Skip to content

Commit 85b14b5

Browse files
cillroySyntaxC4
authored andcommitted
change back slashes to forward slashes
1 parent b35e4ca commit 85b14b5

File tree

139 files changed

+879
-880
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+879
-880
lines changed

articles/active-directory-domain-services/active-directory-ds-check-health.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Using the health page on your Azure portal, you are able to keep up-to-date on w
2929
3. In the left-hand navigation pane, click **Health**.
3030

3131
The following picture illustrates a sample health page:
32-
![Example health page](.\media\active-directory-domain-services-alerts\health-page.png)
32+
![Example health page](./media/active-directory-domain-services-alerts/health-page.png)
3333

3434
>[!NOTE]
3535
> Your managed domain's health is evaluated every hour. After making changes to your managed domain, wait until the next evaluation cycle to view your managed domain's updated health. The "Last evaluated" timestamp in the top right corner shows when the health of your managed domain was last evaluated.
@@ -40,10 +40,10 @@ The status in the top right of your health page indicates the overall health of
4040

4141
| Status | Icon | Explanation |
4242
| --- | :----: | --- |
43-
| Running | <img src= ".\media\active-directory-domain-services-alerts\running-icon.png" width = "15"> | Your managed domain is running smoothly and does not have any critical or warning alerts. This domain may have informational alerts. |
44-
| Needs attention (Warning) | <img src= ".\media\active-directory-domain-services-alerts\warning-icon.png" width = "15"> | There are no critical alerts on your managed domain, but there are one or more warning alerts that need to be addressed. |
45-
| Needs attention (Critical) | <img src= ".\media\active-directory-domain-services-alerts\critical-icon.png" width = "15"> | There are one or more critical alerts on your managed domain. You may also have warning and/or informational alerts. |
46-
| Deploying | <img src= ".\media\active-directory-domain-services-alerts\deploying-icon.png" width = "15"> | Your domain is in the process of being deployed. |
43+
| Running | <img src= "./media/active-directory-domain-services-alerts/running-icon.png" width = "15"> | Your managed domain is running smoothly and does not have any critical or warning alerts. This domain may have informational alerts. |
44+
| Needs attention (Warning) | <img src= "./media/active-directory-domain-services-alerts/warning-icon.png" width = "15"> | There are no critical alerts on your managed domain, but there are one or more warning alerts that need to be addressed. |
45+
| Needs attention (Critical) | <img src= "./media/active-directory-domain-services-alerts/critical-icon.png" width = "15"> | There are one or more critical alerts on your managed domain. You may also have warning and/or informational alerts. |
46+
| Deploying | <img src= "./media/active-directory-domain-services-alerts/deploying-icon.png" width = "15"> | Your domain is in the process of being deployed. |
4747

4848
## Monitors
4949
Monitors are aspects of your managed domain that Azure AD Domain Services monitors on a regular basis. The best way to keep your monitors in a healthy state is to resolve any active alerts for your managed domain.

articles/active-directory-domain-services/active-directory-ds-mismatched-tenant-error.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.author: ergreenl
2121
# Resolve mismatched directory errors for existing Azure AD Domain Services managed domains
2222
You have an existing Azure AD Domain Services managed domain. When you navigate to the Azure portal and view the managed domain, you see the following error message:
2323

24-
![Mismatched directory error](.\media\getting-started\mismatched-tenant-error.png)
24+
![Mismatched directory error](./media/getting-started/mismatched-tenant-error.png)
2525

2626
You cannot administer this managed domain until the error is resolved.
2727

articles/active-directory-domain-services/active-directory-ds-networking.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The following table illustrates a sample NSG you can configure for a virtual net
9898

9999
Additionally, the NSG also illustrates how to lock down secure LDAP access over the internet. Skip this rule if you have not enabled secure LDAP access to your managed domain over the internet. The NSG contains a set of rules that allow inbound LDAPS access over TCP port 636 only from a specified set of IP addresses. The NSG rule to allow LDAPS access over the internet from specified IP addresses has a higher priority than the DenyAll NSG rule.
100100

101-
![Sample NSG to secure LDAPS access over the internet](.\media\active-directory-domain-services-alerts\default-nsg.png)
101+
![Sample NSG to secure LDAPS access over the internet](./media/active-directory-domain-services-alerts/default-nsg.png)
102102

103103
**More information** - [Create a Network Security Group](../virtual-network/manage-network-security-group.md).
104104

articles/active-directory-domain-services/active-directory-ds-notifications.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ On the page it lists out all of the email recipients for email notifications for
3737

