Skip to content

Commit 020d6ed

Browse files
authored
Merge pull request #191240 from MicrosoftDocs/main
Merge main to live, 4AM
2 parents 53d1dd0 + 451b2f8 commit 020d6ed

File tree

213 files changed

+2304
-1560
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

213 files changed

+2304
-1560
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,11 @@
6060
"redirect_url": "/azure/defender-for-cloud/os-coverage",
6161
"redirect_document_id": false
6262
},
63+
{
64+
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds.md",
65+
"redirect_url": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
66+
"redirect_document_id": false
67+
},
6368
{
6469
"source_path_from_root": "/articles/security-center/security-center-just-in-time.md",
6570
"redirect_url": "/azure/defender-for-cloud/just-in-time-access-usage",
@@ -632,7 +637,7 @@
632637
},
633638
{
634639
"source_path_from_root": "/articles/security-center/supported-machines-endpoint-solutions-clouds.md",
635-
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds",
640+
"redirect_url": "/azure/defender-for-cloud/supported-machines-endpoint-solutions-clouds-containers",
636641
"redirect_document_id": true
637642
},
638643
{

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ The following limitations apply to using SSPR from the Windows sign-in screen:
4545
- *BlockNonAdminUserInstall* is set to enabled or 1
4646
- *EnableLostMode* is set on the device
4747
- Explorer.exe is replaced with a custom shell
48+
- Interactive logon: Require smart card is set to enabled or 1
4849
- The combination of the following specific three settings can cause this feature to not work.
4950
- Interactive logon: Do not require CTRL+ALT+DEL = Disabled
5051
- *DisableLockScreenAppNotifications* = 1 or Enabled

articles/active-directory/develop/developer-support-help-options.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,8 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 10/28/2021
12+
ms.date: 03/09/2022
1313
ms.author: marsma
14-
ms.reviewer: jmprieur, saeeda
1514
ms.custom: has-adal-ref
1615
---
1716

@@ -85,3 +84,11 @@ If you need help with one of the Microsoft Authentication Libraries (MSAL), open
8584
- [Azure Active Directory Identity Blog](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/bg-p/Identity): Get news and information about Azure AD.
8685

8786
- [Tech Community](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/bg-p/Identity/): Share your experiences, engage, and learn from experts.
87+
88+
## Share your product ideas
89+
90+
Have an idea for improving the for the Microsoft identity platform? Browse and vote for ideas submitted by others or submit your own:
91+
92+
https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789
93+
94+

articles/active-directory/manage-apps/f5-big-ip-sap-erp-easy-button.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,7 +259,7 @@ Selected policies should either have an **Include** or **Exclude** option checke
259259
![ Screenshot for CA policies](./media/f5-big-ip-easy-button-ldap/conditional-access-policy.png)
260260

261261
>[!NOTE]
262-
>The policy list is enumerated only once when first switching to this tab. A refresh button is available to manually force the wizard to query your tenant, but this button is displayed only when the application has been deployed.
262+
>The policy list is enumerated only once when first switching to this tab. A refresh button is available to manually force the wizard to query your tenant, but this button is displayed only when the application has been deployed.
263263
264264
### Virtual Server Properties
265265

-30.5 KB
Loading

articles/active-directory/roles/admin-units-assign-roles.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.topic: how-to
1010
ms.subservice: roles
1111
ms.workload: identity
12-
ms.date: 01/28/2022
12+
ms.date: 03/07/2022
1313
ms.author: rolyon
1414
ms.reviewer: anandy
1515
ms.custom: oldportal;it-pro;
@@ -18,7 +18,11 @@ ms.collection: M365-identity-device-management
1818

1919
# Assign Azure AD roles with administrative unit scope
2020

21-
In Azure Active Directory (Azure AD), for more granular administrative control, you can assign an Azure AD role with a scope that's limited to one or more administrative units.
21+
In Azure Active Directory (Azure AD), for more granular administrative control, you can assign an Azure AD role with a scope that's limited to one or more administrative units. When an Azure AD role is assigned at the scope of an administrative unit, role permissions apply only when managing members of the administrative unit itself, and do not apply to tenant-wide settings or configurations.
22+
23+
For example, an administrator who is assigned the Groups Administrator role at the scope of an administrative unit can manage groups that are members of the administrative unit, but they cannot manage other groups in the tenant. They also cannot manage tenant-level settings related to groups, such as expiration or group naming policies.
24+
25+
This article describes how to assign Azure AD roles with administrative unit scope.
2226

