You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md
+14-12Lines changed: 14 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: article
16
-
ms.date: 09/21/2016
16
+
ms.date: 01/20/2016
17
17
ms.author: maheshu
18
18
19
19
---
@@ -28,43 +28,45 @@ To perform the tasks listed in this article, you need:
28
28
3.**Azure AD Domain Services** must be enabled for the Azure AD directory. If you haven't done so, follow all the tasks outlined in the [Getting Started guide](active-directory-ds-getting-started.md).
29
29
4. A **certificate to be used to enable secure LDAP**.
30
30
31
-
***Recommended** - Obtain a certificate from your enterprise CA or public certification authority. This configuration option is more secure.
31
+
***Recommended** - Obtain a certificate from a trusted public certification authority. This configuration option is more secure.
32
32
* Alternately, you may also choose to [create a self-signed certificate](#task-1---obtain-a-certificate-for-secure-ldap) as shown later in this article.
33
33
34
34
<br>
35
35
36
36
### Requirements for the secure LDAP certificate
37
37
Acquire a valid certificate per the following guidelines, before you enable secure LDAP. You encounter failures if you try to enable secure LDAP for your managed domain with an invalid/incorrect certificate.
38
38
39
-
1.**Trusted issuer** - The certificate must be issued by an authority trusted by computers that need to connect to the domain using secure LDAP. This authority may be your organization's enterprise certification authority or a public certification authority trusted by these computers.
39
+
1.**Trusted issuer** - The certificate must be issued by an authority trusted by computers that need to connect to the domain using secure LDAP. This authority may be a public certification authority trusted by these computers.
40
40
2.**Lifetime** - The certificate must be valid for at least the next 3-6 months. Secure LDAP access to your managed domain is disrupted when the certificate expires.
41
41
3.**Subject name** - The subject name on the certificate must be a wildcard for your managed domain. For instance, if your domain is named 'contoso100.com', the certificate's subject name must be '*.contoso100.com'. Set the DNS name (subject alternate name) to this wildcard name.
42
42
4.**Key usage** - The certificate must be configured for the following uses - Digital signatures and key encipherment.
43
43
5.**Certificate purpose** - The certificate must be valid for SSL server authentication.
44
44
45
+
> [!NOTE]
46
+
> **Enterprise Certification Authorities:** Azure AD Domain Services does not currently support using secure LDAP certificates issued by your organization's enterprise certification authority. This restriction is because the service does not trust your enterprise CA as a root certification authority. We expect to add support for enterprise CAs in the future. If you absolutely must use certificates issued by your enterprise CA, [contact us](active-directory-ds-contact-us.md) for assistance.
47
+
>
48
+
>
49
+
45
50
<br>
46
51
47
52
## Task 1 - Obtain a certificate for secure LDAP
48
53
The first task involves obtaining a certificate used for secure LDAP access to the managed domain. You have two options:
49
54
50
-
* Obtain a certificate from a certification authority. The authority may be your organization's enterprise CA or a public certification authority.
55
+
* Obtain a certificate from a certification authority. The authority may be a public certification authority.
51
56
* Create a self-signed certificate.
52
57
53
58
### Option A (Recommended) - Obtain a secure LDAP certificate from a certification authority
54
-
If your organization deploys an enterprise public key infrastructure (PKI), you need to obtain a certificate from the enterprise certification authority (CA) for your organization. If your organization obtains its certificates from a public certification authority, you need to obtain the secure LDAP certificate from that public certification authority.
59
+
If your organization obtains its certificates from a public certification authority, you need to obtain the secure LDAP certificate from that public certification authority.
55
60
56
61
When requesting a certificate, ensure that you follow the requirements outlined in [Requirement for the secure LDAP certificate](#requirements-for-the-secure-ldap-certificate).
57
62
58
63
> [!NOTE]
59
-
> Client computers that need to connect to the managed domain using secure LDAP must trust the issuer of the LDAPS certificate.
64
+
> Client computers that need to connect to the managed domain using secure LDAP must trust the issuer of the secure LDAP certificate.
60
65
>
61
66
>
62
67
63
68
### Option B - Create a self-signed certificate for secure LDAP
64
-
You may choose to create a self-signed certificate for secure LDAP, if:
65
-
66
-
* certificates in your organization are not issued by an enterprise certification authority or
67
-
* you do not expect to use a certificate from a public certification authority.
69
+
If you do not expect to use a certificate from a public certification authority, you may choose to create a self-signed certificate for secure LDAP.
68
70
69
71
**Create a self-signed certificate using PowerShell**
70
72
@@ -81,7 +83,7 @@ In the preceding sample, replace 'contoso100.com' with the DNS domain name of yo
81
83
The newly created self-signed certificate is placed in the local machine's certificate store.
