial-configure-ldaps.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ ms.author: justinha
---
# Known issues: Service principal alerts in Microsoft Entra Domain Services

[Service principals](../active-directory/develop/app-objects-and-service-principals.md) are applications that the Azure platform uses to manage, update, and maintain a Microsoft Entra Domain Services managed domain. If a service principal is deleted, functionality in the managed domain is impacted.
[Service principals](/azure/active-directory/develop/app-objects-and-service-principals) are applications that the Azure platform uses to manage, update, and maintain a Microsoft Entra Domain Services managed domain. If a service principal is deleted, functionality in the managed domain is impacted.

This article helps you troubleshoot and resolve service principal-related configuration alerts.

Expand Down Expand Up @@ -109,7 +109,7 @@ After you delete both applications, the Azure platform automatically recreates t
If you still have issues, [open an Azure support request][azure-support] for additional troubleshooting assistance.
<!-- INTERNAL LINKS -->
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support
<!-- EXTERNAL LINKS -->
[New-AzureAdServicePrincipal]: /powershell/module/azuread/new-azureadserviceprincipal
4 changes: 2 additions & 2 deletions articles/active-directory-domain-services/change-sku.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,8 +64,8 @@ It can take a minute or two to change the SKU type.
If you have a resource forest and want to create additional trusts after the SKU change, see [Create an outbound forest trust to an on-premises domain in Domain Services][create-trust].

<!-- INTERNAL LINKS -->
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
[create-azure-ad-tenant]: /azure/active-directory/fundamentals/sign-up-organization
[associate-azure-ad-tenant]: /azure/active-directory/fundamentals/how-subscriptions-associated-directory
[create-azure-ad-ds-instance]: tutorial-create-instance.md
[concepts-sku]: administration-concepts.md#azure-ad-ds-skus
[create-trust]: tutorial-create-forest-trust.md
Expand Down
4 changes: 2 additions & 2 deletions articles/active-directory-domain-services/check-health.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ This article shows you how to view the Domain Services health status and underst

The health status for a managed domain is viewed using the Microsoft Entra admin center. Information on the last backup time and synchronization with Microsoft Entra ID can be seen, along with any alerts that indicate a problem with the managed domain's health. To view the health status for a managed domain, complete the following steps:

1. Sign in to [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator).
1. Sign in to [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
1. Search for and select **Microsoft Entra Domain Services**.
1. Select your managed domain, such as *aaddscontoso.com*.
1. On the left-hand side of the Domain Services resource window, select **Health**. The following example screenshot shows a healthy managed domain and the status of the last backup and Azure AD synchronization:
Expand Down Expand Up @@ -84,5 +84,5 @@ Health status alerts are categorized into the following levels of severity:
For more information on alerts that are shown in the health status page, see [Resolve alerts on your managed domain][troubleshoot-alerts]

<!-- INTERNAL LINKS -->
[azure-support]: ../active-directory/fundamentals/how-to-get-support.md
[azure-support]: /azure/active-directory/fundamentals/how-to-get-support
[troubleshoot-alerts]: troubleshoot-alerts.md
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ You can also learn more about
[manage-gpos]: manage-group-policy.md
[tutorial-ldaps]: tutorial-configure-ldaps.md
[tutorial-create]: tutorial-create-instance.md
[whatis-azuread]: ../active-directory/fundamentals/whatis.md
[whatis-azuread]: /azure/active-directory/fundamentals/whatis
[overview-adds]: /windows-server/identity/ad-ds/get-started/virtual-dc/active-directory-domain-services-overview
[create-forest-trust]: tutorial-create-forest-trust.md
[administration-concepts]: administration-concepts.md
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ Select **+ Add** to choose which custom attributes to synchronize. The list show
If you don't see the directory extension you are looking for, enter the extension’s associated application appId and click **Search** to load only that application’s defined extension properties. This search helps when multiple applications define many extensions in your tenant.

>[!NOTE]
>If you would like to see directory extensions synchronized by Microsoft Entra Connect, click **Enterprise App** and look for the Application ID of the **Tenant Schema Extension App**. For more information, see [Microsoft Entra Connect Sync: Directory extensions](../active-directory/hybrid/connect/how-to-connect-sync-feature-directory-extensions.md#configuration-changes-in-azure-ad-made-by-the-wizard).
>If you would like to see directory extensions synchronized by Microsoft Entra Connect, click **Enterprise App** and look for the Application ID of the **Tenant Schema Extension App**. For more information, see [Microsoft Entra Connect Sync: Directory extensions](/azure/active-directory/hybrid/connect/how-to-connect-sync-feature-directory-extensions#configuration-changes-in-azure-ad-made-by-the-wizard).
Click **Select**, and then **Save** to confirm the change.

