This commit is contained in:
Roberto Rodriguez 2022-06-01 04:33:12 -04:00
Родитель 3233ab26e9
Коммит 6bc479758e
18 изменённых файлов: 16 добавлений и 15 удалений

3
.gitignore поставляемый
Просмотреть файл

@ -3,7 +3,8 @@
##
## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore
docs/_build
docs/_build/html
# User-specific files
*.rsuser
*.suo

Двоичные данные
docs/_build/.doctrees/environment.pickle поставляемый

Двоичный файл не отображается.

Двоичные данные
docs/_build/.doctrees/environments/_helper-docs/addM365LicenseToUser.doctree поставляемый

Двоичный файл не отображается.

Двоичные данные
docs/_build/.doctrees/environments/aadHybridIdentityADFS/README.doctree поставляемый

Двоичный файл не отображается.

Двоичный файл не отображается.

Двоичные данные
docs/_build/.doctrees/labs/README.doctree поставляемый Normal file

Двоичный файл не отображается.

Просмотреть файл

@ -1,7 +1,7 @@
# Add Microsoft 365 E5 License to User
## Pre-Requirements
* [Microsoft 365 E5 License](../../1_prepare/startM365E5Trial.md)
* [Microsoft 365 E5 License](startM365E5Trial.md)
* Azure AD active users
## Update Users License

Просмотреть файл

@ -1,7 +1,7 @@
# AAD Hybrid Identity: AD FS Environment
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json)
[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json)
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json)
[![Deploy to Azure Gov](https://aka.ms/deploytoazuregovbutton)](https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json)
This environment was designed to replicate an on-prem Active Directory (AD) network synced with Azure AD to authenticate to the cloud with the same identity used on-prem. The authentication method used in this environment is federation with Active Directory Services (AD FS).

