Skip to content

Commit 23baced

Browse files
authored
Merge pull request MicrosoftDocs#506 from Microsoft/FromPrivateRepo
From private repo
2 parents 7fbb1cb + 6670824 commit 23baced

File tree

87 files changed

+753
-1082
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+753
-1082
lines changed

articles/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 09/21/2016
16+
ms.date: 01/20/2016
1717
ms.author: maheshu
1818

1919
---
@@ -28,43 +28,45 @@ To perform the tasks listed in this article, you need:
2828
3. **Azure AD Domain Services** must be enabled for the Azure AD directory. If you haven't done so, follow all the tasks outlined in the [Getting Started guide](active-directory-ds-getting-started.md).
2929
4. A **certificate to be used to enable secure LDAP**.
3030

31-
* **Recommended** - Obtain a certificate from your enterprise CA or public certification authority. This configuration option is more secure.
31+
* **Recommended** - Obtain a certificate from a trusted public certification authority. This configuration option is more secure.
3232
* Alternately, you may also choose to [create a self-signed certificate](#task-1---obtain-a-certificate-for-secure-ldap) as shown later in this article.
3333

3434
<br>
3535

3636
### Requirements for the secure LDAP certificate
3737
Acquire a valid certificate per the following guidelines, before you enable secure LDAP. You encounter failures if you try to enable secure LDAP for your managed domain with an invalid/incorrect certificate.
3838

39-
1. **Trusted issuer** - The certificate must be issued by an authority trusted by computers that need to connect to the domain using secure LDAP. This authority may be your organization's enterprise certification authority or a public certification authority trusted by these computers.
39+
1. **Trusted issuer** - The certificate must be issued by an authority trusted by computers that need to connect to the domain using secure LDAP. This authority may be a public certification authority trusted by these computers.
4040
2. **Lifetime** - The certificate must be valid for at least the next 3-6 months. Secure LDAP access to your managed domain is disrupted when the certificate expires.
4141
3. **Subject name** - The subject name on the certificate must be a wildcard for your managed domain. For instance, if your domain is named 'contoso100.com', the certificate's subject name must be '*.contoso100.com'. Set the DNS name (subject alternate name) to this wildcard name.
4242
4. **Key usage** - The certificate must be configured for the following uses - Digital signatures and key encipherment.
4343
5. **Certificate purpose** - The certificate must be valid for SSL server authentication.
4444

45+
> [!NOTE]
46+
> **Enterprise Certification Authorities:** Azure AD Domain Services does not currently support using secure LDAP certificates issued by your organization's enterprise certification authority. This restriction is because the service does not trust your enterprise CA as a root certification authority. We expect to add support for enterprise CAs in the future. If you absolutely must use certificates issued by your enterprise CA, [contact us](active-directory-ds-contact-us.md) for assistance.
47+
>
48+
>
49+
4550
<br>
4651

4752
## Task 1 - Obtain a certificate for secure LDAP
4853
The first task involves obtaining a certificate used for secure LDAP access to the managed domain. You have two options:
4954

50-
* Obtain a certificate from a certification authority. The authority may be your organization's enterprise CA or a public certification authority.
55+
* Obtain a certificate from a certification authority. The authority may be a public certification authority.
5156
* Create a self-signed certificate.
5257

5358
### Option A (Recommended) - Obtain a secure LDAP certificate from a certification authority
54-
If your organization deploys an enterprise public key infrastructure (PKI), you need to obtain a certificate from the enterprise certification authority (CA) for your organization. If your organization obtains its certificates from a public certification authority, you need to obtain the secure LDAP certificate from that public certification authority.
59+
If your organization obtains its certificates from a public certification authority, you need to obtain the secure LDAP certificate from that public certification authority.
5560

5661
When requesting a certificate, ensure that you follow the requirements outlined in [Requirement for the secure LDAP certificate](#requirements-for-the-secure-ldap-certificate).
5762

5863
> [!NOTE]
59-
> Client computers that need to connect to the managed domain using secure LDAP must trust the issuer of the LDAPS certificate.
64+
> Client computers that need to connect to the managed domain using secure LDAP must trust the issuer of the secure LDAP certificate.
6065
>
6166
>
6267
6368
### Option B - Create a self-signed certificate for secure LDAP
64-
You may choose to create a self-signed certificate for secure LDAP, if:
65-
66-
* certificates in your organization are not issued by an enterprise certification authority or
67-
* you do not expect to use a certificate from a public certification authority.
69+
If you do not expect to use a certificate from a public certification authority, you may choose to create a self-signed certificate for secure LDAP.
6870