3838
The following picture is an example of an email notification:
3939

40-
![Example email notification](.\media\active-directory-domain-services-alerts\email-alert.png)
40+
![Example email notification](./media/active-directory-domain-services-alerts/email-alert.png)
4141

4242
The email specifies the managed domain that the alert is present on, as well as giving the time of detection and a link to the Azure AD Domain Services health page in the Azure portal.
4343

articles/active-directory-domain-services/active-directory-ds-suspension.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ When Azure Active Directory Domain Services (Azure AD DS) is unable to service a
2424

2525
## States your managed domain can be in
2626

27-
![Suspended domain timeline](media\active-directory-domain-services-suspension\suspension-timeline.PNG)
27+
![Suspended domain timeline](media/active-directory-domain-services-suspension/suspension-timeline.PNG)
2828

2929
The preceding graphic outlines the possible states an Azure AD DS managed domain can be in.
3030

articles/active-directory-domain-services/active-directory-ds-troubleshoot-nsg.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Invalid NSG configurations are the most common cause of network errors for Azure
3838
## Sample NSG
3939
The following table depicts a sample NSG that would keep your managed domain secure while allowing Microsoft to monitor, manage, and update information.
4040

41-
![sample NSG](.\media\active-directory-domain-services-alerts\default-nsg.png)
41+
![sample NSG](./media/active-directory-domain-services-alerts/default-nsg.png)
4242

4343
>[!NOTE]
4444
> Azure AD Domain Services requires unrestricted outbound access from the virtual network. We recommend not to create any additional NSG rule that restricts outbound access for the virtual network.

articles/active-directory/hybrid/how-to-connect-adconnectivitytools.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ On the **Connect your directories** page, in the Azure AD Connect Wizard, if a n
3636
Whenever any of these issues are found, a related error message is displayed in the AADConnect Wizard:
3737

3838

39-
![Error](media\how-to-connect-adconnectivitytools\error1.png)
39+
![Error](media/how-to-connect-adconnectivitytools/error1.png)
4040

4141
For example, when we are attempting to add a directory on the **Connect your directories** screen, Azure AD Connect needs to verify this and expects to be able to communicate with a domain controller over port 389. If it cannot, we will see the error that is shown in the screenshot above.
4242

articles/active-directory/hybrid/tshoot-connect-objectsync.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,14 @@ To run the troubleshooting task in the wizard, perform the following steps:
3131
4. Navigate to the Additional Tasks page, select Troubleshoot, and click Next.
3232
5. On the Troubleshooting page, click Launch to start the troubleshooting menu in PowerShell.
3333
6. In the main menu, select Troubleshoot Object Synchronization.
34-
![](media\tshoot-connect-objectsync\objsynch11.png)
34+
![](media/tshoot-connect-objectsync/objsynch11.png)
3535

3636
### Troubleshooting Input Parameters
3737
The following input parameters are needed by the troubleshooting task:
3838
1. **Object Distinguished Name** – This is the distinguished name of the object that needs troubleshooting
3939
2. **AD Connector Name** – This is the name of the AD forest where the above object resides.
4040
3. Azure AD tenant global administrator credentials
41-
![](media\tshoot-connect-objectsync\objsynch1.png)
41+
![](media/tshoot-connect-objectsync/objsynch1.png)
4242

4343
### Understand the results of the troubleshooting task
4444
The troubleshooting task performs the following checks:
@@ -55,27 +55,27 @@ The rest of this section describes specific results that are returned by the tas
5555
### UPN Suffix is NOT verified with Azure AD Tenant
5656
When UserPrincipalName (UPN)/Alternate Login ID suffix is not verified with the Azure AD Tenant, then Azure Active Directory replaces the UPN suffixes with the default domain name "onmicrosoft.com".
5757

58-
![](media\tshoot-connect-objectsync\objsynch2.png)
58+
![](media/tshoot-connect-objectsync/objsynch2.png)
5959

6060
### Changing UPN Suffix from one federated domain to another federated domain
6161
Azure Active Directory does not allow the synchronization of UserPrincipalName (UPN)/Alternate Login ID suffix change from one federated domain to another federated domain. This applies to domains, that are verified with the Azure AD Tenant and have the Authentication Type as Federated.
6262

63-
![](media\tshoot-connect-objectsync\objsynch3.png)
63+
![](media/tshoot-connect-objectsync/objsynch3.png)
6464

6565
### Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled
6666
When the Azure AD Tenant DirSync Feature ‘SynchronizeUpnForManagedUsers’ is disabled, Azure Active Directory does not allow synchronization updates to UserPrincipalName/Alternate Login ID for licensed user accounts with managed authentication.
6767

68-
![](media\tshoot-connect-objectsync\objsynch4.png)
68+
![](media/tshoot-connect-objectsync/objsynch4.png)
6969