Просмотреть файл

@ -34,7 +34,7 @@ Depending on the WID version, one could use the following named pipes to connect
The named pipe information can be obtained directly from the `ConfigurationDatabaseConnectionString` property of the `SecurityTokenService` class from the WMI `ADFS namespace`.
1. Connect to the AD FS server via the [Azure Bastion service](../../2_deploy/_helper_docs/connectAzVmAzBastion.md) as the AD FS service account.
1. Connect to the AD FS server via the [Azure Bastion service](../../../../environments/_helper-docs/connectAzVmAzBastion.md) as the AD FS service account.
2. Open PowerShell and run the following commands:
```PowerShell

Просмотреть файл

@ -2,7 +2,7 @@
"cells": [
{
"cell_type": "markdown",
"id": "fb67c4ae",
"id": "990b5de3",
"metadata": {},
"source": [
"# Get OAuth Access Token with SAML Assertion\n",

Просмотреть файл

@ -2,7 +2,7 @@
"cells": [
{
"cell_type": "markdown",
"id": "acb5ee12",
"id": "0c7e4ea1",
"metadata": {},
"source": [
"# Read Mail Messages via MS Graph APIs\n",

Просмотреть файл

@ -438,7 +438,7 @@ const thebe_selector_output = ".output, .cell_output"
<div class="section" id="pre-requirements">
<h2>Pre-Requirements<a class="headerlink" href="#pre-requirements" title="Permalink to this headline"></a></h2>
<ul class="simple">
<li><p><span class="xref myst">Microsoft 365 E5 License</span></p></li>
<li><p><a class="reference internal" href="startM365E5Trial.html"><span class="doc std std-doc">Microsoft 365 E5 License</span></a></p></li>
<li><p>Azure AD active users</p></li>
</ul>
</div>

Просмотреть файл

@ -637,8 +637,8 @@ const thebe_selector_output = ".output, .cell_output"
<div class="tex2jax_ignore mathjax_ignore section" id="aad-hybrid-identity-ad-fs-environment">
<h1>AAD Hybrid Identity: AD FS Environment<a class="headerlink" href="#aad-hybrid-identity-ad-fs-environment" title="Permalink to this headline"></a></h1>
<p><a class="reference external" href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure" src="https://aka.ms/deploytoazurebutton" /></a>
<a class="reference external" href="https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2F2_deploy%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure Gov" src="https://aka.ms/deploytoazuregovbutton" /></a></p>
<p><a class="reference external" href="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure" src="https://aka.ms/deploytoazurebutton" /></a>
<a class="reference external" href="https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FSimuLand%2Fmain%2Fdocs%2Fenvironments%2FaadHybridIdentityADFS%2Fazuredeploy.json"><img alt="Deploy to Azure Gov" src="https://aka.ms/deploytoazuregovbutton" /></a></p>
<p>This environment was designed to replicate an on-prem Active Directory (AD) network synced with Azure AD to authenticate to the cloud with the same identity used on-prem. The authentication method used in this environment is federation with Active Directory Services (AD FS).</p>
<div class="section" id="network-design">
<h2>Network Design<a class="headerlink" href="#network-design" title="Permalink to this headline"></a></h2>

Просмотреть файл

@ -600,7 +600,7 @@ Depending on the WID version, one could use the following named pipes to connect
<h3>Get Database Connection String via WMI Class<a class="headerlink" href="#get-database-connection-string-via-wmi-class" title="Permalink to this headline"></a></h3>
<p>The named pipe information can be obtained directly from the <code class="docutils literal notranslate"><span class="pre">ConfigurationDatabaseConnectionString</span></code> property of the <code class="docutils literal notranslate"><span class="pre">SecurityTokenService</span></code> class from the WMI <code class="docutils literal notranslate"><span class="pre">ADFS</span> <span class="pre">namespace</span></code>.</p>
<ol class="simple">
<li><p>Connect to the AD FS server via the <span class="xref myst">Azure Bastion service</span> as the AD FS service account.</p></li>
<li><p>Connect to the AD FS server via the <a class="reference internal" href="../../../../environments/_helper-docs/connectAzVmAzBastion.html"><span class="doc std std-doc">Azure Bastion service</span></a> as the AD FS service account.</p></li>
<li><p>Open PowerShell and run the following commands:</p></li>
</ol>
<div class="highlight-PowerShell notranslate"><div class="highlight"><pre><span></span><span class="nv">$ADFS</span> <span class="p">=</span> <span class="nb">Get-WmiObject</span> <span class="n">-Namespace</span> <span class="n">root</span><span class="p">/</span><span class="n">ADFS</span> <span class="n">-Class</span> <span class="n">SecurityTokenService</span>

Просмотреть файл

@ -2,7 +2,7 @@
"cells": [
{
"cell_type": "markdown",
"id": "fb67c4ae",
"id": "990b5de3",
"metadata": {},
"source": [
"# Get OAuth Access Token with SAML Assertion\n",

Просмотреть файл

@ -2,7 +2,7 @@
"cells": [
{
"cell_type": "markdown",
"id": "acb5ee12",
"id": "0c7e4ea1",
"metadata": {},
"source": [
"# Read Mail Messages via MS Graph APIs\n",

Просмотреть файл

@ -1,7 +1,7 @@
# Add Microsoft 365 E5 License to User
## Pre-Requirements
* [Microsoft 365 E5 License](../../1_prepare/startM365E5Trial.md)
* [Microsoft 365 E5 License](startM365E5Trial.md)
* Azure AD active users
## Update Users License

Просмотреть файл

@ -34,7 +34,7 @@ Depending on the WID version, one could use the following named pipes to connect
The named pipe information can be obtained directly from the `ConfigurationDatabaseConnectionString` property of the `SecurityTokenService` class from the WMI `ADFS namespace`.
1. Connect to the AD FS server via the [Azure Bastion service](../../2_deploy/_helper_docs/connectAzVmAzBastion.md) as the AD FS service account.
1. Connect to the AD FS server via the [Azure Bastion service](../../../../environments/_helper-docs/connectAzVmAzBastion.md) as the AD FS service account.
2. Open PowerShell and run the following commands:
```PowerShell