2327
## Prerequisites
2428

@@ -37,17 +41,15 @@ The following Azure AD roles can be assigned with administrative unit scope:
3741
| Role | Description |
3842
| -----| ----------- |
3943
| [Authentication Administrator](permissions-reference.md#authentication-administrator) | Has access to view, set, and reset authentication method information for any non-admin user in the assigned administrative unit only. |
40-
| [Groups Administrator](permissions-reference.md#groups-administrator) | Can manage all aspects of groups and groups settings, such as naming and expiration policies, in the assigned administrative unit only. |
44+
| [Groups Administrator](permissions-reference.md#groups-administrator) | Can manage all aspects of groups in the assigned administrative unit only. |
4145
| [Helpdesk Administrator](permissions-reference.md#helpdesk-administrator) | Can reset passwords for non-administrators in the assigned administrative unit only. |
4246
| [License Administrator](permissions-reference.md#license-administrator) | Can assign, remove, and update license assignments within the administrative unit only. |
4347
| [Password Administrator](permissions-reference.md#password-administrator) | Can reset passwords for non-administrators within the assigned administrative unit only. |
44-
| [SharePoint Administrator](permissions-reference.md#sharepoint-administrator) * | Can manage all aspects of the SharePoint service. |
45-
| [Teams Administrator](permissions-reference.md#teams-administrator) * | Can manage the Microsoft Teams service. |
48+
| [SharePoint Administrator](permissions-reference.md#sharepoint-administrator) | Can manage Microsoft 365 groups in the assigned administrative unit only. For SharePoint sites associated with Microsoft 365 groups in an administrative unit, can also update site properties (site name, URL, and external sharing policy) using the Microsoft 365 admin center. Cannot use the SharePoint admin center or SharePoint APIs to manage sites. |
49+
| [Teams Administrator](permissions-reference.md#teams-administrator) | Can manage Microsoft 365 groups in the assigned administrative unit only. Can manage team members in the Microsoft 365 admin center for teams associated with groups in the assigned administrative unit only. Cannot use the Teams admin center. |
4650
| [Teams Devices Administrator](permissions-reference.md#teams-devices-administrator) | Can perform management related tasks on Teams certified devices. |
4751
| [User Administrator](permissions-reference.md#user-administrator) | Can manage all aspects of users and groups, including resetting passwords for limited admins within the assigned administrative unit only. |
4852

49-
(*) The SharePoint Administrator and Teams Administrator roles can only be used for managing properties in the Microsoft 365 admin center. Teams admin center and SharePoint admin center currently do not support administrative unit-scoped administration.
50-
5153
Certain role permissions apply only to non-administrator users when assigned with the scope of an administrative unit. In other words, administrative unit scoped [Helpdesk Administrators](permissions-reference.md#helpdesk-administrator) can reset passwords for users in the administrative unit only if those users do not have administrator roles. The following list of permissions are restricted when the target of an action is another administrator:
5254

5355
- Read and modify user authentication methods, or reset user passwords

articles/active-directory/saas-apps/sonarqube-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
162162

163163
### Create Sonarqube test user
164164

165-
In this section, you create a user called B.Simon in Sonarqube. Work with [Sonarqube Client support team](https://www.sonarsource.com/support/) to add the users in the Sonarqube platform. Users must be created and activated before you use single sign-on.
165+
In this section, you create a user called B.Simon in Sonarqube. Work with [Sonarqube Client support team](https://sonarsource.com/company/contact/) to add the users in the Sonarqube platform. Users must be created and activated before you use single sign-on.
166166

167167
## Test SSO
168168

articles/app-service/tutorial-python-postgresql-app.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,9 @@ In your Python code, you use these settings as environment variables with statem
342342

343343
Having issues? Refer first to the [Troubleshooting guide](configure-language-python.md#troubleshooting), otherwise, [let us know](https://aka.ms/DjangoCLITutorialHelp).
344344

345+
> [!NOTE]
346+
> If you want to try an alternative approach to connect your app to the Postgres database in Azure, see the [Service Connector version](../service-connector/tutorial-django-webapp-postgres-cli.md) of this tutorial. Service Connector is a new Azure service that is currently in public preview. [Section 4.2](../service-connector/tutorial-django-webapp-postgres-cli.md#42-configure-environment-variables-to-connect-the-database) of that tutorial introduces a simplified process for creating the connection.
347+
345348
### 4.3 Run Django database migrations
346349

