Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
tynevi committed Mar 3, 2017
2 parents b4f3186 + 976b745 commit 77505ad
Show file tree
Hide file tree
Showing 98 changed files with 1,141 additions and 846 deletions.
2 changes: 1 addition & 1 deletion .acrolinx-config.edn
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{:allowed-branch-names ["master" "release-disks" "release-network-watcher" "release-azure-stack-tp3" "release-iot-hub" "release-digital-marketing-scenario" "release-pilot-cli-ga" "release-pilot-cli"]
{:allowed-branchname-matches ["master" "release-.*"]
:allowed-filename-matches ["articles" "includes"]

:template-header
Expand Down
5 changes: 2 additions & 3 deletions articles/active-directory/TOC.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@
### [Set up self-service groups](active-directory-accessmanagement-self-service-group-management.md)
### [Troubleshoot](active-directory-accessmanagement-troubleshooting.md)

## [Manage reports](active-directory-view-access-usage-reports.md)
## [Manage reports](active-directory-reporting-azure-portal.md)
### [Sign-ins activity](active-directory-reporting-activity-sign-ins.md)
### [Audit activity](active-directory-reporting-activity-audit-logs.md)
### [Users at risk](active-directory-reporting-security-user-at-risk.md)
Expand All @@ -88,11 +88,10 @@
#### [Prerequisites](active-directory-reporting-api-prerequisites.md)
#### [Sign-in reference](active-directory-reporting-api-sign-in-activity-reference.md)
#### [Sign-in samples](active-directory-reporting-api-sign-in-activity-samples.md)
### Classic portal
### [Classic portal](active-directory-view-access-usage-reports.md)
#### [Azure AD reporting](active-directory-reporting-getting-started.md)
#### [Reporting guide](active-directory-reporting-guide.md)
#### [Known networks](active-directory-known-networks.md)
#### [Preview](active-directory-reporting-azure-portal.md)
#### [API](active-directory-reporting-api-getting-started.md)
#### [Audit events](active-directory-reporting-audit-events.md)
#### [Latencies](active-directory-reporting-latencies.md)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ ms.workload: identity
ms.tgt_pltfrm: na
ms.devlang: na
ms.topic: article
ms.date: 02/23/2017
ms.date: 03/02/2017
ms.author: femila

---
Expand Down Expand Up @@ -43,6 +43,7 @@ The following administrator roles are available:
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Company Administrator". It is "Global Administrator" in the [Azure portal](https://portal.azure.com).
>
>
* **Compliance administrator**:Users with this role have management permissions within in the Office 365 Security & Compliance Center and Exchange Admin Center, and access to read audit logs in the Office 365 Admin Center. More information at “[About Office 365 admin roles](https://microsoft.sharepoint.com/teams/adiamteam/_layouts/15/WopiFrame.aspx?sourcedoc={dae8d6f3-5990-46a2-b12b-4c0e561bc7cc}&action=view&wdAccPdf=1).”

* **CRM service administrator**: Users with this role have global permissions within Microsoft CRM Online, when the service is present. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d).
Expand Down
10 changes: 8 additions & 2 deletions articles/active-directory/active-directory-assign-admin-roles.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ ms.workload: identity
ms.tgt_pltfrm: na
ms.devlang: na
ms.topic: article
ms.date: 02/23/2017
ms.date: 03/02/2017
ms.author: curtand

---
Expand All @@ -35,7 +35,9 @@ The following administrator roles are available:
> In Microsoft Graph API, Azure AD Graph API, and Azure AD PowerShell, this role is identified as "Company Administrator". It is "Global Administrator" in the [Azure portal](https://portal.azure.com).
>
>
* **Compliance administrator**:
* **Compliance administrator**:Users with this role have management permissions within in the Office 365 Security & Compliance Center and Exchange Admin Center, and access to read audit logs in the Office 365 Admin Center. More information at “[About Office 365 admin roles](https://microsoft.sharepoint.com/teams/adiamteam/_layouts/15/WopiFrame.aspx?sourcedoc={dae8d6f3-5990-46a2-b12b-4c0e561bc7cc}&action=view&wdAccPdf=1).”

