Skip to content

Commit 020f8e9

Browse files
committed
2 parents 7b2bc17 + 6eabf9d commit 020f8e9

File tree

430 files changed

+6174
-5892
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

430 files changed

+6174
-5892
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1189,11 +1189,14 @@
11891189
"articles/data-catalog/.openpublishing.redirection.data-catalog.json",
11901190
"articles/data-factory/.openpublishing.redirection.data-factory.json",
11911191
"articles/data-lake-analytics/.openpublishing.redirection.data-lake-analytics.json",
1192+
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json",
1193+
"articles/dev-box/.openpublishing.redirection.dev-box.json",
11921194
"articles/digital-twins/.openpublishing.redirection.digital-twins.json",
11931195
"articles/event-grid/.openpublishing.redirection.event-grid.json",
11941196
"articles/event-hubs/.openpublishing.redirection.event-hubs.json",
11951197
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
11961198
"articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json",
1199+
"articles/internet-peering/.openpublishing.redirection.internet-peering.json",
11971200
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
11981201
"articles/iot-central/.openpublishing.redirection.iot-central.json",
11991202
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",
@@ -1208,9 +1211,12 @@
12081211
"articles/mariadb/.openpublishing.redirection.mariadb.json",
12091212
"articles/marketplace/.openpublishing.redirection.marketplace.json",
12101213
"articles/mysql/.openpublishing.redirection.mysql.json",
1214+
"articles/network-watcher/.openpublishing.redirection.network-watcher.json",
12111215
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
1216+
"articles/peering-service/.openpublishing.redirection.peering-service.json",
12121217
"articles/postgresql/.openpublishing.redirection.postgresql.json",
12131218
"articles/purview/.openpublishing.redirection.purview.json",
1219+
"articles/route-server/.openpublishing.redirection.route-server.json",
12141220
"articles/sap/.openpublishing.redirection.sap.json",
12151221
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
12161222
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
@@ -1220,10 +1226,6 @@
12201226
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
12211227
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
12221228
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
1223-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
1224-
"articles/dev-box/.openpublishing.redirection.dev-box.json",
1225-
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json",
1226-
"articles/network-watcher/.openpublishing.redirection.network-watcher.json",
1227-
"articles/route-server/.openpublishing.redirection.route-server.json"
1229+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
12281230
]
12291231
}

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5460,6 +5460,11 @@
54605460
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
54615461
"redirect_document_id": true
54625462
},
5463+
{
5464+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-azure-ad-sla-performance.md",
5465+
"redirect_url": "/azure/active-directory/reports-monitoring/reference-sla-performance",
5466+
"redirect_document_id": true
5467+
},
54635468
{
54645469
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-filter-audit-log.md",
54655470
"redirect_url": "/azure/active-directory/reports-monitoring/howto-customize-filter-logs",

