Skip to content

Commit 00a3d95

Browse files
committed
Merge branch 'main' into release-preview-aml-cli-v2-refresh
2 parents 4ca2d6b + 99d083f commit 00a3d95

File tree

609 files changed

+4730
-3638
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

609 files changed

+4730
-3638
lines changed

.openpublishing.redirection.json

Lines changed: 43 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -849,17 +849,17 @@
849849
"redirect_document_id": false
850850
},
851851
{
852-
"source_path_from_root": "/articles/frontdoor/concept-rule-set-actions.md",
852+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-rule-set-actions.md",
853853
"redirect_url": "/azure/frontdoor/front-door-rules-engine-actions",
854854
"redirect_document_id": false
855855
},
856856
{
857-
"source_path_from_root": "/articles/frontdoor/concept-rules-set.md",
857+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-rules-set.md",
858858
"redirect_url": "/azure/frontdoor/front-door-rules-engine",
859859
"redirect_document_id": false
860860
},
861861
{
862-
"source_path_from_root": "/articles/frontdoor/concept-caching.md",
862+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-caching.md",
863863
"redirect_url": "/azure/frontdoor/front-door-caching",
864864
"redirect_document_id": false
865865
},
@@ -868,11 +868,51 @@
868868
"redirect_url": "/azure/frontdoor/front-door-route-matching",
869869
"redirect_document_id": false
870870
},
871+
{
872+
"source_path_from_root": "/articles/frontdoor/front-door-backend-pool.md",
873+
"redirect_url": "/azure/frontdoor/origin",
874+
"redirect_document_id": true
875+
},
876+
{
877+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-origin.md",
878+
"redirect_url": "/azure/frontdoor/origin",
879+
"redirect_document_id": false
880+
},
881+
{
882+
"source_path_from_root": "/articles/frontdoor/concept-private-link.md",
883+
"redirect_url": "/azure/frontdoor/private-link",
884+
"redirect_document_id": true
885+
},
886+
{
887+
"source_path_from_root": "/articles/frontdoor/concept-end-to-end-tls.md",
888+
"redirect_url": "/azure/frontdoor/end-to-end-tls",
889+
"redirect_document_id": true
890+
},
891+
{
892+
"source_path_from_root": "/articles/frontdoor/front-door-routing-methods.md",
893+
"redirect_url": "/azure/frontdoor/routing-methods",
894+
"redirect_document_id": true
895+
},
896+
{
897+
"source_path_from_root": "/articles/frontdoor/front-door-health-probes.md",
898+
"redirect_url": "/azure/frontdoor/health-probes",
899+
"redirect_document_id": true
900+
},
901+
{
902+
"source_path_from_root": "/articles/frontdoor/standard-premium/create-front-door-portal.md",
903+
"redirect_url": "/azure/frontdoor/create-front-door-portal",
904+
"redirect_document_id": true
905+
},
871906
{
872907
"source_path_from_root": "/articles/frontdoor/concept-rule-set-url-redirect-and-rewrite.md",
873908
"redirect_url": "/azure/frontdoor/front-door-url-redirect",
874909
"redirect_document_id": false
875910
},
911+
{
912+
"source_path_from_root": "/articles/frontdoor/standard-premium/index.yml",
913+
"redirect_url": "/azure/frontdoor/",
914+
"redirect_document_id": false
915+
},
876916
{
877917
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
878918
"redirect_url": "/aspnet/core/security/authorization/secure-data",

articles/active-directory-b2c/custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The following diagram illustrates Azure Front Door integration:
4747
4848
When using custom domains, consider the following:
4949

50-
- You can set up multiple custom domains. For the maximum number of supported custom domains, see [Azure AD service limits and restrictions](../active-directory/enterprise-users/directory-service-limits-restrictions.md) for Azure AD B2C and [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-service-limits) for Azure Front Door.
50+
- You can set up multiple custom domains. For the maximum number of supported custom domains, see [Azure AD service limits and restrictions](../active-directory/enterprise-users/directory-service-limits-restrictions.md) for Azure AD B2C and [Azure subscription and service limits, quotas, and constraints](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-classic-limits) for Azure Front Door.
5151
- Azure Front Door is a separate Azure service, so extra charges will be incurred. For more information, see [Front Door pricing](https://azure.microsoft.com/pricing/details/frontdoor).
5252
- To use Azure Front Door [Web Application Firewall](../web-application-firewall/afds/afds-overview.md), you need to confirm your firewall configuration and rules work correctly with your Azure AD B2C user flows.
5353
- After you configure custom domains, users will still be able to access the Azure AD B2C default domain name *<tenant-name>.b2clogin.com* (unless you're using a custom policy and you [block access](#block-access-to-the-default-domain-name).