7070
## Object is filtered due to domain filtering
7171
### Domain is not configured to sync
7272
Object is out of scope due to domain not being configured. In the example below, the object is out of sync scope as the domain that it belongs to is filtered from synchronization.
7373

74-
![](media\tshoot-connect-objectsync\objsynch5.png)
74+
![](media/tshoot-connect-objectsync/objsynch5.png)
7575

7676
### Domain is configured to sync but is missing run profiles/run steps
7777
Object is out of scope as the domain is missing run profiles/run steps. In the example below, the object is out of sync scope as the domain that it belongs to is missing run steps for the Full Import run profile.
78-
![](media\tshoot-connect-objectsync\objsynch6.png)
78+
![](media/tshoot-connect-objectsync/objsynch6.png)
7979

8080
## Object is filtered due to OU filtering
8181
The object is out of sync scope due to OU filtering configuration. In the example below, the object belongs to OU=NoSync,DC=bvtadwbackdc,DC=com. This OU is not included in sync scope.</br>
@@ -94,7 +94,7 @@ Due to various differences between on-premises Active Directory and Azure Active
9494
## HTML Report
9595
In addition to analyzing the object, the troubleshooting task also generates an HTML report that has everything known about the object. This HTML report can be shared with support team to do further troubleshooting, if needed.
9696

97-
![](media\tshoot-connect-objectsync\objsynch8.png)
97+
![](media/tshoot-connect-objectsync/objsynch8.png)
9898

9999
## Next steps
100100
Learn more about [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md).

articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md

+15-15
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ To configure the integration of SharePoint on-premises into Azure AD, you need t
7272

7373
4. In the search box, type **SharePoint on-premises**, select **SharePoint on-premises** from result panel then click **Add** button to add the application.
7474

75-
![SharePoint on-premises in the results list](./media\sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_addfromgallery.png)
75+
![SharePoint on-premises in the results list](./media/sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_addfromgallery.png)
7676

7777
## Configure and test Azure AD single sign-on
7878

@@ -100,11 +100,11 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
100100

101101
2. On the **Single sign-on** dialog, select **Mode** as **SAML-based Sign-on** to enable single sign-on.
102102

103-
![Single sign-on dialog box](./media\sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_samlbase.png)
103+
![Single sign-on dialog box](./media/sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_samlbase.png)
104104

105105
3. On the **SharePoint on-premises Domain and URLs** section, perform the following steps:
106106

107-
![SharePoint on-premises Domain and URLs single sign-on information](./media\sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_url1.png)
107+
![SharePoint on-premises Domain and URLs single sign-on information](./media/sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_url1.png)
108108

109109
a. In the **Sign-on URL** textbox, type a URL using the following pattern: `https://<YourSharePointServerURL>/_trust/default.aspx`
110110

@@ -114,21 +114,21 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
114114

115115
4. On the **SAML Signing Certificate** section, click **Certificate (Base64)** and then save the certificate file on your computer.
116116

117-
![The Certificate download link](./media\sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_certificate.png)
117+
![The Certificate download link](./media/sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_certificate.png)
118118

119119
> [!Note]
120120
> Please note down the file path to which you have downloaded the certificate file, as you need to use it later in the PowerShell script for configuration.
121121

122122
5. Click **Save** button.
123123

124-
![Configure Single Sign-On Save button](./media\sharepoint-on-premises-tutorial/tutorial_general_400.png)
124+
![Configure Single Sign-On Save button](./media/sharepoint-on-premises-tutorial/tutorial_general_400.png)
125125

126126
6. On the **SharePoint on-premises Configuration** section, click **Configure SharePoint on-premises** to open **Configure sign-on** window. Copy the **SAML Entity ID** from the **Quick Reference section.** For **Single Sign-On Service URL**, use a value of the following pattern: `https://login.microsoftonline.com/_my_directory_id_/wsfed`
127127

128128
> [!Note]
129129
> _my_directory_id_ is the tenant id of Azure Ad subscription.
130130
131-
![SharePoint on-premises Configuration](./media\sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_configure.png)
131+
![SharePoint on-premises Configuration](./media/sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_configure.png)
132132

133133
> [!NOTE]
134134
> Sharepoint On-Premises application uses SAML 1.1 token, so Azure AD expects WS Fed request from SharePoint server and after authentication, it issues the SAML 1.1. token.
@@ -167,7 +167,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
167167

168168
e. Click **OK**.
169169

170-
![Configuring your authentication provider](./media\sharepoint-on-premises-tutorial/fig10-configauthprovider.png)
170+
![Configuring your authentication provider](./media/sharepoint-on-premises-tutorial/fig10-configauthprovider.png)
171171