Expand All @@ -72,6 +72,6 @@ To check the backfilling status, click **Domain Services Health** and verify the

## Next steps

To configure onPremisesExtensionAttributes or directory extensions for cloud-only users in Microsoft Entra ID, see [Custom data options in Microsoft Graph](/graph/extensibility-overview?tabs=http#custom-data-options-in-microsoft-graph).
To configure onPremisesExtensionAttributes or directory extensions for cloud-only users in Microsoft Entra ID, see [Custom data options in Microsoft Graph](/graph/extensibility-overview?tabs=http#custom-data-options-in-microsoft-graph).

To sync onPremisesExtensionAttributes or directory extensions from on-premises to Microsoft Entra ID, [configure Microsoft Entra Connect](../active-directory/hybrid/connect/how-to-connect-sync-feature-directory-extensions.md).
To sync onPremisesExtensionAttributes or directory extensions from on-premises to Microsoft Entra ID, [configure Microsoft Entra Connect](/azure/active-directory/hybrid/connect/how-to-connect-sync-feature-directory-extensions).
Original file line number Diff line number Diff line change
Expand Up @@ -49,8 +49,8 @@ To complete this article, you need the following resources and privileges:
* Install and configure Azure AD PowerShell.
* If needed, follow the instructions to [install the Azure AD PowerShell module and connect to Microsoft Entra ID](/powershell/azure/active-directory/install-adv2).
* Make sure that you sign in to your Microsoft Entra tenant using the [Connect-AzureAD][Connect-AzureAD] cmdlet.
* You need [Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator) and [Groups Administrator](../active-directory/roles/permissions-reference.md#groups-administrator) Microsoft Entra roles in your tenant to enable Domain Services.
* You need [Domain Services Contributor](../role-based-access-control/built-in-roles.md#contributor) Azure role to create the required Domain Services resources.
* You need [Application Administrator](/azure/active-directory/roles/permissions-reference#application-administrator) and [Groups Administrator](/azure/active-directory/roles/permissions-reference#groups-administrator) Microsoft Entra roles in your tenant to enable Domain Services.
* You need [Domain Services Contributor](/azure/role-based-access-control/built-in-roles#contributor) Azure role to create the required Domain Services resources.

## Sign in to the Microsoft Entra admin center

Expand Down Expand Up @@ -148,8 +148,8 @@ Before you start, make sure you understand the [network considerations and recom
1. Create the hybrid connectivity to your on-premises network to Azure using an Azure VPN or Azure ExpressRoute connection. The hybrid network configuration is beyond the scope of this documentation, and may already exist in your environment. For details on specific scenarios, see the following articles:
* [Azure Site-to-Site VPN](../vpn-gateway/vpn-gateway-about-vpngateways.md).
* [Azure ExpressRoute Overview](../expressroute/expressroute-introduction.md).
* [Azure Site-to-Site VPN](/azure/vpn-gateway/vpn-gateway-about-vpngateways).
* [Azure ExpressRoute Overview](/azure/expressroute/expressroute-introduction).
> [!IMPORTANT]
> If you create the connection directly to your managed domain's virtual network, use a separate gateway subnet. Don't create the gateway in the managed domain's subnet.
Expand Down Expand Up @@ -262,7 +262,7 @@ You should have Windows Server virtual machine joined to the managed domain reso
1. Connect to the Windows Server VM joined to the managed domain using Remote Desktop and your managed domain administrator credentials. If you get a Network Level Authentication (NLA) error, check the user account you used is not a domain user account.

> [!TIP]
> To securely connect to your VMs joined to Microsoft Entra Domain Services, you can use the [Azure Bastion Host Service](../bastion/bastion-overview.md) in supported Azure regions.
> To securely connect to your VMs joined to Microsoft Entra Domain Services, you can use the [Azure Bastion Host Service](/azure/bastion/bastion-overview) in supported Azure regions.
1. Open a command prompt and use the `whoami` command to show the distinguished name of the currently authenticated user:

Expand Down Expand Up @@ -290,7 +290,7 @@ Using the Windows Server VM joined to the managed domain, you can test the scena
1. Connect to the Windows Server VM joined to the managed domain using Remote Desktop and your managed domain administrator credentials. If you get a Network Level Authentication (NLA) error, check the user account you used is not a domain user account.

