зеркало из https://github.com/Azure/SimuLand.git
updatting docs
This commit is contained in:
Родитель
3233ab26e9
Коммит
6bc479758e
|
@ -3,7 +3,8 @@
|
|||
##
|
||||
## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore
|
||||
|
||||
docs/_build
|
||||
docs/_build/html
|
||||
|
||||
# User-specific files
|
||||
*.rsuser
|
||||
*.suo
|
||||
|
|
Двоичный файл не отображается.
Двоичные данные
docs/_build/.doctrees/environments/_helper-docs/addM365LicenseToUser.doctree
поставляемый
Двоичные данные
docs/_build/.doctrees/environments/_helper-docs/addM365LicenseToUser.doctree
поставляемый
Двоичный файл не отображается.
Двоичные данные
docs/_build/.doctrees/environments/aadHybridIdentityADFS/README.doctree
поставляемый
Двоичные данные
docs/_build/.doctrees/environments/aadHybridIdentityADFS/README.doctree
поставляемый
Двоичный файл не отображается.
Двоичные данные
docs/_build/.doctrees/labs/GoldenSAML/simulation/export-adfs-configuration/exportADFSConfigLocalNamedPipe.doctree
поставляемый
Двоичные данные
docs/_build/.doctrees/labs/GoldenSAML/simulation/export-adfs-configuration/exportADFSConfigLocalNamedPipe.doctree
поставляемый
Двоичный файл не отображается.
Двоичный файл не отображается.
|
@ -1,7 +1,7 @@
|
|||
# Add Microsoft 365 E5 License to User
|
||||
|
||||
## Pre-Requirements
|
||||
* [Microsoft 365 E5 License](../../1_prepare/startM365E5Trial.md)
|
||||
* [Microsoft 365 E5 License](startM365E5Trial.md)
|
||||
* Azure AD active users
|
||||
|
||||
## Update User’s License
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# AAD Hybrid Identity: AD FS Environment
|
||||
|
||||
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json)
|
||||
[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json)
|
||||
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json)
|
||||
[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json)
|
||||
|
||||
This environment was designed to replicate an on-prem Active Directory (AD) network synced with Azure AD to authenticate to the cloud with the same identity used on-prem. The authentication method used in this environment is federation with Active Directory Services (AD FS).
|
||||
|
||||
|
|
|
@ -34,7 +34,7 @@ Depending on the WID version, one could use the following named pipes to connect
|
|||
|
||||
The named pipe information can be obtained directly from the `ConfigurationDatabaseConnectionString` property of the `SecurityTokenService` class from the WMI `ADFS namespace`.
|
||||
|
||||
1. Connect to the AD FS server via the [Azure Bastion service](../../2_deploy/_helper_docs/connectAzVmAzBastion.md) as the AD FS service account.
|
||||
1. Connect to the AD FS server via the [Azure Bastion service](../../../../environments/_helper-docs/connectAzVmAzBastion.md) as the AD FS service account.
|
||||
2. Open PowerShell and run the following commands:
|
||||
|
||||
```PowerShell
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
"cells": [
|
||||
{
|
||||
"cell_type": "markdown",
|
||||
"id": "fb67c4ae",
|
||||
"id": "990b5de3",
|
||||
"metadata": {},
|
||||
"source": [
|
||||
"# Get OAuth Access Token with SAML Assertion\n",
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
"cells": [
|
||||
{
|
||||
"cell_type": "markdown",
|
||||
"id": "acb5ee12",
|
||||
"id": "0c7e4ea1",
|
||||
"metadata": {},
|
||||
"source": [
|
||||
"# Read Mail Messages via MS Graph APIs\n",
|
||||
|
|
|
@ -438,7 +438,7 @@ const thebe_selector_output = ".output, .cell_output"
|
|||
<div class="section" id="pre-requirements">
|
||||
<h2>Pre-Requirements<a class="headerlink" href="#pre-requirements" title="Permalink to this headline">¶</a></h2>
|
||||
<ul class="simple">
|
||||
<li><p><span class="xref myst">Microsoft 365 E5 License</span></p></li>
|
||||
<li><p><a class="reference internal" href="startM365E5Trial.html"><span class="doc std std-doc">Microsoft 365 E5 License</span></a></p></li>
|
||||
<li><p>Azure AD active users</p></li>
|
||||
</ul>
|
||||
</div>
|
||||
|
|
|
@ -637,8 +637,8 @@ const thebe_selector_output = ".output, .cell_output"
|
|||
|
||||
<div class="tex2jax_ignore mathjax_ignore section" id="aad-hybrid-identity-ad-fs-environment">
|
||||
<h1>AAD Hybrid Identity: AD FS Environment<a class="headerlink" href="#aad-hybrid-identity-ad-fs-environment" title="Permalink to this headline">¶</a></h1>