82
84
83
85
## Task 2 - Export the secure LDAP certificate to a .PFX file
84
-
Before you start this task, ensure that you have obtained the secure LDAP certificate from your enterprise certification authority or a public certification authority or have created a self-signed certificate.
86
+
Before you start this task, ensure that you have obtained the secure LDAP certificate from a public certification authority or have created a self-signed certificate.
85
87
86
88
Perform the following steps, to export the LDAPS certificate to a .PFX file.
87
89
@@ -170,7 +172,7 @@ To enable secure LDAP, perform the following configuration steps:
> It takes about 10 to 15 minutes to enable secure LDAP for your managed domain. If the provided secure LDAP certificate does not match the required criteria, secure LDAP is not enabled for your directory and you see a failure. For example, the domain name is incorrect, the certificate is expired or expires soon etc.
175
+
> It takes about 10 to 15 minutes to enable secure LDAP for your managed domain. If the provided secure LDAP certificate does not match the required criteria, secure LDAP is not enabled for your directory and you see a failure. For example, the domain name is incorrect, the certificate has already expired or expires soon.
174
176
>
175
177
>
176
178
9. When secure LDAP is successfully enabled for your managed domain, the **Pending...** message should disappear. You should see the thumbprint of the certificate displayed.
Copy file name to clipboardExpand all lines: articles/active-directory/active-directory-faq.md
+28-1Lines changed: 28 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: identity
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: get-started-article
16
-
ms.date: 10/31/2016
16
+
ms.date: 01/19/2017
17
17
ms.author: markvi
18
18
19
19
---
@@ -41,6 +41,18 @@ In fact, all the users you have enabled for Microsoft Online services are define
41
41
42
42
Additionally, Azure AD paid services (e.g.: Azure AD basic, Premium, EMS, etc.) complement other Online services such as Office 365 and Microsoft Azure with comprehensive enterprise scale management and security solutions.
43
43
44
+
**Q: Why can I sign-in to the Azure portal but not the classic portal?**
45
+
**A:** The new Azure portal does not require a valid subscription whereas the classic portal does require you to have a valid subscription. If you do not have a subscription, you will not be able to sign-in to the classic portal.
46
+
47
+
**Q:** What are the differences between Subscription Administrator and Directory Administrator?**
48
+
49
+
**A:** By default, you are assigned the Subscription Administrator role when you sign up for Azure. A subscription Administrator can use either a Microsoft account or a work or school account from the directory that the Azure subscription is associated with. This role is authorized to manage services in the Azure portal.
50
+
If others need to sign in and access services using the same subscription, you can add them as co-administrators. This role has the same access privileges as the Service Administrator, but can’t change the association of subscriptions to Azure directories. For additional information on Subscription Administrators see [here.](../billing-add-change-azure-subscription-administrator.md) and [here](active-directory-how-subscriptions-associated-directory.md)
51
+
52
+
Azure AD has a different set of administrative roles to manage the directory and identity-related features. These administrators will have access to various features in the Azure portal or Azure classic portal and, depending on their role, will be able to create or edit users, assign administrative roles to others, reset user passwords, manage user licenses, and manage domains, among other things. For additional information on Azure AD Directory Administrators and their roles see [here.](active-directory-assign-admin-roles.md)
53
+
54
+
55
+
44
56
- - -
45
57
## Getting started with Hybrid Azure AD
46
58
**Q: How can I connect my on-premises directory to Azure AD?**
@@ -92,6 +104,18 @@ For more details, see [Getting started with Password Management](active-director
92
104
93
105
For more answers to password related questions, see [Password Management Frequently Asked Questions](active-directory-passwords-faq.md).
94
106
107
+
**Q: What can I do if I cannot remember my existing Office 365/Azure AD password while trying to change my password?**
108
+
109
+
**A:** For this type of situation there are a couple of options. If your organization has enabled self-service password reset then you can try this. This may or may not work depending on how self-serive password reset has been configured. For more information see [How does the password reset portal work.](active-directory-passwords-learn-more.md#how-does-the-password-reset-portal-work)
110
+
111
+
For Office 365 users, your administrator can reset the password using the steps outlined [here.](https://support.office.com/en-us/article/Admins-Reset-user-passwords-7A5D073B-7FAE-4AA5-8F96-9ECD041ABA9C?ui=en-US&rs=en-US&ad=US)
112
+
113
+
For Azure AD accounts, administrators can reset passwords using one of the following:
114
+
115
+
-[Reset accounts in the Azure portal](active-directory-users-reset-password-azure-portal.md)
116
+
-[Reset accounts in the classic portal](active-directory-create-users-reset-password.md)
**Q: Where can I find a list of applications that are pre-integrated with Azure AD and their capabilities?**
@@ -154,4 +178,7 @@ For more details, see [Securing access to Office 365 and other apps connected to
154
178
155
179
For more information, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](active-directory-saas-app-provisioning.md)
156
180
181
+
**Q: Can I setup a secure LDAP connection with Azure Active Directory?**
182
+
**A:** No. Azure AD does not support using the LDAP protocol.
@@ -54,6 +53,7 @@ To enable your app to authenticate users and get tokens, you'll first need to re
54
53
* Click the application and choose **Manifest** to open the inline manifest editor.