* **CRM service administrator**: Users with this role have global permissions within Microsoft CRM Online, when the service is present. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d?ui=en-US&rs=en-US&ad=US).”
* **Customer LockBox access approver**: When the LockBox service is enabled, users with this role can approve requests for Microsoft engineers to access company information. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d?ui=en-US&rs=en-US&ad=US).”
* **Device administrators**: Users with this role become Administrators on all Windows 10 devices that are joined to Azure Active Directory.”
Expand All @@ -46,12 +48,16 @@ The following administrator roles are available:
* **Intune service administrator**: Users with this role have global permissions within Microsoft Intune Online, when the service is present. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d?ui=en-US&rs=en-US&ad=US).
* **Skype for Business service administrator**: Users with this role have global permissions within Microsoft Skype for Business, when the service is present. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d?ui=en-US&rs=en-US&ad=US). This role was referred to previously as the **Lync service administrator** role.
* **Guest inviter**: Users in this role can manage guest invitations. It does not include any other permissions.
* **Mailbox Administrator**: This role is used only for Exchange Online email support for RIM Blackberry devices. If your organization does not use Exchange Online email on RIM Blackberry devices, do not use this role.
* **Partner Tier 1 Support**: Do not use. This role has been deprecated and will be removed from Azure AD in the future. This role is intended for use by a small number of Microsoft resale partners, and is not intended for general use.
* **Partner Tier 2 Support**: Do not use. This role has been deprecated and will be removed from Azure AD in the future. This role is intended for use by a small number of Microsoft resale partners, and is not intended for general use.
* **Password administrator/Helpdesk administrator**: Resets passwords, manages service requests, and monitors service health. Password administrators can reset passwords only for users and other password administrators.

> [!NOTE]
> In Microsoft Graph API, Azure AD Graph API and Azure AD PowerShell, this role is identified as "Helpdesk Administrator".
>
>
* **Power BI service administrator**: Users with this role have global permissions within Microsoft Power BI, when the service is present. More information at [Making It Easier To Administer Power BI](https://powerbi.microsoft.com/en-us/blog/making-it-easier-to-administer-power-bi/).
* **Privileged role administrator**: Users with this role can manage Azure AD [Privileged Identity Management](active-directory-privileged-identity-management-configure.md) and update role assignments for other users.
* **SharePoint service administrator**: Users with this role have global permissions within Microsoft SharePoint Online, when the service is present. More information at [About Office 365 admin roles](https://support.office.com/article/About-Office-365-admin-roles-da585eea-f576-4f55-a1e0-87090b6aaa9d?ui=en-US&rs=en-US&ad=US).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -257,13 +257,19 @@ You can also verify the service was installed correctly by opening Event Viewer,
![][023]

### Step 3: Configure your firewall
After you have enabled Password Writeback, you need to make sure the machine running Azure AD Connect can reach Microsoft cloud services to receive password writeback requests. This step involves updating the connection rules in your network appliances (proxy servers, firewalls etc.) to allow outbound connections to certain Microsoft-owned URLs and IP addresses over specific network ports. These changes may vary based on the version of Azure AD Connect tool. For more context, you can read more about [how password writeback works](active-directory-passwords-learn-more.md#how-password-writeback-works) and [the password writeback security model](active-directory-passwords-learn-more.md#password-writeback-security-model).
After you have enabled Password Writeback, you need to make sure the machine running Azure AD Connect can reach Microsoft cloud services to receive password writeback requests. This step involves updating the connection rules in your network appliances (proxy servers, firewalls etc.) to allow outbound connections to certain [Microsoft-owned URLs and IP addresses](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2?ui=en-US&rs=en-US&ad=US) over specific network ports. These changes may vary based on the version of Azure AD Connect tool. For more context, you can read more about [how password writeback works](active-directory-passwords-learn-more.md#how-password-writeback-works) and [the password writeback security model](active-directory-passwords-learn-more.md#password-writeback-security-model).