172172
> [!NOTE]
173173
> Some of the external users will not able to use this single sign-on integration as their UPN will have mangled value something like `MYEMAIL_outlook.com#ext#@TENANT.onmicrosoft.com`. Soon we will allow customers app config on how to handle the UPN depending on the user type. After that all your guest users should be able to use SSO seamlessly as the organization employees.
@@ -182,19 +182,19 @@ The objective of this section is to create a test user in the Azure portal calle
182182

183183
1. In the Azure portal, in the left pane, click the **Azure Active Directory** button.
184184

185-
![The Azure Active Directory button](./media\sharepoint-on-premises-tutorial/create_aaduser_01.png)
185+
![The Azure Active Directory button](./media/sharepoint-on-premises-tutorial/create_aaduser_01.png)
186186

187187
2. To display the list of users, go to **Users and groups**, and then click **All users**.
188188

189-
![The "Users and groups" and "All users" links](./media\sharepoint-on-premises-tutorial/create_aaduser_02.png)
189+
![The "Users and groups" and "All users" links](./media/sharepoint-on-premises-tutorial/create_aaduser_02.png)
190190

191191
3. To open the **User** dialog box, click **Add** at the top of the **All Users** dialog box.
192192

193-
![The Add button](./media\sharepoint-on-premises-tutorial/create_aaduser_03.png)
193+
![The Add button](./media/sharepoint-on-premises-tutorial/create_aaduser_03.png)
194194

195195
4. In the **User** dialog box, perform the following steps:
196196

197-
![The User dialog box](./media\sharepoint-on-premises-tutorial/create_aaduser_04.png)
197+
![The User dialog box](./media/sharepoint-on-premises-tutorial/create_aaduser_04.png)
198198

199199
a. In the **Name** box, type **BrittaSimon**.
200200

@@ -216,7 +216,7 @@ The users who will log into Azure AD and access SharePoint must be granted acces
216216

217217
4. In Policy for Web Application, click **Add Users**.
218218

219-
![Searching for a user by their name claim](./media\sharepoint-on-premises-tutorial/fig11-searchbynameclaim.png)
219+
![Searching for a user by their name claim](./media/sharepoint-on-premises-tutorial/fig11-searchbynameclaim.png)
220220

221221
5. In the **Add Users** dialog box, click the appropriate zone in **Zones**, and then click **Next**.
222222

@@ -228,7 +228,7 @@ The users who will log into Azure AD and access SharePoint must be granted acces
228228

229229
9. In Permissions, click **Full Control**.
230230

231-
![Granting full control to a claims user](./media\sharepoint-on-premises-tutorial/fig12-grantfullcontrol.png)
231+
![Granting full control to a claims user](./media/sharepoint-on-premises-tutorial/fig12-grantfullcontrol.png)
232232

233233
10. Click **Finish**, and then click **OK**.
234234

@@ -259,7 +259,7 @@ The configuration works for a single web application, but needs additional confi
259259

260260
Users can now log into SharePoint 2016 using identities from Azure AD, but there are still opportunities for improvement to the user experience. For instance, searching for a user presents multiple search results in the people picker. There is a search result for each of the 3 claim types that were created in the claim mapping. To choose a user using the people picker, you must type their user name exactly and choose the **name** claim result.
261261

262-
![Claims search results](./media\sharepoint-on-premises-tutorial/fig16-claimssearchresults.png)
262+
![Claims search results](./media/sharepoint-on-premises-tutorial/fig16-claimssearchresults.png)
263263

264264
There is no validation on the values you search for, which can lead to misspellings or users accidentally choosing the wrong claim type to assign such as the **SurName** claim. This can prevent users from successfully accessing resources.
265265

@@ -279,7 +279,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
279279

280280
2. In the applications list, select **SharePoint on-premises**.
281281

282-
![The SharePoint link in the Applications list](./media\sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_app.png)
282+
![The SharePoint link in the Applications list](./media/sharepoint-on-premises-tutorial/tutorial_sharepointonpremises_app.png)
283283

284284
3. In the menu on the left, click **Users and groups**.
285285

articles/application-insights/app-insights-java-quick-start.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Application Insights can gather telemetry data from any internet-connected appli
125125

126126
![Server metrics graphs](./media/app-insights-java-quick-start/livemetricsjava.png)
127127

128-
To learn more about monitoring Java, check out the [additional App Insights Java documentation](.\app-insights-java-get-started.md).
128+
To learn more about monitoring Java, check out the [additional App Insights Java documentation](./app-insights-java-get-started.md).
129129

130130
## Clean up resources
131131

0 commit comments

Comments
 (0)