Skip to content

Commit 0655cf1

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into jammart-storage-global-service-endpoints-ga
2 parents 6832563 + 5380b2d commit 0655cf1

File tree

551 files changed

+979
-595
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

551 files changed

+979
-595
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7234,7 +7234,7 @@
72347234
{
72357235
"source_path_from_root": "/articles/active-directory/active-directory-privileged-identity-management-how-to-add-role-to-user.md",
72367236
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-how-to-add-role-to-user",
7237-
"redirect_document_id": true
7237+
"redirect_document_id": false
72387238
},
72397239
{
72407240
"source_path_from_root": "/articles/active-directory/active-directory-privileged-identity-management-how-to-change-default-settings.md",
@@ -7551,6 +7551,11 @@
75517551
"redirect_url": "/azure/active-directory/roles/view-assignments",
75527552
"redirect_document_id": false
75537553
},
7554+
{
7555+
"source_path_from_root": "/articles/active-directory/roles/groups-pim-eligible.md",
7556+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-how-to-add-role-to-user",
7557+
"redirect_document_id": true
7558+
},
75547559
{
75557560
"source_path_from_root": "/articles/active-directory/users-groups-roles/directory-administrative-units.md",
75567561
"redirect_url": "/azure/active-directory/roles/administrative-units",
@@ -7668,8 +7673,8 @@
76687673
},
76697674
{
76707675
"source_path_from_root": "/articles/active-directory/users-groups-roles/roles-groups-pim-eligible.md",
7671-
"redirect_url": "/azure/active-directory/roles/groups-pim-eligible",
7672-
"redirect_document_id": true
7676+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-how-to-add-role-to-user",
7677+
"redirect_document_id": false
76737678
},
76747679
{
76757680
"source_path_from_root": "/articles/active-directory/users-groups-roles/roles-groups-remove-assignment.md",

articles/active-directory-b2c/manage-custom-policies-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ manager: CelesteDG
77

88
ms.service: active-directory
99
ms.workload: identity
10+
ms.custom: devx-track-azurepowershell
1011
ms.topic: how-to
1112
ms.date: 02/14/2020
1213
ms.author: kengaderdus

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ ms.assetid: 4eabfd8e-5509-4acd-86b5-1318147fddb5
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
12+
ms.custom: devx-track-arm-template
1213
ms.topic: how-to
1314
ms.date: 01/29/2023
1415
ms.author: justinha

articles/active-directory-domain-services/template-create-instance.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ manager: amycolannino
88
ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
11+
ms.custom: devx-track-arm-template
1112
ms.topic: sample
1213
ms.date: 01/29/2023
1314
ms.author: justinha

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.topic: how-to
1111
ms.date: 02/01/2023
1212
ms.author: cwerner
13-
ms.custom: aaddev, identityplatformtop40, subject-rbac-steps
13+
ms.custom: aaddev, identityplatformtop40, subject-rbac-steps, devx-track-arm-template
1414
---
1515

1616
# Create an Azure Active Directory application and service principal that can access resources
@@ -142,4 +142,4 @@ To configure access policies:
142142
- Learn how to use [Azure PowerShell](howto-authenticate-service-principal-powershell.md) or [Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli) to create a service principal.
143143
- To learn about specifying security policies, see [Azure role-based access control (Azure RBAC)](../../role-based-access-control/role-assignments-portal.md).
144144
- For a list of available actions that can be granted or denied to users, see [Azure Resource Manager Resource Provider operations](../../role-based-access-control/resource-provider-operations.md).
145-
- For information about working with app registrations by using **Microsoft Graph**, see the [Applications](/graph/api/resources/application) API reference.
145+
- For information about working with app registrations by using **Microsoft Graph**, see the [Applications](/graph/api/resources/application) API reference.

articles/active-directory/manage-apps/create-service-principal-cross-tenant.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,8 @@ ms.workload: identity
1111
ms.date: 07/26/2022
1212
ms.author: jomondi
1313
ms.reviewer: karavar
14-
ms.custom: mode-other
14+
ms.custom: mode-other, devx-track-azurecli
1515
zone_pivot_groups: enterprise-apps-cli
16-
17-
1816
#Customer intent: As an administrator of an Azure AD tenant, I want to create an enterprise application using client ID for a multi-tenant application provided by a service provider or independent software vendor.
1917
---
2018

@@ -107,4 +105,4 @@ You can use an API client such as [Graph Explorer](https://aka.ms/ge) to work wi
107105
## Next steps
108106

109107
- [Add RBAC role to the enterprise application](../../role-based-access-control/role-assignments-portal.md)
110-
- [Assign users to your application](add-application-portal-assign-users.md)
108+
- [Assign users to your application](add-application-portal-assign-users.md)

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sign-in.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ ms.author: barclayn
1616
ms.collection: M365-identity-device-management
1717
ms.tool: azure-cli, azure-powershell
1818
ms.devlang: azurecli
19+
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1920
---
2021

2122
# How to use managed identities for Azure resources on an Azure VM for sign-in

articles/active-directory/managed-identities-azure-resources/msi-tutorial-linux-vm-access-arm.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ ms.service: active-directory
1010
ms.subservice: msi
1111
ms.topic: tutorial
1212
ms.tgt_pltfrm: na
13+
ms.custom: devx-track-arm-template
1314
ms.workload: identity
1415
ms.date: 01/11/2022
1516
ms.author: barclayn

articles/active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.date: 01/11/2022
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
17-
ms.custom: mode-other
17+
ms.custom: mode-other, devx-track-arm-template
1818
---
1919

2020
# Configure managed identities for Azure resources on an Azure VM using templates

articles/active-directory/managed-identities-azure-resources/qs-configure-template-windows-vmss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.date: 01/11/2022
1515
ms.author: barclayn
1616
ms.collection: M365-identity-device-management
17-
ms.custom: mode-other
17+
ms.custom: mode-other, devx-track-arm-template
1818
---
1919

2020
# Configure managed identities for Azure resources on an Azure virtual machine scale using a template

0 commit comments

Comments
 (0)