347350
Django database migrations ensure that the schema in the PostgreSQL on Azure database matches with those described in your code.
@@ -587,4 +590,4 @@ Learn how to map a custom DNS name to your app:
587590
Learn how App Service runs a Python app:
588591

589592
> [!div class="nextstepaction"]
590-
> [Configure Python app](configure-language-python.md)
593+
> [Configure Python app](configure-language-python.md)

articles/azure-app-configuration/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,8 @@
124124
href: concept-feature-management.md
125125
- name: Event handling
126126
href: concept-app-configuration-event.md
127+
- name: Soft delete
128+
href: concept-soft-delete.md
127129
- name: Security
128130
items:
129131
- name: Encrypt using customer-managed keys
@@ -162,6 +164,8 @@
162164
href: howto-convert-to-the-new-spring-boot.md
163165
- name: Move a resource between Azure regions
164166
href: howto-move-resource-between-regions.md
167+
- name: Recover App Configuration stores (Preview)
168+
href: howto-recover-deleted-stores-in-azure-app-configuration.md
165169
- name: Reference
166170
items:
167171
- name: Client libraries
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Soft Delete in Azure App Configuration
3+
description: Soft Delete in Azure App Configuration
4+
author: muksvso
5+
ms.author: mubatra
6+
ms.service: azure-app-configuration
7+
ms.custom: devx-track-dotnet
8+
ms.topic: conceptual
9+
ms.date: 03/01/2022
10+
---
11+
12+
# Soft delete
13+
14+
Azure App Configuration's Soft delete feature allows recovery of your data such as key-values, feature flags, and revision history of a deleted store. It's automatically enabled for all stores in the standard tier. In this article, learn more about the soft delete feature and its functionality.
15+
16+
Learn how to [recover Azure App Configuration stores](./howto-recover-deleted-stores-in-azure-app-configuration.md) using the soft delete feature.
17+
18+
> [!NOTE]
19+
> When an App Configuration store is soft-deleted, services that are integrated with the store will be deleted. For example Azure RBAC roles assignments, managed identity, Event Grid subscriptions, and private endpoints. Recovering a soft-deleted App Configuration store will not restore these services. They will need to be recreated.
20+
21+
## Scenarios
22+
23+
The soft delete feature addresses the recovery of the deleted stores, whether the deletion was accidental or intentional. The soft delete feature will act as a safeguard in the following scenarios:
24+
25+
* **Recovery of a deleted App Configuration store**: A deleted app configuration store could be recovered in the retention time period.
26+
27+
* **Permanent deletion of App Configuration store**: This feature helps you to permanently delete an app configuration store.
28+
29+
## Recover
30+
Recover is the operation to get the stores in a soft deleted state back to an active state where one can request the store for configuration and feature management.
31+
32+
## Retention period
33+
A variable to specify the time period, in days, for which a soft deleted store will be retained. This value can only be set at the creation of store and once set, it can't be changed. Once the retention period elapses, the store will be permanently deleted automatically.
34+
35+
## Purge
36+
Purge is the operation to permanently delete the stores in a soft deleted state, provided the store doesn't have purge-protection enabled. To recreate the App Configuration store with the same name as a deleted store, you need to purge the store first if it's not already past the retention period.
37+
38+
## Purge protection
39+
With Purge protection enabled, soft deleted stores can't be purged in the retention period. If disabled, the soft deleted store can be purged before the retention period expires. Once purge protection is enabled on a store, it can't be disabled.
40+
41+
## Permissions to recover or purge store
42+
43+
A user has to have below permissions to recover or purge a soft-deleted app configuration store. The built-in Contributor and Owner roles already have the required permissions to recover and purge.
44+
45+
- Permission to recover - `Microsoft.AppConfiguration/configurationStores/write`
46+
47+
- Permission to purge - `Microsoft.AppConfiguration/configurationStores/action`
48+
49+
## Billing implications
50+
51+
There won't be any charges for the soft deleted stores. Once you recover a soft deleted store, the usual charges will start applying. Soft delete isn't available with free tier.
52+
53+
## Next steps
54+
55+
> [!div class="nextstepaction"]
56+
> [Recover Azure App Configuration stores](./howto-recover-deleted-stores-in-azure-app-configuration.md)

0 commit comments

Comments
 (0)