Skip to content

Commit 0aff8a0

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into privlink-patch
2 parents be63e4c + c4108cb commit 0aff8a0

14 files changed

+244
-204
lines changed

articles/active-directory/roles/permissions-reference.md

Lines changed: 5 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: roles
1111
ms.topic: reference
12-
ms.date: 06/27/2022
12+
ms.date: 07/18/2022
1313
ms.author: rolyon
1414
ms.reviewer: abhijeetsinha
1515
ms.custom: generated, it-pro, fasttrack-edit
@@ -327,18 +327,10 @@ Users with this role can't change the credentials or reset MFA for members and o
327327
> | --- | --- |
328328
> | microsoft.directory/users/authenticationMethods/create | Create authentication methods for users |
329329
> | microsoft.directory/users/authenticationMethods/delete | Delete authentication methods for users |
330-
> | microsoft.directory/users/authenticationMethods/standard/read | Read standard properties of authentication methods for users |
330+
> | microsoft.directory/users/authenticationMethods/standard/restrictedRead | Read standard properties of authentication methods that do not include personally identifiable information for users |
331331
> | microsoft.directory/users/authenticationMethods/basic/update | Update basic properties of authentication methods for users |
332-
> | microsoft.directory/deletedItems.users/restore | Restore soft deleted users to original state |
333-
> | microsoft.directory/users/delete | Delete users |
334-
> | microsoft.directory/users/disable | Disable users |
335-
> | microsoft.directory/users/enable | Enable users |
336332
> | microsoft.directory/users/invalidateAllRefreshTokens | Force sign-out by invalidating user refresh tokens |
337-
> | microsoft.directory/users/restore | Restore deleted users |
338-
> | microsoft.directory/users/basic/update | Update basic properties on users |
339-
> | microsoft.directory/users/manager/update | Update manager for users |
340333
> | microsoft.directory/users/password/update | Reset passwords for all users |
341-
> | microsoft.directory/users/userPrincipalName/update | Update User Principal Name of users |
342334
> | microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health |
343335
> | microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets |
344336
> | microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Service Health in the Microsoft 365 admin center |
@@ -879,7 +871,6 @@ Users with this role have read access to recipients and write access to the attr
879871
> | Actions | Description |
880872
> | --- | --- |
881873
> | microsoft.office365.exchange/allRecipients/allProperties/allTasks | Create and delete all recipients, and read and update all properties of recipients in Exchange Online |
882-
> | microsoft.office365.exchange/messageTracking/allProperties/allTasks | Manage all tasks in message tracking in Exchange Online |
883874
> | microsoft.office365.exchange/migration/allProperties/allTasks | Manage all tasks related to migration of recipients in Exchange Online |
884875
885876
## External ID User Flow Administrator
@@ -1566,6 +1557,7 @@ Do not use. This role has been deprecated and will be removed from Azure AD in t
15661557
> | microsoft.directory/contacts/delete | Delete contacts |
15671558
> | microsoft.directory/contacts/basic/update | Update basic properties on contacts |
15681559
> | microsoft.directory/deletedItems.groups/restore | Restore soft deleted groups to original state |
1560+
> | microsoft.directory/deletedItems.users/delete | Permanently delete users, which can no longer be restored |
15691561
> | microsoft.directory/deletedItems.users/restore | Restore soft deleted users to original state |
15701562
> | microsoft.directory/groups/create | Create Security groups and Microsoft 365 groups, excluding role-assignable groups |
15711563
> | microsoft.directory/groups/delete | Delete Security groups and Microsoft 365 groups, excluding role-assignable groups |
@@ -1616,6 +1608,7 @@ Do not use. This role has been deprecated and will be removed from Azure AD in t
16161608
> | microsoft.directory/contacts/delete | Delete contacts |
16171609
> | microsoft.directory/contacts/basic/update | Update basic properties on contacts |
16181610
> | microsoft.directory/deletedItems.groups/restore | Restore soft deleted groups to original state |
1611+
> | microsoft.directory/deletedItems.users/delete | Permanently delete users, which can no longer be restored |
16191612
> | microsoft.directory/deletedItems.users/restore | Restore soft deleted users to original state |
16201613
> | microsoft.directory/domains/allProperties/allTasks | Create and delete domains, and read and update all properties |
16211614
> | microsoft.directory/groups/create | Create Security groups and Microsoft 365 groups, excluding role-assignable groups |
@@ -1724,7 +1717,7 @@ The [Authentication Administrator](#authentication-administrator) role has permi
17241717
The [Authentication Policy Administrator](#authentication-policy-administrator) role has permissions to set the tenant's authentication method policy that determines which methods each user can register and use.
17251718