55
54
* Locate the `oauth2AllowImplicitFlow` property. Set its value to `true`.
56
55
* Click **Save** to save the manifest.
56
+
8. Grant permissions across your tenant for your application. Go to Settings -> Properties -> Required Permissions, and click the **Grant Permissions** button in the top bar. Click **Yes** to confirm.
57
57
58
58
## 2. Install ADAL & Configure the SPA
59
59
Now that you have an application in Azure AD, you can install adal.js and write your identity-related code.
When connecting to Azure Analysis Services from Excel or other interfaces such as TOM, AsCmd, ADOMD.NET, you may need to install the latest provider client libraries. Get the latest:
When connecting to an Azure Analysis Services server from Excel or other interfaces such as TOM, AsCmd, ADOMD.NET, you may need to install the latest data providers. To learn more, see [Data providers](analysis-services-data-providers.md).
Copy file name to clipboardExpand all lines: articles/analysis-services/analysis-services-manage-users.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,16 +19,18 @@ ms.author: owend
19
19
20
20
---
21
21
# Manage users in Azure Analysis Services
22
-
In Azure Analysis Services there are two types of users, server administrators and database users.
22
+
In Azure Analysis Services, there are two types of users, server administrators and database users.
23
23
24
24
## Server administrators
25
-
You can use **Analysis Services Admins** in the control blade for your server in Azure portal or Server Properties in SSMS to manage server administrators. Analysis Services Admins are database server administrators with rights for common database administration tasks such as adding and removing databases and managing users. By default, the user that creates the server in Azure portal is automatically added as an Analysis Services Admin.
25
+
You can use **Analysis Services Admins** in the control blade for your server in Azure portal, or Server Properties in SSMS to manage server administrators. Analysis Services Admins are database server administrators with rights for common database administration tasks such as adding and removing databases and managing users. By default, the user that creates the server in Azure portal is automatically added as an Analysis Services Admin.
26
+
27
+

26
28
27
29
You should also know:
28
30
29
31
* Windows Live ID is not a supported identity type for Azure Analysis Services.
30
32
* Analysis Services Admins must be valid Azure Active Directory users.
31
-
* If creating an Azure Analysis Services server via Azure Resource Manager templates, Analysis Services Admins takes a JSON array of users that should be added as admins.
33
+
* If creating an Azure Analysis Services server via Azure Resource Manager templates, Analysis Services Admins takes a JSON array of users that should be added as admins.
32
34
33
35
Analysis Services Admins can be different from Azure resource administrators, which can manage resources for Azure subscriptions. This maintains compatibility with existing XMLA and TMSL manage behaviors in Analysis Services and to allow you to segregate duties between Azure resource management and Analysis Services database management. To view all roles and access types for your Azure Analysis Services resource, use Access control (IAM) on the control blade.
34
36
@@ -40,9 +42,9 @@ Analysis Services Admins can be different from Azure resource administrators, wh
40
42
## Database users
41
43
Database users must be added to database roles. Roles define users and groups that have the same permissions for a database. By default, tabular model databases have a default Users role with Read permissions. To learn more, see [Roles in tabular models](https://msdn.microsoft.com/library/hh213165.aspx).
42
44
43
-
Azure Analysis Services model database users *must be in your Azure Active Directory*. Usernames specified must be by organizational email address or UPN. This is different from on-premises tabular model databases which support users by Windows domain usernames.
45
+
Azure Analysis Services model database users *must be in your Azure Active Directory*. Usernames specified must be by organizational email address or UPN. This is different from on-premises tabular model databases, which support users by Windows domain usernames.
44
46
45
-
You can create database roles, add users and groups to roles, and configure row-level security in SQL Server Data Tools (SSDT) or in SQL Server Management Studio (SSMS). You can also add or remove users to roles by using [Analysis Services PowerShell cmdlets](https://msdn.microsoft.com/library/hh758425.aspx), or by using [Tabular Model Scripting Language](https://msdn.microsoft.com/library/mt614797.aspx) (TMSL).
47
+
You can create database roles, add users and groups to roles, and configure row-level security in SQL Server Data Tools (SSDT) or in SQL Server Management Studio (SSMS). You can also add or remove users to roles by using [Analysis Services PowerShell cmdlets](https://msdn.microsoft.com/library/hh758425.aspx) or by using [Tabular Model Scripting Language](https://msdn.microsoft.com/library/mt614797.aspx) (TMSL).
0 commit comments