6971
**Create a self-signed certificate using PowerShell**
7072

@@ -81,7 +83,7 @@ In the preceding sample, replace 'contoso100.com' with the DNS domain name of yo
8183
The newly created self-signed certificate is placed in the local machine's certificate store.
8284

8385
## Task 2 - Export the secure LDAP certificate to a .PFX file
84-
Before you start this task, ensure that you have obtained the secure LDAP certificate from your enterprise certification authority or a public certification authority or have created a self-signed certificate.
86+
Before you start this task, ensure that you have obtained the secure LDAP certificate from a public certification authority or have created a self-signed certificate.
8587

8688
Perform the following steps, to export the LDAPS certificate to a .PFX file.
8789

@@ -170,7 +172,7 @@ To enable secure LDAP, perform the following configuration steps:
170172
![Secure LDAP - pending state](./media/active-directory-domain-services-admin-guide/secure-ldap-pending-state.png)
171173

172174
> [!NOTE]
173-
> It takes about 10 to 15 minutes to enable secure LDAP for your managed domain. If the provided secure LDAP certificate does not match the required criteria, secure LDAP is not enabled for your directory and you see a failure. For example, the domain name is incorrect, the certificate is expired or expires soon etc.
175+
> It takes about 10 to 15 minutes to enable secure LDAP for your managed domain. If the provided secure LDAP certificate does not match the required criteria, secure LDAP is not enabled for your directory and you see a failure. For example, the domain name is incorrect, the certificate has already expired or expires soon.
174176
>
175177
>
176178
9. When secure LDAP is successfully enabled for your managed domain, the **Pending...** message should disappear. You should see the thumbprint of the certificate displayed.

articles/active-directory/active-directory-faq.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: get-started-article
16-
ms.date: 10/31/2016
16+
ms.date: 01/19/2017
1717
ms.author: markvi
1818

1919
---
@@ -41,6 +41,18 @@ In fact, all the users you have enabled for Microsoft Online services are define
4141

4242
Additionally, Azure AD paid services (e.g.: Azure AD basic, Premium, EMS, etc.) complement other Online services such as Office 365 and Microsoft Azure with comprehensive enterprise scale management and security solutions.
4343

44+
**Q: Why can I sign-in to the Azure portal but not the classic portal?**
45+
**A:** The new Azure portal does not require a valid subscription whereas the classic portal does require you to have a valid subscription. If you do not have a subscription, you will not be able to sign-in to the classic portal.
46+
47+
**Q:** What are the differences between Subscription Administrator and Directory Administrator?**
48+
49+
**A:** By default, you are assigned the Subscription Administrator role when you sign up for Azure. A subscription Administrator can use either a Microsoft account or a work or school account from the directory that the Azure subscription is associated with. This role is authorized to manage services in the Azure portal.
50+
If others need to sign in and access services using the same subscription, you can add them as co-administrators. This role has the same access privileges as the Service Administrator, but can’t change the association of subscriptions to Azure directories. For additional information on Subscription Administrators see [here.](../billing-add-change-azure-subscription-administrator.md) and [here](active-directory-how-subscriptions-associated-directory.md)
51+
52+
Azure AD has a different set of administrative roles to manage the directory and identity-related features. These administrators will have access to various features in the Azure portal or Azure classic portal and, depending on their role, will be able to create or edit users, assign administrative roles to others, reset user passwords, manage user licenses, and manage domains, among other things. For additional information on Azure AD Directory Administrators and their roles see [here.](active-directory-assign-admin-roles.md)
53+
54+
55+
4456
- - -
4557
## Getting started with Hybrid Azure AD
4658
**Q: How can I connect my on-premises directory to Azure AD?**
@@ -92,6 +104,18 @@ For more details, see [Getting started with Password Management](active-director
92104

93105
For more answers to password related questions, see [Password Management Frequently Asked Questions](active-directory-passwords-faq.md).
94106