17261719
| Role | Manage user's auth methods | Manage per-user MFA | Manage MFA settings | Manage auth method policy | Manage password protection policy | Update sensitive attributes |
1727-
| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
1720+
| ---- | ---- | ---- | ---- | ---- | ---- | ---- |
17281721
| Authentication Administrator | Yes for some users (see above) | Yes for some users (see above) | No | No | No | Yes for some users (see above) |
17291722
| Privileged Authentication Administrator| Yes for all users | Yes for all users | No | No | No | Yes for all users |
17301723
| Authentication Policy Administrator | No | No | Yes | Yes | Yes | No |
@@ -1749,16 +1742,8 @@ The [Authentication Policy Administrator](#authentication-policy-administrator)
17491742
> | microsoft.directory/users/authenticationMethods/delete | Delete authentication methods for users |
17501743
> | microsoft.directory/users/authenticationMethods/standard/read | Read standard properties of authentication methods for users |
17511744
> | microsoft.directory/users/authenticationMethods/basic/update | Update basic properties of authentication methods for users |
1752-
> | microsoft.directory/deletedItems.users/restore | Restore soft deleted users to original state |
1753-
> | microsoft.directory/users/delete | Delete users |
1754-
> | microsoft.directory/users/disable | Disable users |
1755-
> | microsoft.directory/users/enable | Enable users |
17561745
> | microsoft.directory/users/invalidateAllRefreshTokens | Force sign-out by invalidating user refresh tokens |
1757-
> | microsoft.directory/users/restore | Restore deleted users |
1758-
> | microsoft.directory/users/basic/update | Update basic properties on users |
1759-
> | microsoft.directory/users/manager/update | Update manager for users |
17601746
> | microsoft.directory/users/password/update | Reset passwords for all users |
1761-
> | microsoft.directory/users/userPrincipalName/update | Update User Principal Name of users |
17621747
> | microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health |
17631748
> | microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets |
17641749
> | microsoft.office365.serviceHealth/allEntities/allTasks | Read and configure Service Health in the Microsoft 365 admin center |
@@ -2185,15 +2170,10 @@ Users with this role can't change the credentials or reset MFA for members and o
21852170
> | microsoft.directory/accessReviews/definitions.groups/create | Create access reviews for membership in Security and Microsoft 365 groups. |
21862171
> | microsoft.directory/accessReviews/definitions.groups/delete | Delete access reviews for membership in Security and Microsoft 365 groups. |
21872172
> | microsoft.directory/accessReviews/definitions.groups/allProperties/read | Read all properties of access reviews for membership in Security and Microsoft 365 groups, including role-assignable groups. |
2188-
> | microsoft.directory/users/authenticationMethods/create | Create authentication methods for users |
2189-
> | microsoft.directory/users/authenticationMethods/delete | Delete authentication methods for users |
2190-
> | microsoft.directory/users/authenticationMethods/standard/read | Read standard properties of authentication methods for users |
2191-
> | microsoft.directory/users/authenticationMethods/basic/update | Update basic properties of authentication methods for users |
21922173
> | microsoft.directory/contacts/create | Create contacts |
21932174
> | microsoft.directory/contacts/delete | Delete contacts |
21942175
> | microsoft.directory/contacts/basic/update | Update basic properties on contacts |
21952176
> | microsoft.directory/deletedItems.groups/restore | Restore soft deleted groups to original state |
2196-
> | microsoft.directory/deletedItems.users/restore | Restore soft deleted users to original state |
21972177
> | microsoft.directory/entitlementManagement/allProperties/allTasks | Create and delete resources, and read and update all properties in Azure AD entitlement management |
21982178
> | microsoft.directory/groups/assignLicense | Assign product licenses to groups for group-based licensing |
21992179
> | microsoft.directory/groups/create | Create Security groups and Microsoft 365 groups, excluding role-assignable groups |

articles/azure-monitor/logs/logs-ingestion-api-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ ms.date: 06/27/2022
99
# Logs ingestion API in Azure Monitor (Preview)
1010
The Logs ingestion API in Azure Monitor lets you send data to a Log Analytics workspace from any REST API client. This allows you to send data from virtually any source to [supported built-in tables](#supported-tables) or to custom tables that you create. You can even extend the schema of built-in tables with custom columns.
1111