|
||||
<p><a class="reference external" href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure" src="https://aka.ms/deploytoazurebutton" /></a>
|
||||
<a class="reference external" href="https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure Gov" src="https://aka.ms/deploytoazuregovbutton" /></a></p>
|
||||
<p><a class="reference external" href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure" src="https://aka.ms/deploytoazurebutton" /></a>
|
||||
<a class="reference external" href="https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure Gov" src="https://aka.ms/deploytoazuregovbutton" /></a></p>
|
||||
<p>This environment was designed to replicate an on-prem Active Directory (AD) network synced with Azure AD to authenticate to the cloud with the same identity used on-prem. The authentication method used in this environment is federation with Active Directory Services (AD FS).</p>
|
||||
<div class="section" id="network-design">
|
||||
<h2>Network Design<a class="headerlink" href="#network-design" title="Permalink to this headline">¶</a></h2>
|
||||
|
|
|
@ -600,7 +600,7 @@ Depending on the WID version, one could use the following named pipes to connect
|
|||
<h3>Get Database Connection String via WMI Class<a class="headerlink" href="#get-database-connection-string-via-wmi-class" title="Permalink to this headline">¶</a></h3>
|
||||
<p>The named pipe information can be obtained directly from the <code class="docutils literal notranslate"><span class="pre">ConfigurationDatabaseConnectionString</span></code> property of the <code class="docutils literal notranslate"><span class="pre">SecurityTokenService</span></code> class from the WMI <code class="docutils literal notranslate"><span class="pre">ADFS</span> <span class="pre">namespace</span></code>.</p>
|
||||
<ol class="simple">
|
||||
<li><p>Connect to the AD FS server via the <span class="xref myst">Azure Bastion service</span> as the AD FS service account.</p></li>
|
||||
<li><p>Connect to the AD FS server via the <a class="reference internal" href="../../../../environments/_helper-docs/connectAzVmAzBastion.html"><span class="doc std std-doc">Azure Bastion service</span></a> as the AD FS service account.</p></li>
|
||||
<li><p>Open PowerShell and run the following commands:</p></li>
|
||||
</ol>
|
||||
<div class="highlight-PowerShell notranslate"><div class="highlight"><pre><span></span><span class="nv">$ADFS</span> <span class="p">=</span> <span class="nb">Get-WmiObject</span> <span class="n">-Namespace</span> <span class="n">root</span><span class="p">/</span><span class="n">ADFS</span> <span class="n">-Class</span> <span class="n">SecurityTokenService</span>
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
"cells": [
|
||||
{
|
||||
"cell_type": "markdown",
|
||||
"id": "fb67c4ae",
|
||||
"id": "990b5de3",
|
||||
"metadata": {},
|
||||
"source": [
|
||||
"# Get OAuth Access Token with SAML Assertion\n",
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
"cells": [
|
||||
{
|
||||
"cell_type": "markdown",
|
||||
"id": "acb5ee12",
|
||||
"id": "0c7e4ea1",
|
||||
"metadata": {},
|
||||
"source": [
|
||||
"# Read Mail Messages via MS Graph APIs\n",
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
# Add Microsoft 365 E5 License to User
|
||||
|
||||
## Pre-Requirements
|
||||
* [Microsoft 365 E5 License](../../1_prepare/startM365E5Trial.md)
|
||||
* [Microsoft 365 E5 License](startM365E5Trial.md)
|
||||
* Azure AD active users
|
||||
|
||||
## Update User’s License
|
||||
|
|
|
@ -34,7 +34,7 @@ Depending on the WID version, one could use the following named pipes to connect
|
|||
|
||||
The named pipe information can be obtained directly from the `ConfigurationDatabaseConnectionString` property of the `SecurityTokenService` class from the WMI `ADFS namespace`.
|
||||
|
||||
1. Connect to the AD FS server via the [Azure Bastion service](../../2_deploy/_helper_docs/connectAzVmAzBastion.md) as the AD FS service account.
|
||||
1. Connect to the AD FS server via the [Azure Bastion service](../../../../environments/_helper-docs/connectAzVmAzBastion.md) as the AD FS service account.
|
||||
2. Open PowerShell and run the following commands:
|
||||
|
||||
```PowerShell
|
||||
|
|
Загрузка…
Ссылка в новой задаче