Skip to content

Commit 0669fa1

Browse files
committed
Merge branch 'master' of https://github.com/microsoftdocs/azure-docs-pr into asb-migration
2 parents 158e932 + 3c6597c commit 0669fa1

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+628
-805
lines changed

.openpublishing.redirection.json

Lines changed: 22 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -19310,15 +19310,20 @@
1931019310
"redirect_url": "/azure/devtest-labs/use-paas-services",
1931119311
"redirect_document_id": true
1931219312
},
19313+
{
19314+
"source_path_from_root": "/articles/digital-twins/how-to-create-custom-sdks.md",
19315+
"redirect_url": "/azure/digital-twins/how-to-use-apis-sdks",
19316+
"redirect_document_id": false
19317+
},
1931319318
{
1931419319
"source_path_from_root": "/articles/digital-twins/quickstart-adt-explorer.md",
1931519320
"redirect_url": "/azure/digital-twins/quickstart-azure-digital-twins-explorer",
19316-
"redirect_document_id": false
19321+
"redirect_document_id": true
1931719322
},
1931819323
{
1931919324
"source_path_from_root": "/articles/digital-twins/how-to-interpret-event-data.md",
1932019325
"redirect_url": "/azure/digital-twins/concepts-event-notifications",
19321-
"redirect_document_id": false
19326+
"redirect_document_id": true
1932219327
},
1932319328
{
1932419329
"source_path_from_root": "/articles/digital-twins/how-to-integrate-models.md",
@@ -19328,17 +19333,17 @@
1932819333
{
1932919334
"source_path_from_root": "/articles/digital-twins/how-to-enable-private-link.md",
1933019335
"redirect_url": "/azure/digital-twins/how-to-enable-private-link-portal",
19331-
"redirect_document_id": false
19336+
"redirect_document_id": true
1933219337
},
1933319338
{
1933419339
"source_path_from_root": "/articles/digital-twins/how-to-enable-managed-identities.md",
1933519340
"redirect_url": "/azure/digital-twins/how-to-enable-managed-identities-portal",
19336-
"redirect_document_id": false
19341+
"redirect_document_id": true
1933719342
},
1933819343
{
1933919344
"source_path_from_root": "/articles/digital-twins/overview-differences.md",
1934019345
"redirect_url": "/azure/digital-twins/resources-compare-original-release",
19341-
"redirect_document_id": false
19346+
"redirect_document_id": true
1934219347
},
1934319348
{
1934419349
"source_path_from_root": "/articles/digital-twins/concepts-convert-models.md",
@@ -19353,7 +19358,7 @@
1935319358
{
1935419359
"source_path_from_root": "/articles/digital-twins/how-to-manage-routes.md",
1935519360
"redirect_url": "/azure/digital-twins/how-to-manage-routes-apis-cli",
19356-
"redirect_document_id": false
19361+
"redirect_document_id": true
1935719362
},
1935819363
{
1935919364
"source_path_from_root": "/articles/digital-twins/how-to-use-parser.md",
@@ -19363,22 +19368,22 @@
1936319368
{
1936419369
"source_path_from_root": "/articles/digital-twins/how-to-set-up-instance-manual.md",
1936519370
"redirect_url": "/azure/digital-twins/how-to-set-up-instance-cli",
19366-
"redirect_document_id": false
19371+
"redirect_document_id": true
1936719372
},
1936819373
{
1936919374
"source_path_from_root": "/articles/digital-twins/how-to-set-up-instance.md",
1937019375
"redirect_url": "/azure/digital-twins/how-to-set-up-instance-portal",
19371-
"redirect_document_id": false
19376+
"redirect_document_id": true
1937219377
},
1937319378
{
1937419379
"source_path_from_root": "/articles/digital-twins/how-to-configure-postman.md",
1937519380
"redirect_url": "/azure/digital-twins/how-to-use-postman",
19376-
"redirect_document_id": false
19381+
"redirect_document_id": true
1937719382
},
1937819383
{
1937919384
"source_path_from_root": "/articles/digital-twins/about-digital-twins.md",
1938019385
"redirect_url": "/azure/digital-twins/overview",
19381-
"redirect_document_id": false
19386+
"redirect_document_id": true
1938219387
},
1938319388
{
1938419389
"source_path_from_root": "/articles/cosmos-db/mongodb-migrate.md",
@@ -27237,8 +27242,13 @@
2723727242
},
2723827243
{
2723927244
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-existing-model.md",
27240-
"redirect_url": "/azure/machine-learning/how-to-deploy-existing-model",
27241-
"redirect_document_id": true
27245+
"redirect_url": "/azure/machine-learning/how-to-deploy-and-where",
27246+
"redirect_document_id": false
27247+
},
27248+
{
27249+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-existing-model.md",
27250+
"redirect_url": "/azure/machine-learning/how-to-deploy-and-where",
27251+
"redirect_document_id": false
2724227252
},
2724327253
{
2724427254
"source_path_from_root": "/articles/machine-learning/service/concept-accelerate-with-fpgas.md",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,8 @@
4545
href: tutorial-desktop-app-webapi.md
4646
- name: Single page
4747
href: tutorial-single-page-app-webapi.md
48+
- name: 6 - Clean up and delete tenant
49+
href: tutorial-delete-tenant.md
4850
- name: Samples
4951
href: code-samples.md
5052
- name: Concepts
59.5 KB
Loading
49.5 KB
Loading
60.8 KB
Loading
79.8 KB
Loading
79.7 KB
Loading
74.9 KB
Loading
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
---
2+
title: Clean up resources and delete a tenant - Azure Active Directory B2C
3+