12-
[!INCLUDE [Sign up for preview](../../../includes/azure-monitor-custom-logs-signup.md)]
13-
1412
> [!NOTE]
1513
> The Logs ingestion API was previously referred to as the custom logs API.
1614

articles/azure-monitor/logs/tutorial-logs-ingestion-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,6 @@ ms.date: 07/15/2022
88
# Tutorial: Send data to Azure Monitor Logs using REST API (Resource Manager templates)
99
[Logs ingestion API (preview)](logs-ingestion-api-overview.md) in Azure Monitor allow you to send external data to a Log Analytics workspace with a REST API. This tutorial uses Resource Manager templates to walk through configuration of a new table and a sample application to send log data to Azure Monitor.
1010

11-
[!INCLUDE [Sign up for preview](../../../includes/azure-monitor-custom-logs-signup.md)]
12-
1311
> [!NOTE]
1412
> This tutorial uses Resource Manager templates and REST API to configure custom logs. See [Tutorial: Send data to Azure Monitor Logs using REST API (Azure portal)](tutorial-logs-ingestion-portal.md) for a similar tutorial using the Azure portal.
1513

articles/azure-monitor/logs/tutorial-logs-ingestion-portal.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,6 @@ ms.date: 07/15/2022
88
# Tutorial: Send data to Azure Monitor Logs using REST API (Azure portal)
99
[Logs ingestion API (preview)](logs-ingestion-api-overview.md) in Azure Monitor allow you to send external data to a Log Analytics workspace with a REST API. This tutorial uses the Azure portal to walk through configuration of a new table and a sample application to send log data to Azure Monitor.
1010

11-
[!INCLUDE [Sign up for preview](../../../includes/azure-monitor-custom-logs-signup.md)]
12-
1311
> [!NOTE]
1412
> This tutorial uses the Azure portal. See [Tutorial: Send data to Azure Monitor Logs using REST API (Resource Manager templates)](tutorial-logs-ingestion-api.md) for a similar tutorial using resource manager templates.
1513

articles/azure-monitor/logs/tutorial-workspace-transformations-api.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ This tutorial walks you through configuration of a sample [transformation in a w
1010

1111
Workspace transformations are stored together in a single [data collection rule (DCR)](../essentials/data-collection-rule-overview.md) for the workspace, called the workspace DCR. Each transformation is associated with a particular table. The transformation will be applied to all data sent to this table from any workflow not using a DCR.
1212

13-
[!INCLUDE [Sign up for preview](../../../includes/azure-monitor-custom-logs-signup.md)]
14-
1513
> [!NOTE]
1614
> This tutorial uses resource manager templates and REST API to configure a workspace transformation. See [Tutorial: Add transformation in workspace data collection rule to Azure Monitor using the Azure portal (preview)](tutorial-workspace-transformations-portal.md) for the same tutorial using the Azure portal.
1715

articles/azure-monitor/logs/tutorial-workspace-transformations-portal.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,8 +10,6 @@ This tutorial walks you through configuration of a sample [transformation in a w
1010

1111
Workspace transformations are stored together in a single [data collection rule (DCR)](../essentials/data-collection-rule-overview.md) for the workspace, called the workspace DCR. Each transformation is associated with a particular table. The transformation will be applied to all data sent to this table from any workflow not using a DCR.
1212

13-
[!INCLUDE [Sign up for preview](../../../includes/azure-monitor-custom-logs-signup.md)]
14-
1513
> [!NOTE]
1614
> This tutorial uses the Azure portal to configure a workspace transformation. See [Tutorial: Add transformation in workspace data collection rule to Azure Monitor using resource manager templates (preview)](tutorial-workspace-transformations-api.md) for the same tutorial using resource manager templates and REST API.
1715

articles/role-based-access-control/built-in-roles.md

Lines changed: 21 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: reference
77
ms.workload: identity
88
author: rolyon
99
ms.author: rolyon
10-
ms.date: 06/22/2022
10+
ms.date: 07/18/2022
1111
ms.custom: generated
1212
---
1313

