Skip to content

Commit

Permalink
[BULK] - DocuTune - Rebranding of Azure Active Dir
Browse files Browse the repository at this point in the history
  • Loading branch information
alexbuckgit authored and sdwheeler committed Oct 18, 2023
1 parent cca430b commit 4614b3a
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -54,8 +54,7 @@ accounts from that domain and from trusted domains to a local group.

### Example 1: Add members to the Administrators group

This command adds several members to the local Administrators group. The new members include a local
user account, a Microsoft account, an Microsoft Entra account, and a domain group. This
This command adds several members to the local Administrators group. The new members include a local user account, a Microsoft account, a Microsoft Entra account, and a domain group. This
example uses a placeholder value for the user name of an account at Outlook.com.

```powershell
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Remove-LocalGroupMember -Group "Administrators" -Member $members
```

This command removes several members from the local Administrators group. The members that this
cmdlet removes include a local user account, a Microsoft account, an Microsoft Entra account,
cmdlet removes include a local user account, a Microsoft account, a Microsoft Entra account,
and a domain group. This example uses a placeholder value for the user name of an account at
Outlook.com.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -254,7 +254,7 @@ Set-ADComputer -Identity $ServerC -PrincipalsAllowedToDelegateToAccount $null
- [What's New in Kerberos Authentication][10]
- [How Windows Server 2012 Eases the Pain of Kerberos Constrained Delegation, Part 1][16]
- [How Windows Server 2012 Eases the Pain of Kerberos Constrained Delegation, Part 2][17]
- [Understanding Kerberos Constrained Delegation for Azure Active Directory Application Proxy Deployments with Integrated Windows Authentication][14]
- [Understanding Kerberos Constrained Delegation for Microsoft Entra application proxy deployments with Integrated Windows Authentication][14]
- [[MS-ADA2] Active Directory Schema Attributes M2.210 Attribute msDS-AllowedToActOnBehalfOfOtherIdentity][MS-ADA2]
- [[MS-SFU] Kerberos Protocol Extensions: Service for User and Constrained Delegation Protocol 1.3.2 S4U2proxy][MS-SFU]
- [Remote Administration Without Constrained Delegation Using PrincipalsAllowedToDelegateToAccount][03]
Expand Down

0 comments on commit 4614b3a

Please sign in to comment.