Skip to content

Commit 059b6ff

Browse files
committed
Merge branch 'main' into release-preview-private-5g-core
2 parents 0b334a5 + f6f67cd commit 059b6ff

File tree

105 files changed

+40361
-781
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+40361
-781
lines changed

CODEOWNERS

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,6 @@ articles/azure-monitor/vm @bwren
2424
articles/advisor @rboucher
2525
articles/service-health @rboucher
2626

27-
28-
# Azure Active Directory
29-
/articles/active-directory-b2c/ @msmimart @yoelhor
30-
/articles/active-directory/app-provisioning/ @CelesteDG
31-
/articles/active-directory/develop/ @mmacy
32-
/articles/active-directory/manage-apps/ @CelesteDG
33-
3427
# Azure Synapse Analytics
3528
/articles/synapse-analytics/ @julieMSFT @ryanmajidi @saveenr
3629
/articles/synapse-analytics/backuprestore/ @joannapea @julieMSFT

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,14 +26,14 @@ This document focuses on enabling security key based passwordless authentication
2626
- [Azure AD Multi-Factor Authentication](howto-mfa-getstarted.md)
2727
- Enable [Combined security information registration](concept-registration-mfa-sspr-combined.md)
2828
- Compatible [FIDO2 security keys](concept-authentication-passwordless.md#fido2-security-keys)
29-
- WebAuthN requires Windows 10 version 1903 or higher**
29+
- WebAuthN requires Windows 10 version 1903 or higher
3030

3131
To use security keys for logging in to web apps and services, you must have a browser that supports the WebAuthN protocol.
3232
These include Microsoft Edge, Chrome, Firefox, and Safari.
3333

3434
## Prepare devices
3535

36-
For Azure AD joined devices the best experience is on Windows 10 version 1903 or higher.
36+
For Azure AD joined devices, the best experience is on Windows 10 version 1903 or higher.
3737

3838
Hybrid Azure AD joined devices must run Windows 10 version 2004 or higher.
3939

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To compute the assertion, you can use one of the many JWT libraries in the langu
4040

4141
Claim type | Value | Description
4242
---------- | ---------- | ----------
43-
`aud` | `https://login.microsoftonline.com/{tenantId}/v2.0` | The "aud" (audience) claim identifies the recipients that the JWT is intended for (here Azure AD) See [RFC 7519, Section 4.1.3](https://tools.ietf.org/html/rfc7519#section-4.1.3). In this case, that recipient is the login server (login.microsoftonline.com).
43+
`aud` | `https://login.microsoftonline.com/{tenantId}/V2.0/token` | The "aud" (audience) claim identifies the recipients that the JWT is intended for (here Azure AD) See [RFC 7519, Section 4.1.3](https://tools.ietf.org/html/rfc7519#section-4.1.3). In this case, that recipient is the login server (login.microsoftonline.com).
4444
`exp` | 1601519414 | The "exp" (expiration time) claim identifies the expiration time on or after which the JWT MUST NOT be accepted for processing. See [RFC 7519, Section 4.1.4](https://tools.ietf.org/html/rfc7519#section-4.1.4). This allows the assertion to be used until then, so keep it short - 5-10 minutes after `nbf` at most. Azure AD does not place restrictions on the `exp` time currently.
4545
`iss` | {ClientID} | The "iss" (issuer) claim identifies the principal that issued the JWT, in this case your client application. Use the GUID application ID.
4646
`jti` | (a Guid) | The "jti" (JWT ID) claim provides a unique identifier for the JWT. The identifier value MUST be assigned in a manner that ensures that there is a negligible probability that the same value will be accidentally assigned to a different data object; if the application uses multiple issuers, collisions MUST be prevented among values produced by different issuers as well. The "jti" value is a case-sensitive string. [RFC 7519, Section 4.1.7](https://tools.ietf.org/html/rfc7519#section-4.1.7)
@@ -62,7 +62,7 @@ The signature is computed by applying the certificate as described in the [JSON
6262
}
6363
.
6464
{
65-
"aud": "https: //login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/token",
65+
"aud": "https: //login.microsoftonline.com/contoso.onmicrosoft.com/oauth2/V2.0/token",
6666
"exp": 1484593341,
6767
"iss": "97e0a5b7-d745-40b6-94fe-5f77d35c6e05",
6868
"jti": "22b3bb26-e046-42df-9c96-65dbd72c1c81",

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -27,22 +27,20 @@ Azure AD stores audit events for up to 30 days in the audit log. However, you ca
2727

2828

2929
## Configure Azure AD to use Azure Monitor
30-
Before using the Azure Monitor workbooks, you must configure Azure AD to send a copy of its audit logs to Azure Monitor.
30+
Before you use the Azure Monitor workbooks, you must configure Azure AD to send a copy of its audit logs to Azure Monitor.
3131

3232
Archiving Azure AD audit logs requires you to have Azure Monitor in an Azure subscription. You can read more about the prerequisites and estimated costs of using Azure Monitor in [Azure AD activity logs in Azure Monitor](../reports-monitoring/concept-activity-logs-azure-monitor.md).
3333

34-
**Prerequisite role**: Global Admin
34+
**Prerequisite role**: Global Administrator
3535

3636
1. Sign in to the Azure portal as a user who is a Global Admin. Make sure you have access to the resource group containing the Azure Monitor workspace.
3737

3838
1. Select **Azure Active Directory** then click **Diagnostic settings** under Monitoring in the left navigation menu. Check if there's already a setting to send the audit logs to that workspace.
3939

40-
1. If there isn't already a setting, click **Add diagnostic setting**. Use the instructions in the article [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md#send-logs-to-azure-monitor)
41-
to send the Azure AD audit log to the Azure Monitor workspace.
40+
1. If there isn't already a setting, click **Add diagnostic setting**. Use the instructions in [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md#send-logs-to-azure-monitor) to send the Azure AD audit log to the Azure Monitor workspace.
4241

4342
![Diagnostics settings pane](./media/entitlement-management-logs-and-reporting/audit-log-diagnostics-settings.png)
4443

45-
4644
1. After the log is sent to Azure Monitor, select **Log Analytics workspaces**, and select the workspace that contains the Azure AD audit logs.
4745

4846
1. Select **Usage and estimated costs** and click **Data Retention**. Change the slider to the number of days you want to keep the data to meet your auditing requirements.
@@ -55,7 +53,6 @@ to send the Azure AD audit log to the Azure Monitor workspace.
5553

5654
1. Expand the section **Azure Active Directory Troubleshooting**, and click on **Archived Log Date Range**.
5755

58-
5956
## View events for an access package
6057

6158
To view events for an access package, you must have access to the underlying Azure monitor workspace (see [Manage access to log data and workspaces in Azure Monitor](../../azure-monitor/logs/manage-access.md#manage-access-using-azure-permissions) for information) and in one of the following roles:
@@ -188,5 +185,5 @@ $bResponse = Invoke-AzOperationalInsightsQuery -WorkspaceId $wks[0].CustomerId -
188185
$bResponse.Results |ft
189186
```
190187

191-
## Next steps:
188+
## Next steps
192189
- [Create interactive reports with Azure Monitor workbooks](../../azure-monitor/visualize/workbooks-overview.md)

0 commit comments

Comments
 (0)