Skip to content

Commit 007a235

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pauljewell-copy-blob
2 parents 043e2c4 + 3b56c01 commit 007a235

File tree

289 files changed

+9094
-1262
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

289 files changed

+9094
-1262
lines changed

articles/active-directory/authentication/howto-mfa-app-passwords.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,7 @@ By default, users can't create app passwords. The app passwords feature must be
9999

100100
When users complete their initial registration for Azure AD Multi-Factor Authentication, there's an option to create app passwords at the end of the registration process.
101101

102-
Users can also create app passwords after registration. For more information and detailed steps for your users, see the following resources:
103-
* [What are app passwords in Azure AD Multi-Factor Authentication?](https://support.microsoft.com/account-billing/manage-app-passwords-for-two-step-verification-d6dc8c6d-4bf7-4851-ad95-6d07799387e9)
102+
Users can also create app passwords after registration. For more information and detailed steps for your users, see the following resource:
104103
* [Create app passwords from the Security info page](https://support.microsoft.com/account-billing/create-app-passwords-from-the-security-info-preview-page-d8bc744a-ce3f-4d4d-89c9-eb38ab9d4137)
105104

106105
## Next steps

articles/active-directory/enterprise-users/clean-up-unmanaged-azure-ad-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Run the following cmdlets:
6262

6363
To identify unmanaged Azure AD accounts, run:
6464

65-
* `Connect-MgGraph -Scope User.ReadAll`
65+
* `Connect-MgGraph -Scope User.Read.All`
6666
* `Get-MsIdUnmanagedExternalUser`
6767

6868
To reset unmanaged Azure AD account redemption status, run:

articles/active-directory/saas-apps/better-stack-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4141
1. Determine what data to [map between Azure AD and Better Stack](../app-provisioning/customize-application-attributes.md).
4242

4343
## Step 2. Configure Better Stack to support provisioning with Azure AD
44-
Contact Better Stack support to configure Better Stack to support provisioning with Azure AD.
44+
You can configure the Azure AD provisioning in the Single Sign-on settings inside the Better Stack dashboard. Once enabled, you'll see the **Tenant ID** and the **Secret token** you can use in the Provisioning settings below. If you need any help, feel free to contact [Better Stack Support](mailto:[email protected]).
4545