.openpublishing.redirection.json

Lines changed: 4 additions & 129 deletions
Original file line numberDiff line numberDiff line change
@@ -14442,121 +14442,6 @@
1444214442
"redirect_url": "/azure/networking/fundamentals/networking-overview",
1444314443
"redirect_document_id": false
1444414444
},
14445-
{
14446-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview-create-using-portal.md",
14447-
"redirect_url": "/azure/network-watcher/connection-monitor-create-using-portal",
14448-
"redirect_document_id": false
14449-
},
14450-
{
14451-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview-create-using-arm-client.md",
14452-
"redirect_url": "/azure/network-watcher/connection-monitor-create-using-template",
14453-
"redirect_document_id": false
14454-
},
14455-
{
14456-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview.md",
14457-
"redirect_url": "/azure/network-watcher/connection-monitor-overview",
14458-
"redirect_document_id": false
14459-
},
14460-
{
14461-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-portal.md",
14462-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem",
14463-
"redirect_document_id": true
14464-
},
14465-
{
14466-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-cli.md",
14467-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-cli",
14468-
"redirect_document_id": true
14469-
},
14470-
{
14471-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-cli-nodejs.md",
14472-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-cli",
14473-
"redirect_document_id": false
14474-
},
14475-
{
14476-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-powershell.md",
14477-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-powershell",
14478-
"redirect_document_id": true
14479-
},
14480-
{
14481-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-portal.md",
14482-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem",
14483-
"redirect_document_id": true
14484-
},
14485-
{
14486-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-cli.md",
14487-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli",
14488-
"redirect_document_id": false
14489-
},
14490-
{
14491-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-cli-nodejs.md",
14492-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli",
14493-
"redirect_document_id": true
14494-
},
14495-
{
14496-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-powershell.md",
14497-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-powershell",
14498-
"redirect_document_id": true
14499-
},
14500-
{
14501-
"source_path_from_root": "/articles/network-watcher/migrate-to-connection-monitor-preview-from-connection-monitor.md",
14502-
"redirect_url": "/azure/network-watcher/migrate-to-connection-monitor-from-connection-monitor-classic",
14503-
"redirect_document_id": false
14504-
},
14505-
{
14506-
"source_path_from_root": "/articles/network-watcher/migrate-to-connection-monitor-preview-from-network-performance-monitor.md",
14507-
"redirect_url": "/azure/network-watcher/migrate-to-connection-monitor-from-network-performance-monitor",
14508-
"redirect_document_id": false
14509-
},
14510-
{
14511-
"source_path_from_root": "/articles/network-watcher/network-watcher-nsg-flow-logging-cli-nodejs.md",
14512-
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-cli",
14513-
"redirect_document_id": true
14514-
},
14515-
{
14516-
"source_path_from_root": "/articles/network-watcher/prepare-flow-log.md",
14517-
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-overview",
14518-
"redirect_document_id": true
14519-
},
14520-
{
14521-
"source_path_from_root": "/articles/network-watcher/network-watcher-packet-capture-manage-cli-nodejs.md",
14522-
"redirect_url": "/azure/network-watcher/network-watcher-packet-capture-manage-cli",
14523-
"redirect_document_id": true
14524-
},
14525-
{
14526-
"source_path_from_root": "/articles/network-watcher/network-watcher-security-group-view-cli-nodejs.md",
14527-
"redirect_url": "/azure/network-watcher/network-watcher-security-group-view-cli",
14528-
"redirect_document_id": true
14529-
},
14530-
{
14531-
"source_path_from_root": "/articles/network-watcher/network-watcher-troubleshoot-manage-cli-nodejs.md",
14532-
"redirect_url": "/azure/network-watcher/network-watcher-troubleshoot-manage-cli",
14533-
"redirect_document_id": true
14534-
},
14535-
{
14536-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-cli.md",
14537-
"redirect_url": "/azure/network-watcher/view-network-topology",
14538-
"redirect_document_id": false
14539-
},
14540-
{
14541-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-cli-nodejs.md",
14542-
"redirect_url": "/azure/network-watcher/view-network-topology",
14543-
"redirect_document_id": false
14544-
},
14545-
{
14546-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-overview.md",
14547-
"redirect_url": "/azure/network-watcher/view-network-topology",
14548-
"redirect_document_id": true
14549-
},
14550-
{
14551-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-powershell.md",
14552-
"redirect_url": "/azure/network-watcher/view-network-topology",
14553-
"redirect_document_id": false
14554-
},
14555-
{
14556-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-rest.md",
14557-
"redirect_url": "/azure/network-watcher/view-network-topology",
14558-
"redirect_document_id": false
14559-
},
1456014445
{
1456114446
"source_path_from_root": "/articles/notebooks/index.yml",
1456214447
"redirect_url": "https://notebooks.azure.com",
@@ -20357,16 +20242,6 @@
2035720242
"redirect_url": "/rest/api/load-balancer/loadbalancers/createorupdate",
2035820243
"redirect_document_id": false
2035920244
},
20360-
{
20361-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-rest.md",
20362-
"redirect_url": "/rest/api/network-watcher/networkwatchers/getnexthop",
20363-
"redirect_document_id": false
20364-
},
20365-
{
20366-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-rest.md",
20367-
"redirect_url": "/rest/api/network-watcher/networkwatchers/verifyipflow",
20368-
"redirect_document_id": false
20369-
},
2037020245
{
2037120246
"source_path_from_root": "/articles/resource-group-link-resources.md",
2037220247
"redirect_url": "/rest/api/resources/resourcelinks",
@@ -24543,22 +24418,22 @@
2454324418
},
2454424419
{
2454524420
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-01-register-app.md",
24546-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app.md",
24421+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app",
2454724422
"redirect_document_id": false
2454824423
},
2454924424
{
2455024425
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-02-prepare-spa.md",
24551-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa.md",
24426+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa",
2455224427
"redirect_document_id": false
2455324428
},
2455424429
{
2455524430
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md",
24556-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users.md",
24431+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users",
2455724432
"redirect_document_id": false
2455824433
},
2455924434
{
2456024435
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-04-call-api.md",
24561-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api.md",
24436+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api",
2456224437
"redirect_document_id": false
2456324438
}
2456424439
]

