Skip to content

Commit 01b6784

Browse files
authored
Merge pull request #180822 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 3d04177 + b34d2d8 commit 01b6784

File tree

137 files changed

+2462
-2037
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+2462
-2037
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5733,6 +5733,16 @@
57335733
"redirect_url": "/azure/azure-arc/data/create-data-controller-direct-cli",
57345734
"redirect_document_id": false
57355735
},
5736+
{
5737+
"source_path_from_root": "/articles/azure-arc/data/create-data-controller-direct-cli.md",
5738+
"redirect_url": "/azure/azure-arc/data/create-data-controller-direct-prerequisites",
5739+
"redirect_document_id": false
5740+
},
5741+
{
5742+
"source_path_from_root": "/articles/azure-arc/data/create-data-controller.md",
5743+
"redirect_url": "/azure/azure-arc/data/plan-azure-arc-data-services",
5744+
"redirect_document_id": false
5745+
},
57365746
{
57375747
"source_path_from_root": "/articles/azure-arc/data/create-data-controller-azure-data-studio.md",
57385748
"redirect_url": "/azure/azure-arc/data/create-data-controller-indirect-azure-data-studio",

articles/active-directory-b2c/azure-ad-external-identities-videos.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,4 +38,4 @@ Learn how to perform various use cases in Azure AD B2C.
3838
|:------|:------|:------|:------|
3939
|[Azure AD: Monitoring and reporting Azure AD B2C using Azure Monitor](https://www.youtube.com/watch?v=Mu9GQy-CbXI&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=1) 6:57 | [:::image type="icon" source="./media/external-identities-videos/monitoring-reporting-aad-b2c.png" border="false":::](https://www.youtube.com/watch?v=Mu9GQy-CbXI&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=1) | [Azure AD B2C user migration using Microsoft Graph API](https://www.youtube.com/watch?v=9BRXBtkBzL4&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=5) 7:09 | [:::image type="icon" source="./media/external-identities-videos/user-migration-msgraph-api.png" border="false":::](https://www.youtube.com/watch?v=9BRXBtkBzL4list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=5) |
4040
| [Azure AD B2C user migration strategies](https://www.youtube.com/watch?v=lCWR6PGUgz0&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=2) 8:22 | [:::image type="icon" source="./media/external-identities-videos/user-migration-stratagies.png" border="false":::](https://www.youtube.com/watch?v=lCWR6PGUgz0&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=2) | [How to localize or customize language using Azure AD B2C](https://www.youtube.com/watch?v=yqrX5_tA7Ms&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=13) 20:41 | [:::image type="icon" source="./media/external-identities-videos/language-localization.png" border="false":::](https://www.youtube.com/watch?v=yqrX5_tA7Ms&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=13) |
41-
|[Configure monitoring: Azure AD B2C using Azure Monitor](https://www.youtube.com/watch?v=tF2JS6TGc3g&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=14) 17:23 | [:::image type="icon" source="./media/external-identities-videos/configure-monitoring.png" border="false":::](https://www.youtube.com/watch?v=tF2JS6TGc3g&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=14) |
41+
|[Configure monitoring: Azure AD B2C using Azure Monitor](https://www.youtube.com/watch?v=tF2JS6TGc3g&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=14) 17:23 | [:::image type="icon" source="./media/external-identities-videos/configure-monitoring.png" border="false":::](https://www.youtube.com/watch?v=tF2JS6TGc3g&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=14) | [Configuring custom domains in Azure AD B2C using Azure Front Door](https://www.youtube.com/watch?v=mVNB59VK-DQ&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=13) 19:45 | [:::image type="icon" source="./media/external-identities-videos/configure-custom-domains.png" border="false":::](https://www.youtube.com/watch?v=mVNB59VK-DQ&list=PL3ZTgFEc7LyuJ8YRSGXBUVItCPnQz3YX0&index=13) |
55.1 KB
Loading

articles/active-directory/develop/msal-shared-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Supported features are:
5959
* **Query the state of the device** to determine if your application is on a device that's in shared device mode.
6060
* **Query the device state of the user** on the device to determine if anything has changed since the last time your application was used.
6161

62-
Supporting shared device mode should be considered both a security enhancement and feature upgrade for your application, and can help increase its adoption in highly regulated environments like healthcare and finance.
62+
Supporting shared device mode should be considered a feature upgrade for your application, and can help increase its adoption in environments where the same device is used among multiple users.
6363

6464
Your users depend on you to ensure their data isn't leaked to another user. Share Device Mode provides helpful signals to indicate to your application that a change you should manage has occurred. Your application is responsible for checking the state of the user on the device every time the app is used, clearing the previous user's data. This includes if it is reloaded from the background in multi-tasking. On a user change, you should ensure both the previous user's data is cleared and that any cached data being displayed in your application is removed. We recommend you always perform a thorough security review process after adding shared device mode capability to your app.
6565

@@ -76,4 +76,4 @@ An organization's device administrators are able to deploy their devices and you
7676
We support iOS and Android platforms for shared device mode. Review the documentation below for your platform to begin supporting frontline workers in your applications.
7777

7878
* [Supporting shared device mode for iOS](msal-ios-shared-devices.md)
79-
* [Supporting shared device mode for Android](msal-android-shared-devices.md)
79+
* [Supporting shared device mode for Android](msal-android-shared-devices.md)

articles/active-directory/develop/quickstart-v2-dotnet-native-aspnet.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -129,13 +129,23 @@ Configure your TodoListClient project by adding the Application ID to the *app.c
129129

130130
1. From the TodoListClient project root folder, open the *app.config* file, and then paste the Application ID value in the `ida:ClientId` parameter.
131131