4646
## Step 3. Add Better Stack from the Azure AD application gallery
4747

Lines changed: 144 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,144 @@
1+
---
2+
title: 'Tutorial: Configure Howspace for automatic user provisioning with Azure Active Directory'
3+
description: Learn how to automatically provision and deprovision user accounts from Azure AD to Howspace.
4+
services: active-directory
5+
author: twimmers
6+
writer: twimmers
7+
manager: beatrizd
8+
ms.assetid: 4cc83a2e-916c-464b-8a8e-5e68c3aeb9f4
9+
ms.service: active-directory
10+
ms.subservice: saas-app-tutorial
11+
ms.workload: identity
12+
ms.topic: tutorial
13+
ms.date: 04/12/2023
14+
ms.author: thwimmer
15+
---
16+
17+
# Tutorial: Configure Howspace for automatic user provisioning
18+
19+
This tutorial describes the steps you need to perform in both Howspace and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and deprovisions users and groups to [Howspace](https://www.howspace.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
20+
21+
22+
## Supported capabilities
23+
> [!div class="checklist"]
24+
> * Create users in Howspace.
25+
> * Remove users in Howspace when they do not require access anymore.
26+
> * Keep user attributes synchronized between Azure AD and Howspace.
27+
> * Provision groups and group memberships in Howspace.
28+
> * [Single sign-on](../manage-apps/add-application-portal-setup-oidc-sso.md) to Howspace (recommended).
29+
30+
## Prerequisites
31+
32+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
33+
34+
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
35+
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
36+
* A user account in Howspace with Admin permissions.
37+
38+
## Step 1. Plan your provisioning deployment
39+
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
40+
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
41+
1. Determine what data to [map between Azure AD and Howspace](../app-provisioning/customize-application-attributes.md).
42+
43+
## Step 2. Configure Howspace to support provisioning with Azure AD
44+
Contact Howspace support to configure Howspace to support provisioning with Azure AD.
45+
46+
## Step 3. Add Howspace from the Azure AD application gallery
47+
48+
Add Howspace from the Azure AD application gallery to start managing provisioning to Howspace. If you have previously setup Howspace for SSO, you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
49+
50+
## Step 4. Define who will be in scope for provisioning
51+
52+
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
53+
54+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control provisioning by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
55+
56+
* If you need more roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
57+
58+
59+
## Step 5. Configure automatic user provisioning to Howspace
60+
61+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
62+
63+
### To configure automatic user provisioning for Howspace in Azure AD:
64+
65+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
66+
67+
![Screenshot of Enterprise applications blade.](common/enterprise-applications.png)
68+
69+
1. In the applications list, select **Howspace**.
70+
71+
![Screenshot of the Howspace link in the Applications list.](common/all-applications.png)
72+
73+
1. Select the **Provisioning** tab.
74+
75+
![Screenshot of Provisioning tab.](common/provisioning.png)
76+
77+
1. Set the **Provisioning Mode** to **Automatic**.
78+
79+
![Screenshot of Provisioning tab automatic.](common/provisioning-automatic.png)
80+
81+
1. Under the **Admin Credentials** section, input your Howspace Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Howspace. If the connection fails, ensure your Howspace account has Admin permissions and try again.
82+
83+
![Screenshot of Token.](common/provisioning-testconnection-tenanturltoken.png)
84+
85+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
86+
87+
![Screenshot of Notification Email.](common/provisioning-notification-email.png)
88+
89+
1. Select **Save**.
90+
91+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Howspace**.
92+
93+
1. Review the user attributes that are synchronized from Azure AD to Howspace in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Howspace for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you need to ensure that the Howspace API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
94+
95+
|Attribute|Type|Supported for filtering|Required by Howspace|
96+
|---|---|---|---|
97+
|userName|String|✓|✓
98+
|active|Boolean||
99+
|name.givenName|String||
100+
|name.familyName|String||
101+
|phoneNumbers[type eq "work"].value|String||
102+
|externalId|String||
103+
104+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Howspace**.
105+
106+
1. Review the group attributes that are synchronized from Azure AD to Howspace in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Howspace for update operations. Select the **Save** button to commit any changes.
107+
108+
|Attribute|Type|Supported for filtering|Required by Howspace|
109+
|---|---|---|---|
110+
|displayName|String|✓|✓
111+
|externalId|String||
112+
|members|Reference||
113+
114+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
115+
116+
1. To enable the Azure AD provisioning service for Howspace, change the **Provisioning Status** to **On** in the **Settings** section.
117+
118+
![Screenshot of Provisioning Status Toggled On.](common/provisioning-toggle-on.png)
119+
120+
1. Define the users and/or groups that you would like to provision to Howspace by choosing the desired values in **Scope** in the **Settings** section.
121+
122+
![Screenshot of Provisioning Scope.](common/provisioning-scope.png)
123+
124+
1. When you're ready to provision, click **Save**.
125+
126+
![Screenshot of Saving Provisioning Configuration.](common/provisioning-configuration-save.png)
127+
128+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
129+
130+
## Step 6. Monitor your deployment
131+
Once you've configured provisioning, use the following resources to monitor your deployment:
132+
133+
* Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
134+
* Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it's to completion
135+
* If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
136+
137+
## More resources
138+
139+
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
140+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
141+
142+
## Next steps
143+
144+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3088,6 +3088,8 @@
30883088
href: hootsuite-provisioning-tutorial.md
30893089
- name: Hoxhunt
30903090
href: hoxhunt-provisioning-tutorial.md
3091+
- name: Howspace
3092+
href: howspace-provisioning-tutorial.md
30913093
- name: H5mag
30923094
href: h5mag-provisioning-tutorial.md
30933095
- name: Ideo

articles/active-directory/saas-apps/vera-suite-tutorial.md

Lines changed: 2 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/31/2023
12+
ms.date: 04/12/2023
1313
ms.author: jeedes
1414