> [!TIP]
> To securely connect to your VMs joined to Microsoft Entra Domain Services, you can use the [Azure Bastion Host Service](../bastion/bastion-overview.md) in supported Azure regions.
> To securely connect to your VMs joined to Microsoft Entra Domain Services, you can use the [Azure Bastion Host Service](/azure/bastion/bastion-overview) in supported Azure regions.

1. Open **Windows Settings**, then search for and select **Network and Sharing Center**.
1. Choose the option for **Change advanced sharing** settings.
Expand Down Expand Up @@ -411,14 +411,14 @@ For more conceptual information about forest types in Domain Services, see [How

<!-- INTERNAL LINKS -->
[concepts-trust]: concepts-forest-trust.md
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
[create-azure-ad-tenant]: /azure/active-directory/fundamentals/sign-up-organization
[associate-azure-ad-tenant]: /azure/active-directory/fundamentals/how-subscriptions-associated-directory
[create-azure-ad-ds-instance-advanced]: tutorial-create-instance-advanced.md
[Connect-AzAccount]: /powershell/module/az.accounts/connect-azaccount
[Connect-AzureAD]: /powershell/module/azuread/connect-azuread
[New-AzResourceGroup]: /powershell/module/az.resources/new-azresourcegroup
[network-peering]: ../virtual-network/virtual-network-peering-overview.md
[New-AzureADServicePrincipal]: /powershell/module/AzureAD/New-AzureADServicePrincipal
[network-peering]: /azure/virtual-network/virtual-network-peering-overview
[New-AzureADServicePrincipal]: /powershell/module/azuread/new-azureadserviceprincipal
[Get-AzureRMSubscription]: /powershell/module/azurerm.profile/get-azurermsubscription
[Install-Script]: /powershell/module/powershellget/install-script

Expand Down
4 changes: 2 additions & 2 deletions articles/active-directory-domain-services/create-gmsa.md
Original file line number Diff line number Diff line change
Expand Up @@ -98,8 +98,8 @@ Applications and services can now be configured to use the gMSA as needed.
For more information about gMSAs, see [Getting started with group managed service accounts][gmsa-start].

<!-- INTERNAL LINKS -->
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
[create-azure-ad-tenant]: /azure/active-directory/fundamentals/sign-up-organization
[associate-azure-ad-tenant]: /azure/active-directory/fundamentals/how-subscriptions-associated-directory
[create-azure-ad-ds-instance]: tutorial-create-instance.md
[tutorial-create-management-vm]: tutorial-create-management-vm.md
[create-custom-ou]: create-ou.md
Expand Down
4 changes: 2 additions & 2 deletions articles/active-directory-domain-services/create-ou.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,8 +89,8 @@ For more information on using the administrative tools or creating and using ser
* [Service Accounts Step-by-Step Guide](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd548356(v=ws.10))

<!-- INTERNAL LINKS -->
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
[associate-azure-ad-tenant]: ../active-directory/fundamentals/how-subscriptions-associated-directory.md
[create-azure-ad-tenant]: /azure/active-directory/fundamentals/sign-up-organization
[associate-azure-ad-tenant]: /azure/active-directory/fundamentals/how-subscriptions-associated-directory
[create-azure-ad-ds-instance]: tutorial-create-instance.md
[tutorial-create-management-vm]: tutorial-create-management-vm.md
[connect-windows-server-vm]: join-windows-vm.md#connect-to-the-windows-server-vm
2 changes: 1 addition & 1 deletion articles/active-directory-domain-services/delete-aadds.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ This article shows you how to use the Microsoft Entra admin center to delete a m

To delete a managed domain, complete the following steps:

1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator).
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
1. Search for and select **Microsoft Entra Domain Services**.
1. Select the name of your managed domain, such as *aaddscontoso.com*.
1. On the **Overview** page, select **Delete**. To confirm the deletion, type the domain name of the managed domain again, then select **Delete**.
Expand Down
Loading

0 comments on commit 21a6078

Please sign in to comment.