description: Steps describing how to delete an Azure AD B2C tenant. Learn how to delete all tenant resources, and then delete the tenant.
4+
services: active-directory-b2c
5+
author: msmimart
6+
manager: celestedg
7+
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.topic: conceptual
11+
ms.date: 04/23/2021
12+
ms.author: mimart
13+
ms.subservice: B2C
14+
---
15+
16+
# Clean up resources and delete the tenant
17+
18+
When you've finished the Azure AD B2C tutorials, you can delete the tenant you used for testing or training. To delete the tenant, you'll first need to delete all tenant resources. In this article, you'll:
19+
20+
> [!div class="checklist"]
21+
> * Use the **Delete tenant** option to identify cleanup tasks
22+
> * Delete tenant resources (user flows, identity providers, applications, users)
23+
> * Delete the tenant
24+
25+
## Identify cleanup tasks
26+
27+
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
28+
29+
2. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
30+
31+
3. Select the **Azure Active Directory** service.
32+
33+
4. Under **Manage**, select **Properties**.
34+
35+
5. Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
36+
37+
6. Sign out of the Azure portal and then sign back in to refresh your access. Use the **Directory + subscription** filter in the top menu again to select the directory that contains your Azure AD B2C tenant.
38+
39+
7. Select the **Azure Active Directory** service.
40+
41+
8. On the **Overview** page, select **Delete tenant**. The **Required action** column indicates the resources you'll need to remove before you can delete the tenant.
42+
43+
![Delete tenant tasks](media/tutorial-delete-tenant/delete-tenant-tasks.png)
44+
45+
## Delete tenant resources
46+
47+
If you have the confirmation page open from the previous section, you can use the links in the **Required action** column to open the Azure portal pages where you can remove these resources. Or, you can remove tenant resources from within the Azure AD B2C service using the following steps.
48+
49+
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
50+
51+
2. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
52+
53+
3. Select the **Azure AD B2C** service. Or use the search box to find and select **Azure AD B2C**.
54+
55+
4. Delete all users *except* the admin account you're currently signed in as: Under **Manage**, select **Users**. On the **All users** page, select the checkbox next to each user (except the admin account you're currently signed in as). Select **Delete**, and then select **Yes** when prompted.
56+
57+
![Delete users](media/tutorial-delete-tenant/delete-users.png)
58+
59+
5. Delete app registrations and the *b2c-extensions-app*: Under **Manage**, select **App registrations**. Select the **All applications** tab. Select an application, and then select **Delete**. Repeat for all applications, including the **b2c-extensions-app** application.
60+
61+
![Delete application](media/tutorial-delete-tenant/delete-applications.png)
62+
63+
6. Delete any identity providers you configured: Under **Manage**, select **Identity providers**. Select an identity provider you configured, and then select **Remove**.
64+
65+
![Delete identity provider](media/tutorial-delete-tenant/identity-providers.png)
66+
67+
8. Delete user flows: Under **Policies**, select **User flows**. Next to each user flow, select the ellipses (...) and then select **Delete**.
68+
69+
![Delete user flows](media/tutorial-delete-tenant/user-flow.png)
70+
71+
9. Delete policy keys: Under **Policies**, select **Identity Experience Framework**, and then select **Policy keys**. Next to each policy key, select the ellipses (...) and then select **Delete**.
72+
73+
10. Delete custom policies: Under **Policies**, select **Identity Experience Framework**, select **Custom policies**, and then delete all policies.
74+
75+
## Delete the tenant
76+
77+
1. Sign in to the [Azure portal](https://portal.azure.com/) with a global administrator or subscription administrator role. Use the same work or school account or the same Microsoft account that you used to sign up for Azure.
78+
79+
2. Select the **Directory + subscription** filter in the top menu, and then select the directory that contains your Azure AD B2C tenant.
80+
81+
3. Select the **Azure Active Directory** service.
82+
83+
4. If you haven't already granted yourself access management permissions, do the following:
84+
85+
* Under **Manage**, select **Properties**.
86+
* Under **Access management for Azure resources**, select **Yes**, and then select **Save**.
87+
* Sign out of the Azure portal and then sign back in to refresh your access, and select the **Azure Active Directory** service.
88+
89+
5. On the **Overview** page, select **Delete tenant**.
90+
91+
![Delete the tenant](media/tutorial-delete-tenant/delete-tenant.png)
92+
93+
6. Follow the on-screen instructions to complete the process.
94+
95+
## Next steps
96+
97+
In this article, you learned how to:
98+
99+
> [!div class="checklist"]
100+
> * Delete your tenant resources
101+
> * Delete the tenant
102+
103+
Next, learn more about getting started with Azure AD B2C [user flows and custom policies](user-flow-overview.md).