107+
**Q: What can I do if I cannot remember my existing Office 365/Azure AD password while trying to change my password?**
108+
109+
**A:** For this type of situation there are a couple of options. If your organization has enabled self-service password reset then you can try this. This may or may not work depending on how self-serive password reset has been configured. For more information see [How does the password reset portal work.](active-directory-passwords-learn-more.md#how-does-the-password-reset-portal-work)
110+
111+
For Office 365 users, your administrator can reset the password using the steps outlined [here.](https://support.office.com/en-us/article/Admins-Reset-user-passwords-7A5D073B-7FAE-4AA5-8F96-9ECD041ABA9C?ui=en-US&rs=en-US&ad=US)
112+
113+
For Azure AD accounts, administrators can reset passwords using one of the following:
114+
115+
- [Reset accounts in the Azure portal](active-directory-users-reset-password-azure-portal.md)
116+
- [Reset accounts in the classic portal](active-directory-create-users-reset-password.md)
117+
- [Using PowerShell](https://docs.microsoft.com/en-us/powershell/msonline/v1/Set-MsolUserPassword?redirectedfrom=msdn)
118+
95119
- - -
96120
## Application access
97121
**Q: Where can I find a list of applications that are pre-integrated with Azure AD and their capabilities?**
@@ -154,4 +178,7 @@ For more details, see [Securing access to Office 365 and other apps connected to
154178

155179
For more information, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](active-directory-saas-app-provisioning.md)
156180

181+
**Q: Can I setup a secure LDAP connection with Azure Active Directory?**
182+
**A:** No. Azure AD does not support using the LDAP protocol.
183+
157184
- - -

articles/active-directory/develop/active-directory-devquickstarts-angular.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ ms.author: dastrock
1818

1919
---
2020
# Securing AngularJS Single Page Apps with Azure AD
21-
[!INCLUDE [active-directory-devquickstarts-switcher](../../../includes/active-directory-devquickstarts-switcher.md)]
2221

2322
[!INCLUDE [active-directory-devguide](../../../includes/active-directory-devguide.md)]
2423

@@ -54,6 +53,7 @@ To enable your app to authenticate users and get tokens, you'll first need to re
5453
* Click the application and choose **Manifest** to open the inline manifest editor.
5554
* Locate the `oauth2AllowImplicitFlow` property. Set its value to `true`.
5655
* Click **Save** to save the manifest.
56+
8. Grant permissions across your tenant for your application. Go to Settings -> Properties -> Required Permissions, and click the **Grant Permissions** button in the top bar. Click **Yes** to confirm.
5757

5858
## 2. Install ADAL & Configure the SPA
5959
Now that you have an application in Azure AD, you can install adal.js and write your identity-related code.

articles/analysis-services/analysis-services-connect.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: NA
1616
ms.workload: na
17-
ms.date: 11/28/2016
17+
ms.date: 01/20/2017
1818
ms.author: owend
1919