#### Why do I need to do this?

In order for Password Writeback to function properly, the machine running Azure AD Connect needs to be able to establish outbound HTTPS connections to **.servicebus.windows.net* and specific IP address used by Azure, as defined in the [Microsoft Azure Datacenter IP Ranges list](https://www.microsoft.com/download/details.aspx?id=41653).

For Azure AD Connect tool versions 1.0.8667.0 and above:
For Azure AD Connect tool **1.1.439.0** (latest) and above:

- The latest version of the Azure AD Connect tool will need **outbound HTTPS** access to:
- *passwordreset.microsoftonline.com*
- *servicbus.windows.net*

For Azure AD Connect tool versions **1.0.8667.0** to **1.1.380.0**:

- **Option 1:** Allow all outbound HTTPS connections over port 443 (using URL or IP Address).
- When to use this:
Expand Down Expand Up @@ -292,6 +298,9 @@ For Azure AD Connect tool versions 1.0.8667.0 and above:
Once the network appliances have been configured, reboot the machine running Azure AD Connect tool.

#### Idle connections on Azure AD Connect (1.1.439.0 and up)
The Azure AD Connect tool will send periodic pings/keepalives to ServiceBus endpoints to ensure that the connections stay alive. Should the tool detect that too many connections are being killed, it will automatically increase the frequency of pings to the endpoint. The lowest 'ping intervals' will drop to is 1 ping every 60 seconds, however, **we strongly advise that proxies/firewalls allow idle connections to persist for at least 2-3 minutes.** \*For older versions, we suggest 4 minutes or more.

### Step 4: Set up the appropriate Active Directory permissions
For every forest that contains users whose passwords will be reset, if X is the account that was specified for that forest in the configuration wizard (during initial configuration), then X must be given the **Reset Password**, **Change Password**, **Write Permissions** on `lockoutTime`, and **Write Permissions** on `pwdLastSet`, extended rights on the root object of each domain in that forest. The right should be marked as inherited by all user objects.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,15 +36,15 @@ For permissions information, see the [permissions required for an upgrade](activ
> After you've enabled your new Azure AD Connect server to start synchronizing changes to Azure AD, you must not roll back to using DirSync or Azure AD Sync. Downgrading from Azure AD Connect to legacy clients, including DirSync and Azure AD Sync, isn't supported and can lead to issues such as data loss in Azure AD.
## In-place upgrade
An in-place upgrade works for moving from Azure AD Sync or Azure AD Connect. It won't work for moving from DirSync or for a solution with Forefront Identity Manager (FIM) + Azure AD Connector.
An in-place upgrade works for moving from Azure AD Sync or Azure AD Connect. It doesn't work for moving from DirSync or for a solution with Forefront Identity Manager (FIM) + Azure AD Connector.

This method is preferred when you have a single server and less than about 100,000 objects. If there are any changes to the out-of-box sync rules, a full import and full synchronization occur after the upgrade. This ensures that the new configuration is applied to all existing objects in the system. This might take a few hours, depending on the number of objects that are in scope of the sync engine. The normal delta synchronization scheduler (which synchronizes every 30 minutes by default) is suspended, but password synchronization continues. You might consider doing the in-place upgrade during a weekend. If there are no changes to the out-of-box configuration with the new Azure AD Connect release, then a normal delta import/sync will start instead.
This method is preferred when you have a single server and less than about 100,000 objects. If there are any changes to the out-of-box sync rules, a full import and full synchronization occur after the upgrade. This method ensures that the new configuration is applied to all existing objects in the system. This run might take a few hours, depending on the number of objects that are in scope of the sync engine. The normal delta synchronization scheduler (which synchronizes every 30 minutes by default) is suspended, but password synchronization continues. You might consider doing the in-place upgrade during a weekend. If there are no changes to the out-of-box configuration with the new Azure AD Connect release, then a normal delta import/sync starts instead.
![In-place upgrade](./media/active-directory-aadconnect-upgrade-previous-version/inplaceupgrade.png)

If you've made changes to the out-of-box synchronization rules, these will be set back to the default configuration on upgrade. To make sure that your configuration is kept between upgrades, make sure that you make changes as they're described in [Best practices for changing the default configuration](active-directory-aadconnectsync-best-practices-changing-default-configuration.md).
If you've made changes to the out-of-box synchronization rules, then these rules are set back to the default configuration on upgrade. To make sure that your configuration is kept between upgrades, make sure that you make changes as they're described in [Best practices for changing the default configuration](active-directory-aadconnectsync-best-practices-changing-default-configuration.md).