@@ -9207,6 +9207,10 @@ Can manage Azure AD Domain Services and related network configurations [Learn mo
92079207
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/AlertRules/Resolved/Action | Classic metric alert resolved |
92089208
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/AlertRules/Throttled/Action | Classic metric alert rule throttled |
92099209
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/AlertRules/Incidents/Read | Read a classic metric alert incident |
9210+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/Logs/Read | Reading data from all your logs |
9211+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/Metrics/Read | Read metrics |
9212+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/DiagnosticSettings/* | Creates, updates, or reads the diagnostic setting for Analysis Server |
9213+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/DiagnosticSettingsCategories/Read | Read diagnostic settings categories |
92109214
> | [Microsoft.AAD](resource-provider-operations.md#microsoftaad)/register/action | Register Domain Service |
92119215
> | [Microsoft.AAD](resource-provider-operations.md#microsoftaad)/unregister/action | Unregister Domain Service |
92129216
> | [Microsoft.AAD](resource-provider-operations.md#microsoftaad)/domainServices/* | |
@@ -9290,6 +9294,10 @@ Can manage Azure AD Domain Services and related network configurations [Learn mo
92909294
"Microsoft.Insights/AlertRules/Resolved/Action",
92919295
"Microsoft.Insights/AlertRules/Throttled/Action",
92929296
"Microsoft.Insights/AlertRules/Incidents/Read",
9297+
"Microsoft.Insights/Logs/Read",
9298+
"Microsoft.Insights/Metrics/Read",
9299+
"Microsoft.Insights/DiagnosticSettings/*",
9300+
"Microsoft.Insights/DiagnosticSettingsCategories/Read",
92939301
"Microsoft.AAD/register/action",
92949302
"Microsoft.AAD/unregister/action",
92959303
"Microsoft.AAD/domainServices/*",
@@ -9363,6 +9371,10 @@ Can view Azure AD Domain Services and related network configurations
93639371
> | [Microsoft.Resources](resource-provider-operations.md#microsoftresources)/subscriptions/resourceGroups/read | Gets or lists resource groups. |
93649372
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/AlertRules/Read | Read a classic metric alert |
93659373
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/AlertRules/Incidents/Read | Read a classic metric alert incident |
9374+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/Logs/Read | Reading data from all your logs |
9375+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/Metrics/read | Read metrics |
9376+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/DiagnosticSettings/read | Read a resource diagnostic setting |
9377+
> | [Microsoft.Insights](resource-provider-operations.md#microsoftinsights)/DiagnosticSettingsCategories/Read | Read diagnostic settings categories |
93669378
> | [Microsoft.AAD](resource-provider-operations.md#microsoftaad)/domainServices/*/read | |
93679379
> | [Microsoft.Network](resource-provider-operations.md#microsoftnetwork)/virtualNetworks/read | Get the virtual network definition |
93689380
> | [Microsoft.Network](resource-provider-operations.md#microsoftnetwork)/virtualNetworks/subnets/read | Gets a virtual network subnet definition |
@@ -9405,6 +9417,10 @@ Can view Azure AD Domain Services and related network configurations
94059417
"Microsoft.Resources/subscriptions/resourceGroups/read",
94069418
"Microsoft.Insights/AlertRules/Read",
94079419
"Microsoft.Insights/AlertRules/Incidents/Read",
9420+
"Microsoft.Insights/Logs/Read",
9421+
"Microsoft.Insights/Metrics/read",
9422+
"Microsoft.Insights/DiagnosticSettings/read",
9423+
"Microsoft.Insights/DiagnosticSettingsCategories/Read",
94089424
"Microsoft.AAD/domainServices/*/read",
94099425
"Microsoft.Network/virtualNetworks/read",
94109426
"Microsoft.Network/virtualNetworks/subnets/read",
@@ -11156,7 +11172,7 @@ Can read all monitoring data (metrics, logs, etc.). See also [Get started with r
1115611172
> | **NotActions** | |
1115711173
> | *none* | |
1115811174
> | **DataActions** | |
11159-
> | *none* | |
11175+
> | [Microsoft.Monitor](resource-provider-operations.md#microsoftmonitor)/accounts/data/metrics/read | Read metrics data in any Monitoring Account |
1116011176
> | **NotDataActions** | |
1116111177
> | *none* | |
1116211178

@@ -11176,7 +11192,9 @@ Can read all monitoring data (metrics, logs, etc.). See also [Get started with r
1117611192
"Microsoft.Support/*"
1117711193
],
1117811194
"notActions": [],
11179-
"dataActions": [],
11195+
"dataActions": [
11196+
"Microsoft.Monitor/accounts/data/metrics/read"
11197+
],
1118011198
"notDataActions": []
1118111199
}
1118211200
],

0 commit comments

Comments
 (0)