2020
---
@@ -77,13 +77,8 @@ Integrated authentication will pick up the Azure Active Directory credential cac
7777
"Provider=MSOLAP;Data Source=<Azure AS instance name>;User ID=<user name>;Password=<password>;Persist Security Info=True; Impersonation Level=Impersonate;";
7878
```
7979

80-
## Client libraries
81-
When connecting to Azure Analysis Services from Excel or other interfaces such as TOM, AsCmd, ADOMD.NET, you may need to install the latest provider client libraries. Get the latest:
82-
83-
[MSOLAP (amd64)](https://go.microsoft.com/fwlink/?linkid=829576)</br>
84-
[MSOLAP (x86)](https://go.microsoft.com/fwlink/?linkid=829575)</br>
85-
[AMO](https://go.microsoft.com/fwlink/?linkid=829578)</br>
86-
[ADOMD](https://go.microsoft.com/fwlink/?linkid=829577)</br>
80+
## Data providers (aka client libraries)
81+
When connecting to an Azure Analysis Services server from Excel or other interfaces such as TOM, AsCmd, ADOMD.NET, you may need to install the latest data providers. To learn more, see [Data providers](analysis-services-data-providers.md).
8782

8883
## Next steps
8984
[Manage your server](analysis-services-manage.md)

articles/analysis-services/analysis-services-create-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: NA
1616
ms.workload: na
17-
ms.date: 11/02/2016
17+
ms.date: 01/20/2017
1818
ms.author: owend
1919

2020
---

articles/analysis-services/analysis-services-data-providers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: NA
1616
ms.workload: na
17-
ms.date: 12/27/2016
17+
ms.date: 01/20/2016
1818
ms.author: owend
1919

2020
---

articles/analysis-services/analysis-services-datasource.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: NA
1616
ms.workload: na
17-
ms.date: 11/28/2016
17+
ms.date: 01/20/2017
1818
ms.author: owend
1919

2020
---

articles/analysis-services/analysis-services-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: NA
1616
ms.workload: na
17-
ms.date: 11/28/2016
17+
ms.date: 01/20/2017
1818
ms.author: owend
1919

2020
---

articles/analysis-services/analysis-services-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: NA
1414
ms.topic: article
1515
ms.tgt_pltfrm: NA
1616
ms.workload: na
17-
ms.date: 10/24/2016
17+
ms.date: 01/20/2017
1818
ms.author: owend
1919

2020
---

articles/analysis-services/analysis-services-manage-users.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,16 +19,18 @@ ms.author: owend
1919

2020
---
2121
# Manage users in Azure Analysis Services
22-
In Azure Analysis Services there are two types of users, server administrators and database users.
22+
In Azure Analysis Services, there are two types of users, server administrators and database users.
2323

2424
## Server administrators
25-
You can use **Analysis Services Admins** in the control blade for your server in Azure portal or Server Properties in SSMS to manage server administrators. Analysis Services Admins are database server administrators with rights for common database administration tasks such as adding and removing databases and managing users. By default, the user that creates the server in Azure portal is automatically added as an Analysis Services Admin.
25+
You can use **Analysis Services Admins** in the control blade for your server in Azure portal, or Server Properties in SSMS to manage server administrators. Analysis Services Admins are database server administrators with rights for common database administration tasks such as adding and removing databases and managing users. By default, the user that creates the server in Azure portal is automatically added as an Analysis Services Admin.
26+
27+
![Server Admins in Azure portal](./media/analysis-services-manage-users/aas-manage-users-admins.png)
2628

2729
You should also know:
2830

2931
* Windows Live ID is not a supported identity type for Azure Analysis Services.
3032
* Analysis Services Admins must be valid Azure Active Directory users.
31-
* If creating an Azure Analysis Services server via Azure Resource Manager templates, Analysis Services Admins takes a JSON array of users that should be added as admins.
33+
* If creating an Azure Analysis Services server via Azure Resource Manager templates, Analysis Services Admins takes a JSON array of users that should be added as admins.
3234

3335
Analysis Services Admins can be different from Azure resource administrators, which can manage resources for Azure subscriptions. This maintains compatibility with existing XMLA and TMSL manage behaviors in Analysis Services and to allow you to segregate duties between Azure resource management and Analysis Services database management. To view all roles and access types for your Azure Analysis Services resource, use Access control (IAM) on the control blade.
3436

@@ -40,9 +42,9 @@ Analysis Services Admins can be different from Azure resource administrators, wh
4042
## Database users
4143
Database users must be added to database roles. Roles define users and groups that have the same permissions for a database. By default, tabular model databases have a default Users role with Read permissions. To learn more, see [Roles in tabular models](https://msdn.microsoft.com/library/hh213165.aspx).
4244

43-
Azure Analysis Services model database users *must be in your Azure Active Directory*. Usernames specified must be by organizational email address or UPN. This is different from on-premises tabular model databases which support users by Windows domain usernames.
45+
Azure Analysis Services model database users *must be in your Azure Active Directory*. Usernames specified must be by organizational email address or UPN. This is different from on-premises tabular model databases, which support users by Windows domain usernames.
4446

45-
You can create database roles, add users and groups to roles, and configure row-level security in SQL Server Data Tools (SSDT) or in SQL Server Management Studio (SSMS). You can also add or remove users to roles by using [Analysis Services PowerShell cmdlets](https://msdn.microsoft.com/library/hh758425.aspx), or by using [Tabular Model Scripting Language](https://msdn.microsoft.com/library/mt614797.aspx) (TMSL).
47+
You can create database roles, add users and groups to roles, and configure row-level security in SQL Server Data Tools (SSDT) or in SQL Server Management Studio (SSMS). You can also add or remove users to roles by using [Analysis Services PowerShell cmdlets](https://msdn.microsoft.com/library/hh758425.aspx) or by using [Tabular Model Scripting Language](https://msdn.microsoft.com/library/mt614797.aspx) (TMSL).
4648

4749
**Sample TMSL script**
4850

0 commit comments

Comments
 (0)