1515
---
@@ -56,24 +56,8 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
5656

5757
1. In the Azure portal, on the **Vera Suite** application integration page, find the **Manage** section and select **single sign-on**.
5858
1. On the **Select a single sign-on method** page, select **SAML**.
59-
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
6059

61-
![Screenshot shows how to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
62-
63-
1. On the **Basic SAML Configuration** section, perform the following steps:
64-
65-
a. In the **Identifier** textbox, type the URL:
66-
`https://logon.mykpa.com/identity/Saml2/`
67-
68-
b. In the **Reply URL** textbox, type the URL:
69-
`https://logon.mykpa.com/identity/Saml2/Acs`
70-
71-
c. In the **Sign on URL** textbox, type one of the following URLs:
72-
73-
| **Sign on URL** |
74-
|-------------|
75-
| `https://www.verasuite.com` |
76-
| `https://logon.mykpa.com` |
60+
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
7761

7862
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
7963

articles/aks/limit-egress-traffic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,7 @@ az group create --name $RG --location $LOC
321321

322322
Create a virtual network with two subnets to host the AKS cluster and the Azure Firewall. Each will have their own subnet. Let's start with the AKS network.
323323

324-
```
324+
```azurecli
325325
# Dedicated virtual network with AKS subnet
326326
327327
az network vnet create \
@@ -560,7 +560,7 @@ If you used authorized IP ranges for the cluster on the previous step, you must
560560

561561
Add another IP address to the approved ranges with the following command
562562

563-
```bash
563+
```azurecli
564564
# Retrieve your IP address
565565
CURRENT_IP=$(dig @resolver1.opendns.com ANY myip.opendns.com +short)
566566

articles/aks/use-multiple-node-pools.md

Lines changed: 40 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use multiple node pools in Azure Kubernetes Service (AKS)
33
description: Learn how to create and manage multiple node pools for a cluster in Azure Kubernetes Service (AKS)
44
ms.topic: article
55
ms.custom: event-tier1-build-2022, ignite-2022, devx-track-azurecli
6-
ms.date: 05/16/2022
6+
ms.date: 03/11/2023
77
---
88

99
# Create and manage multiple node pools for a cluster in Azure Kubernetes Service (AKS)
@@ -406,19 +406,53 @@ It takes a few minutes to delete the nodes and the node pool.
406406

407407
## Associate capacity reservation groups to node pools (preview)
408408

409-
[!INCLUDE [preview features callout](./includes/preview/preview-callout.md)]
410-
411-
As your application workloads demands, you may associate node pools to capacity reservation groups created prior. This ensures guaranteed capacity is allocated for your node pools.
409+
As your application workloads demands, you may associate node pools to capacity reservation groups already created. This ensures guaranteed capacity is allocated for your node pools.
412410

413411
For more information on the capacity reservation groups, please refer to [Capacity Reservation Groups][capacity-reservation-groups].
414412