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,6 @@ The table below lists the [user resource type](/graph/api/resources/user) attrib
5555
|immutableId |String|An identifier that is typically used for users migrated from on-premises Active Directory.|No|No|Persisted, Output|
5656
|legalAgeGroupClassification|String|Legal age group classification. Read-only and calculated based on ageGroup and consentProvidedForMinor properties. Allowed values: null, minorWithOutParentalConsent, minorWithParentalConsent, minorNoParentalConsentRequired, notAdult, and adult.|Yes|No|Persisted, Output|
5757
|legalCountry<sup>1</sup> |String|Country/Region for legal purposes.|No|No|Persisted, Output|
58-
|mail |String|Email address for the user. Example: "[email protected]". NOTE: Accent characters are not allowed.|Yes|No|Persisted, Output|
5958
|mailNickName |String|The mail alias for the user. Max length 64.|No|No|Persisted, Output|
6059
|mobile (mobilePhone) |String|The primary cellular telephone number for the user. Max length 64.|Yes|No|Persisted, Output|
6160
|netId |String|Net ID.|No|No|Persisted, Output|

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 03/22/2022
9+
ms.date: 03/25/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -51,7 +51,7 @@ Create a location based Conditional Access policy that applies to service princi
5151
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
5252
1. Under **Conditions** > **Locations**, include **Any location** and exclude **Selected locations** where you want to allow access.
5353
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
54-
1. Set **Enable policy** to **On**.
54+
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
5555
1. Select **Create** to complete your policy.
5656

5757
### Create a risk-based Conditional Access policy
@@ -73,13 +73,9 @@ Create a location based Conditional Access policy that applies to service princi
7373
1. Select the levels of risk where you want this policy to trigger.
7474
1. Select **Done**.
7575
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
76-
1. Set **Enable policy** to **On**.
76+
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
7777
1. Select **Create** to complete your policy.
7878

79-
#### Report-only mode
80-
81-
Saving your policy in Report-only mode won't allow administrators to estimate the effects because we don't currently log this risk information in sign-in logs.
82-
8379
## Roll back
8480

8581
If you wish to roll back this feature, you can delete or disable any created policies.
@@ -93,6 +89,12 @@ The sign-in logs are used to review how policy is enforced for service principal
9389

9490
Failure reason when Service Principal is blocked by Conditional Access: “Access has been blocked due to conditional access policies.”
9591

92+
#### Report-only mode
93+
94+
To view results of a location-based policy, refer to the **Report-only** tab of events in the **Sign-in report**, or use the **Conditional Access Insights and Reporting** workbook.
95+
96+
To view results of a risk-based policy, refer to the **Report-only** tab of events in the **Sign-in report**.
97+
9698
## Reference
9799

98100
### Finding the objectID

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.assetid: ef2797d7-d440-4a9a-a648-db32ad137494
66
ms.service: active-directory
77
ms.topic: reference
88
ms.workload: identity
9-
ms.date: 3/24/2022
9+
ms.date: 3/25/2022
1010
ms.subservice: hybrid
1111
ms.author: rodejo
1212
ms.custom: has-adal-ref
@@ -84,7 +84,7 @@ To read more about auto-upgrade, see [Azure AD Connect: Automatic upgrade](how-t
8484

8585
### Bug fixes
8686
- Fixed an issue where some sync rule functions were not parsing surrogate pairs properly.
87-
- Fixed an issue where, under certain circumstances, the sync service would not start due to a model db corruption. You can read more about the model db corroption issue in [this article](https://docs.microsoft.com/troubleshoot/azure/active-directory/resolve-model-database-corruption-sqllocaldb)
87+
- Fixed an issue where, under certain circumstances, the sync service would not start due to a model db corruption. You can read more about the model db corruption issue in [this article](https://docs.microsoft.com/troubleshoot/azure/active-directory/resolve-model-database-corruption-sqllocaldb)
8888

8989
## 2.0.91.0
9090

articles/active-directory/manage-apps/view-applications-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Select options according to what you're looking for:
6262
1. Under **Application Status**, choose **Any**, **Disabled**, or **Enabled**. The **Any** option includes both disabled and enabled applications.
6363
1. Under **Application Visibility**, choose **Any**, or **Hidden**. The **Hidden** option shows applications that are in the tenant, but aren't visible to users.
6464
1. After choosing the options you want, select **Apply**.
65-
1. Select **Add filters** to add more options for filtering the search results. The other that exist are:
65+
1. Select **Add filters** to add more options for filtering the search results. The other options are:
6666
- **Application ID**
6767
- **Created on**
6868
- **Assignment required**

articles/active-directory/saas-apps/15five-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -74,10 +74,10 @@ Add 15Five from the Azure AD application gallery to start managing provisioning
7474

7575
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
7676

77-
* When assigning users and groups to 15Five, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add additional roles.
78-
7977
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
8078

79+
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
80+
8181
## Step 5. Configure automatic user provisioning to 15Five
8282

8383
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in 15Five based on user and/or group assignments in Azure AD.

articles/active-directory/saas-apps/8x8-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,9 +70,9 @@ The Azure AD provisioning service allows you to scope who will be provisioned ba
7070

7171
If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
7272

73-
* When assigning users and groups to 8x8, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add additional roles.
73+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
7474

75-
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
75+
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
7676

7777
## Step 5. Configure automatic user provisioning to 8x8
7878

articles/active-directory/saas-apps/adobe-identity-management-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,9 +71,9 @@ Add Adobe Identity Management from the Azure AD application gallery to start man
7171

7272
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
7373

74-
* When assigning users and groups to Adobe Identity Management, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add additional roles.
74+
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
7575

76-
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
76+
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
7777

7878

7979
## Step 5. Configure automatic user provisioning to Adobe Identity Management

articles/active-directory/saas-apps/alertmedia-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ Add AlertMedia from the Azure AD application gallery to start managing provision
6262

6363
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
6464

65-
* When assigning users and groups to AlertMedia, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add additional roles.
65+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
6666

67-
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
67+
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
6868

6969

7070
## Step 5. Configure automatic user provisioning to AlertMedia

0 commit comments

Comments
 (0)