132-
## Run your TodoListClient project
132+
## Run your projects
133+
134+
Start both projects. If you are using Visual Studio:
135+
136+
1. Right click on the Visual Studio solution and select **Properties**
137+
138+
1. In the **Common Properties** select **Startup Project** and then **Multiple startup projects**.
139+
140+
1. For both projects choose **Start** as the action
141+
142+
1. Ensure the TodoListService service starts first by moving it to the fist position in the list, using the up arrow.
133143

134144
Sign in to run your TodoListClient project.
135145

136-
1. Press F5 to open your TodoListClient project. The project page opens.
146+
1. Press F5 to start the projects. The service page opens, as well as the desktop application.
137147

138-
1. At the upper right, select **Sign in**, and then sign in with the same credentials you used to register your application, or sign in as a user in the same directory.
148+
1. In the TodoListClient, at the upper right, select **Sign in**, and then sign in with the same credentials you used to register your application, or sign in as a user in the same directory.
139149

140150
If you're signing in for the first time, you might be prompted to consent to the TodoListService web API.
141151

articles/active-directory/develop/scenario-protected-web-api-verification-scope-app-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ public class TodoListController : Controller
7373
/// The web API will accept only tokens that have the `access_as_user` scope for
7474
/// this API.
7575
/// </summary>
76-
static readonly string[] scopeRequiredByApi = new string[] { "access_as_user" };
76+
const string scopeRequiredByApi = "access_as_user";
7777

7878
// GET: api/values
7979
[HttpGet]

articles/active-directory/reports-monitoring/reports-faq.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ metadata:
1414
ms.devlang: na
1515
ms.topic: conceptual
1616
ms.subservice: report-monitor
17-
ms.date: 11/08/2021
17+
ms.date: 11/23/2021
1818
ms.author: markvi
1919
ms.reviewer: besiler
2020
ms.collection: M365-identity-device-management
@@ -87,6 +87,10 @@ sections:
8787
8888
- name: Sign-in logs
8989
questions:
90+
- question: |
91+
What data is included in the CSV file I can download from the Azure AD sign-in logs?
92+
answer: |
93+
The CSV includes sign-in logs for your users and service principals. However, data that is represented as a nested array in the MS Graph API for sign in logs is not included. For example, conditional access policies and report-only information are not included. If you need to export all the information contained in your sign-in logs, use the **Export Data Settings** feature.
9094
- question: |
9195
I see .XXX in part of the IP address from a user in my sign in logs. Why is that happening?
9296
answer: |

articles/active-directory/saas-apps/anaplan-tutorial.md

Lines changed: 40 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory integration with Anaplan | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Anaplan'
33
description: Learn how to configure single sign-on between Azure Active Directory and Anaplan.
44
services: active-directory
55
author: jeevansd
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 04/02/2021
12+
ms.date: 11/16/2021
1313
ms.author: jeedes
1414
---
15-
# Tutorial: Azure Active Directory integration with Anaplan
15+
# Tutorial: Azure AD SSO integration with Anaplan
1616

1717
In this tutorial, you'll learn how to integrate Anaplan with Azure Active Directory (Azure AD). When you integrate Anaplan with Azure AD, you can:
1818

@@ -112,7 +112,43 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
112112

113113
## Configure Anaplan SSO
114114

115-
To configure single sign-on on **Anaplan** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Anaplan support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
115+
1. Login to Anaplan website as an administrator.
116+
117+
1. In Administration page, navigate to **Security > Single Sign-On**.
118+
119+
1. Click **New**.
120+
121+
1. Perform the following steps in the **Metadata** tab:
122+
123+
![Screenshot for the security page](./media/anaplan-tutorial/security.png)
124+
125+
a. Enter a **Connection Name**, should match the name of your connection in the identity provider interface.
126+
127+
b. Select **Load from XML file** and enter the URL of the metadata XML file with your configuration information in the **Metadata URL** textbox.
128+
129+
C. Enabled the **Signed** toggle.
130+
131+
d. Click **Save** to create the connection.
132+
133+
1. When you upload a **metadata XML** file in the **Metadata** tab, the values in **Config** tab pre-populate with the information from that upload. You can skip this tab in your connection setup and click **Save**.
134+
135+
![Screenshot for the configuration page](./media/anaplan-tutorial/configuration.png)
136+
137+
1. Perform the following steps in the **Advanced** tab:
138+
139+
![Screenshot for the Advanced page](./media/anaplan-tutorial/advanced.png)
140+
141+
a. Select **Name ID Format** as Email Address from the dropdown and keep the remaining values as default.
142+
143+
b. Click **Save**.
144+
145+
1. In the **Workspaces** tab, specify the workspaces that will use the identity provider from the dropdown and Click **Save**.
146+
147+
![Screenshot for the Workspaces page](./media/anaplan-tutorial/Workspaces.png)
148+
149+
> [!NOTE]
150+
> Workspace connections are unique. If you have another connection already configured with a workspace, you cannot associate that workspace with a new connection.
151+
To access the original connection and update it, remove the workspace from the connection and then reassociate it with the new connection.
116152

117153
### Create Anaplan test user
118154

articles/active-directory/saas-apps/benq-iam-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/16/2021
12+
ms.date: 11/18/2021
1313
ms.author: jeedes
1414

1515
---
@@ -79,8 +79,8 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7979

8080
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
8181

82-
In the **Sign-on URL** text box, type the URL:
83-
`https://service-portal.benq.com/login`
82+
In the **Logout URL** text box, type the URL:
83+
`https://service-portal.benq.com/logout`
8484

8585
> [!NOTE]
8686
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [BenQ IAM Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.

0 commit comments

Comments
 (0)