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 09/21/2023
11+
ms.date: 09/28/2023
1212
ms.reviewer: arvinh
1313
zone_pivot_groups: app-provisioning-cross-tenant-synchronization
1414
---
@@ -106,7 +106,7 @@ Attribute-mapping expressions can have a maximum of 10,000 characters.
106106

107107
#### Unsupported scoping filters
108108

109-
Directory extensions and the **appRoleAssignments**, **userType**, and **accountExpires** attributes aren't supported as scoping filters.
109+
The **appRoleAssignments**, **userType**, and **accountExpires** attributes aren't supported as scoping filters.
110110

111111
#### Multivalue directory extensions
112112

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.reviewer: chmutali
2424
This article explains how the integration works and how you can customize the provisioning behavior for different HR scenarios.
2525

2626
## Establishing connectivity
27-
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://apps.support.sap.com/sap/support/knowledge/en/2215682).
27+
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://help.sap.com/docs/SAP_SUCCESSFACTORS_PLATFORM/d599f15995d348a1b45ba5603e2aba9b/af2b8d5437494b12be88fe374eba75b6.html).
2828

2929
To further secure the connectivity between Microsoft Entra provisioning service and SuccessFactors, add the Microsoft Entra IP ranges in the SuccessFactors IP allowlist:
3030

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,10 @@ Copy the Response into a text file. It looks like the JSON text shown, with valu
5959
Here's the JSON block to add to the mapping.
6060

6161
```json
62-
{
63-
"key": "SkipOutOfScopeDeletions",
64-
"value": "True"
65-
}
62+
{
63+
"key": "SkipOutOfScopeDeletions",
64+
"value": "True"
65+
}
6666
```
6767

6868
## Step 4: Update the secrets endpoint with the SkipOutOfScopeDeletions flag

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 09/25/2023
9+
ms.date: 09/27/2023
1010

1111

1212
ms.author: justinha
@@ -49,15 +49,21 @@ Now we'll walk through each step:
4949

5050
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
5151

52-
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) or [`https://t<tenant id>.certauth.login.microsoftonline.com`](`https://t<tenant id>.certauth.login.microsoftonline.com`) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
52+
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
5353

54-
The endpoint performs TLS mutual authentication, and requests the client certificate as part of the TLS handshake. You'll see an entry for this request in the Sign-ins log.
54+
However, with the issue hints feature enabled (coming soon), the new certauth endpoint will change to `https://t{tenantid}.certauth.login.microsoftonline.com`.
55+
56+
The endpoint performs TLS mutual authentication, and requests the client certificate as part of the TLS handshake. You'll see an entry for this request in the Sign-ins log.
5557

56-
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-ins log in Microsoft Entra ID." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
57-
5858
>[!NOTE]
59-
>The network administrator should allow access to the User sign-in page and certauth endpoint *.certauth.login.microsoftonline.com for the customer’s cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
59+
>The network administrator should allow access to the User sign-in page and certauth endpoint `*.certauth.login.microsoftonline.com` for the customer's cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
60+
61+
Customers should make sure their TLS inspection disablement also work for the new url with issuer hints. Our recommendation is not to hardcode the url with tenantId as for B2B users the tenantId might change. Use a regular expression to allow both the old and new URL to work for TLS inspection disablement. For example, use `*.certauth.login.microsoftonline.com` or `*certauth.login.microsoftonline.com`for Azure Global tenants, and `*.certauth.login.microsoftonline.us` or `*certauth.login.microsoftonline.us` for Azure Government tenants, depending on the proxy used.
6062

63+
Without this change, certificate-based authentication will fail when you enable Issuer Hints feature.
64+
65+
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-ins log in Microsoft Entra ID." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
66+
6167
Click the log entry to bring up **Activity Details** and click **Authentication Details**. You'll see an entry for the X.509 certificate.
6268

6369
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/entry.png" alt-text="Screenshot of the entry for X.509 certificate.":::

0 commit comments

Comments
 (0)