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Active Directory sign-in activity reports - preview | Microsoft Docs
3-
description: Introduction to the sign-in activity reports in the Azure Active Directory portal
2+
title: Azure Active Directory sign-in activity logs - preview | Microsoft Docs
3+
description: Introduction to the sign-in activity logs in the Azure Active Directory portal
44
services: active-directory
55
documentationcenter: ''
66
author: MarkusVi
@@ -14,13 +14,13 @@ ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 04/19/2021
17+
ms.date: 04/23/2021
1818
ms.author: markvi
1919
ms.reviewer: besiler
2020

2121
ms.collection: M365-identity-device-management
2222
---
23-
# Azure Active Directory sign-in activity reports - preview
23+
# Azure Active Directory sign-in activity logs - preview
2424

2525
As an IT administrator, you want to know how your IT environment is doing. The information about your system’s health enables you to assess whether and how you need to respond to potential issues.
2626

@@ -31,15 +31,15 @@ To support you with this goal, the Azure Active Directory portal gives you acces
3131
- **[Provisioning](concept-provisioning-logs.md)** – Activities performed by the provisioning service, such as the creation of a group in ServiceNow or a user imported from Workday.
3232

3333

34-
The classic sign-ins report in Azure Active Directory provides you with an overview of interactive user sign-ins. In addition, you now have access to three additional sign-in reports that are now in preview:
34+
The classic sign-ins report in Azure Active Directory provides you with an overview of interactive user sign-ins. In addition, you now have access to three additional sign-in logs that are now in preview:
3535

3636
- Non-interactive user sign-ins
3737

3838
- Service principal sign-ins
3939

4040
- Managed identities for Azure resource sign-ins
4141

42-
This article gives you an overview of the sign-in activity report with the preview of non-interactive, application, and managed identities for Azure resources sign-ins. For information about the sign-in report without the preview features, see [Sign-in activity reports in the Azure Active Directory portal](concept-sign-ins.md).
42+
This article gives you an overview of the sign-in activity report with the preview of non-interactive, application, and managed identities for Azure resources sign-ins. For information about the sign-in report without the preview features, see [Sign-in activity logs in the Azure Active Directory portal](concept-sign-ins.md).
4343

4444

4545

@@ -61,7 +61,7 @@ Before you can start using this feature, you should know the answers to:
6161

6262
### What Azure AD license do you need to access sign-in activity?
6363

64-
Your tenant must have an Azure AD Premium license associated with it to see sign-in activities. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in the reports after you upgrade to a premium license with no data activities before the upgrade.
64+
Your tenant must have an Azure AD Premium license associated with it to see sign-in activities. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in the logs after you upgrade to a premium license with no data activities before the upgrade.
6565

6666

6767

@@ -367,12 +367,12 @@ The filter for interactive and non-interactive sign-ins is the same. Because of
367367

368368

369369

370-
## Access the new sign-in activity reports
370+
## Access the new sign-in activity logs
371371

372-
The sign-ins activity report in the Azure portal provides you with a simple method to switch the preview report on and off. If you have the preview reports enabled, you get a new menu that gives you access to all sign-in activity report types.
372+
The sign-ins activity report in the Azure portal provides you with a simple method to switch the preview report on and off. If you have the preview logs enabled, you get a new menu that gives you access to all sign-in activity report types.
373373

374374

375-
To access the new sign-in reports with non-interactive and application sign-ins:
375+
To access the new sign-in logs with non-interactive and application sign-ins:
376376

377377
1. In the [Azure portal](https://portal.azure.com), select **Azure Active Directory**.
378378

@@ -396,7 +396,7 @@ To access the new sign-in reports with non-interactive and application sign-ins:
396396

397397

398398

399-
## Download sign-in activity reports
399+
## Download sign-in activity logs
400400

401401
When you download a sign-in activity report, the following is true:
402402

@@ -409,7 +409,7 @@ When you download a sign-in activity report, the following is true:
409409
- The number of records you can download is constrained by the [Azure Active Directory report retention policies](reference-reports-data-retention.md).
410410

411411

412-
![Download reports](./media/concept-all-sign-ins/download-reports.png "Download reports")
412+
![Download logs](./media/concept-all-sign-ins/download-reports.png "Download logs")
413413

414414

415415
Each CSV download consists of six different files:

0 commit comments

Comments
 (0)