415-
Associating a node pool with an existing capacity reservation group can be done using [`az aks nodepool add`][az-aks-nodepool-add] command and specifying a capacity reservation group with the --capacityReservationGroup flag" The capacity reservation group should already exist, otherwise the node pool will be added to the cluster with a warning and no capacity reservation group gets associated.
413+
### Register preview feature
414+
415+
[!INCLUDE [preview features callout](includes/preview/preview-callout.md)]
416+
417+
To install the aks-preview extension, run the following command:
418+
419+
```azurecli
420+
az extension add --name aks-preview
421+
```
422+
423+
Run the following command to update to the latest version of the extension released:
424+
425+
```azurecli
426+
az extension update --name aks-preview
427+
```
428+
429+
Register the `CapacityReservationGroupPreview` feature flag by using the [az feature register][az-feature-register] command, as shown in the following example:
430+
431+
```azurecli-interactive
432+
az feature register --namespace "Microsoft.ContainerService" --name "CapacityReservationGroupPreview"
433+
```
434+
435+
It takes a few minutes for the status to show *Registered*. Verify the registration status by using the [az feature show][az-feature-show] command:
436+
437+
```azurecli-interactive
438+
az feature show --namespace "Microsoft.ContainerService" --name "CapacityReservationGroupPreview"
439+
```
440+
441+
When the status reflects *Registered*, refresh the registration of the *Microsoft.ContainerService* resource provider by using the [az provider register][az-provider-register] command:
442+
443+
```azurecli-interactive
444+
az provider register --namespace Microsoft.ContainerService
445+
```
446+
447+
### Manage capacity reservations
448+
449+
Associating a node pool with an existing capacity reservation group can be done using [`az aks nodepool add`][az-aks-nodepool-add] command and specifying a capacity reservation group with the --capacityReservationGroup flag". The capacity reservation group should already exist, otherwise the node pool will be added to the cluster with a warning and no capacity reservation group gets associated.
416450

417451
```azurecli-interactive
418452
az aks nodepool add -g MyRG --cluster-name MyMC -n myAP --capacityReservationGroup myCRG
419453
```
420454

421-
Associating a system node pool with an existing capacity reservation group can be done using [`az aks create`][az-aks-create] command. If the capacity reservation group specified doesn't exist, then a warning is issued and the cluster gets created without any capacity reservation group association.
455+
Associating a system node pool with an existing capacity reservation group can be done using [`az aks create`][az-aks-create] command. If the capacity reservation group specified doesn't exist, then a warning is issued and the cluster gets created without any capacity reservation group association.
422456

423457
```azurecli-interactive
424458
az aks create -g MyRG --cluster-name MyMC --capacityReservationGroup myCRG

articles/application-gateway/ingress-controller-install-new.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -245,10 +245,8 @@ Kubernetes. We'll use it to install the `application-gateway-kubernetes-ingress`
245245
sed -i "s|<applicationGatewayName>|${applicationGatewayName}|g" helm-config.yaml
246246
sed -i "s|<identityResourceId>|${identityResourceId}|g" helm-config.yaml
247247
sed -i "s|<identityClientId>|${identityClientId}|g" helm-config.yaml
248-
249-
# You can further modify the helm config to enable/disable features
250-
nano helm-config.yaml
251248
```
249+
252250
253251
> [!NOTE]
254252
> **For deploying to Sovereign Clouds (e.g., Azure Government)**, the `appgw.environment` configuration parameter must be added and set to the appropriate value as documented below.

articles/application-gateway/rewrite-http-headers-url.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,8 @@ You can use a condition to evaluate whether a specified variable is present, whe
6969

7070
### Pattern Matching
7171

72-
Application Gateway uses regular expressions for pattern matching in the condition. You can use the [Perl Compatible Regular Expressions (PCRE) library](https://www.pcre.org/) to set up regular expression pattern matching in the conditions. To learn about regular expression syntax, see the [Perl regular expressions main page](https://perldoc.perl.org/perlre.html).
72+
Application Gateway uses regular expressions for pattern matching in the condition. You should use Regular Expression 2 (RE2) compatible expressions when writing your conditions. If you are running an Application Gateway Web Application Firewall (WAF) with Core Rule Set 3.1 or earlier, you may run into issues when using [Perl Compatible Regular Expressions (PCRE)](https://www.pcre.org/) while doing lookahead and lookbehind (negative or positive) assertions.
73+
7374

7475
### Capturing
7576

0 commit comments

Comments
 (0)