## Swing migration
If you have a complex deployment or many objects, it might be impractical to do an in-place upgrade on the live system. For some customers, this might take multiple days--and during this time, no delta changes will be processed. You can also use this method when you plan to make substantial changes to your configuration and you want to try them out before they're pushed to the cloud.
If you have a complex deployment or many objects, it might be impractical to do an in-place upgrade on the live system. For some customers, this process might take multiple days--and during this time, no delta changes are processed. You can also use this method when you plan to make substantial changes to your configuration and you want to try them out before they're pushed to the cloud.

The recommended method for these scenarios is to use a swing migration. You need (at least) two servers--one active server and one staging server. The active server (shown with solid blue lines in the following picture) is responsible for the active production load. The staging server (shown with dashed purple lines) is prepared with the new release or configuration. When it's fully ready, this server is made active. The previous active server, which now has the old version or configuration installed, is made into the staging server and is upgraded.

Expand All @@ -66,9 +66,9 @@ These steps also work to move from Azure AD Sync or a solution with FIM + Azure
7. If you're upgrading Azure AD Connect, upgrade the server that's now in staging mode to the latest release. Follow the same steps as before to get the data and configuration upgraded. If you upgraded from Azure AD Sync, you can now turn off and decommission your old server.

### Move a custom configuration from the active server to the staging server
If you've made configuration changes to the active server, you need to make sure that the same changes are applied to the staging server.
If you've made configuration changes to the active server, you need to make sure that the same changes are applied to the staging server. To help with this move, you can use the [Azure AD Connect configuration documenter](https://github.com/Microsoft/AADConnectConfigDocumenter).

You can move the custom sync rules that you've created by using PowerShell. You must apply other changes the same way on both systems, and you can't migrate the changes.
You can move the custom sync rules that you've created by using PowerShell. You must apply other changes the same way on both systems, and you can't migrate the changes. The [configuration documenter](https://github.com/Microsoft/AADConnectConfigDocumenter) can help you comparing the two systems to make sure they are identical. The tool can also help in automating the steps found in this section.

You need to configure the following things the same way on both servers:

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,8 @@ Select one of the tasks and click **Next** to continue.

> [!IMPORTANT]
> While you have the installation wizard open, all operations in the sync engine are suspended. Make sure you close the installation wizard as soon as you have completed your configuration changes.
>
>
>
>
## View current configuration
This option gives you a quick view of your currently configured options.
Expand Down Expand Up @@ -77,7 +77,7 @@ To change the state, select this option and select or unselect the checkbox.
## Change user sign-in
This option allows you to change from password sync to federation or the other way around. You cannot change to **do not configure**.

For more information on this option, see [user sign-in](active-directory-aadconnect-user-signin.md#changing-user-sign-in-method).
For more information on this option, see [user sign-in](active-directory-aadconnect-user-signin.md#changing-the-user-sign-in-method).

## Next steps
* Learn more about the configuration model used by Azure AD Connect sync in [Understanding Declarative Provisioning](active-directory-aadconnectsync-understanding-declarative-provisioning.md).
Expand All @@ -86,4 +86,3 @@ For more information on this option, see [user sign-in](active-directory-aadconn

* [Azure AD Connect sync: Understand and customize synchronization](active-directory-aadconnectsync-whatis.md)
* [Integrating your on-premises identities with Azure Active Directory](active-directory-aadconnect.md)

Loading

0 comments on commit 77505ad

Please sign in to comment.