Skip to content

Commit 0c48186

Browse files
authored
Merge pull request #195297 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 5f47f06 + 0a586e9 commit 0c48186

File tree

64 files changed

+1299
-4391
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+1299
-4391
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -801,19 +801,19 @@
801801
"branch": "main",
802802
"branch_mapping": {}
803803
},
804-
{
804+
{
805805
"path_to_root": "active-directory-b2c-msal-node-sign-in-sign-out-webapp",
806806
"url": "https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-in-sign-out-webapp",
807807
"branch": "main",
808808
"branch_mapping": {}
809809
},
810-
{
810+
{
811811
"path_to_root": "active-directory-b2c-javascript-nodejs-webapi",
812812
"url": "https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi",
813813
"branch": "master",
814814
"branch_mapping": {}
815815
},
816-
{
816+
{
817817
"path_to_root": "ms-identity-dotnetcore-b2c-account-management",
818818
"url": "https://github.com/Azure-Samples/ms-identity-dotnetcore-b2c-account-management",
819819
"branch": "master",
@@ -899,7 +899,6 @@
899899
".openpublishing.redirection.healthcare-apis.json",
900900
".openpublishing.redirection.iot-hub.json",
901901
".openpublishing.redirection.key-vault.json",
902-
".openpublishing.redirection.media-services.json",
903902
".openpublishing.redirection.security-benchmark.json",
904903
".openpublishing.redirection.sql-database.json",
905904
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -486,6 +486,11 @@
486486
"source_path_from_root": "/articles/healthcare-apis/data-transformation/convert-data.md",
487487
"redirect_url": "/azure/healthcare-apis/fhir/convert-data",
488488
"redirect_document_id": true
489+
},
490+
{
491+
"source_path_from_root": "/articles/healthcare-apis/fhir/bulk-importing-fhir-data.md",
492+
"redirect_url": "/azure/healthcare-apis/fhir/configure-import-data",
493+
"redirect_document_id": true
489494
}
490495
]
491496
}

.openpublishing.redirection.json

Lines changed: 96 additions & 1122 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.media-services.json

Lines changed: 0 additions & 2698 deletions
This file was deleted.

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The feature lets you specify a deletion threshold, above which an admin
2121
needs to explicitly choose to allow the deletions to be processed.
2222

2323
> [!NOTE]
24-
> Accidental deletions are not supported for our Workday / SuccessFactors integrations. It is also not supported for changes in scoping (e.g. changing a scoping filter or changing from "sync all users and groups" to "sync assigned users and groups". Until the accidental deletions prevention feature is fully released, you will need to access the Azure portal using this URL: https://aka.ms/AccidentalDeletionsPreview
24+
> Accidental deletions are not supported for our Workday / SuccessFactors integrations. It is also not supported for changes in scoping (e.g. changing a scoping filter or changing from "sync all users and groups" to "sync assigned users and groups"). Until the accidental deletions prevention feature is fully released, you'll need to access the Azure portal using this URL: https://aka.ms/AccidentalDeletionsPreview
2525
2626

2727
## Configure accidental deletion prevention
@@ -30,18 +30,18 @@ To enable accidental deletion prevention:
3030
2. Select **Enterprise applications** and then select your app.
3131
3. Select **Provisioning** and then on the provisioning page select **Edit provisioning**.
3232
4. Under **Settings**, select the **Prevent accidental deletions** checkbox and specify a deletion
33-
threshold. Also, be sure the notification email address is completed. If the deletion threshold his met and email will be sent.
33+
threshold. Also, be sure the notification email address is completed. If the deletion threshold is met an email will be sent.
3434
5. Select **Save**, to save the changes.
3535

3636
When the deletion threshold is met, the job will go into quarantine and a notification email will be sent. The quarantined job can then be allowed or rejected. To learn more about quarantine behavior, see [Application provisioning in quarantine status](application-provisioning-quarantine-status.md).
3737

3838
## Known limitations
3939
There are two key limitations to be aware of and are actively working to address:
40-
- HR-driven provisioning from Workday and SuccessFactors do not support the accidental deletions feature.
41-
- Changes to your provisioning configuration (e.g. changing scoping) is not supported by the accidental deletions feature.
40+
- HR-driven provisioning from Workday and SuccessFactors don't support the accidental deletions feature.
41+
- Changes to your provisioning configuration (e.g. changing scoping) isn't supported by the accidental deletions feature.
4242

4343
## Recovering from an accidental deletion
44-
If you encounter an accidental deletion you will see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information.**.
44+
If you encounter an accidental deletion you'll see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information.**.
4545

4646
You can click either **Allow deletes** or **View provisioning logs**.
4747

@@ -51,20 +51,20 @@ The **Allow deletes** action will delete the objects that triggered the accident
5151

5252
1. Select **Allow deletes**.
5353
2. Click **Yes** on the confirmation to allow the deletions.
54-
3. You will see confirmation that the deletions were accepted and the status will return to healthy with the next cycle.
54+
3. You'll see confirmation that the deletions were accepted and the status will return to healthy with the next cycle.
5555

5656
### Rejecting deletions
5757

58-
If you do not want to allow the deletions, you need to do the following:
58+
If you don't want to allow the deletions, you need to do the following:
5959
- Investigate the source of the deletions. You can use the provisioning logs for details.
6060
- Prevent the deletion by assigning the user / group to the app again, restoring the user / group, or updating your provisioning configuration.
61-
- Once you've made the necessary changes to prevent the user / group from being deleted, restart provisioning. Please do not restart provisioning until you've made the necessary changes to prevent the users / groups from being deleted.
61+
- Once you've made the necessary changes to prevent the user / group from being deleted, restart provisioning. Please don't restart provisioning until you've made the necessary changes to prevent the users / groups from being deleted.
6262

6363

6464
### Test deletion prevention
6565
You can test the feature by triggering disable / deletion events by setting the threshold to a low number, for example 3, and then changing scoping filters, un-assigning users, and deleting users from the directory (see common scenarios in next section).
6666

67-
Let the provisioning job run (20 – 40 mins) and navigate back to the provisioning page. You will see the provisioning job in quarantine and can choose to allow the deletions or review the provisioning logs to understand why the deletions occurred.
67+
Let the provisioning job run (20 – 40 mins) and navigate back to the provisioning page. You'll see the provisioning job in quarantine and can choose to allow the deletions or review the provisioning logs to understand why the deletions occurred.
6868

6969
## Common de-provisioning scenarios to test
7070
- Delete a user / put them into the recycle bin.
@@ -83,7 +83,7 @@ application could include: unassigning the user from the application and soft /
8383
evaluated for deletion count towards the deletion threshold. In addition to deletions, the same functionality also works for disables.
8484

8585
### What is the interval that the deletion threshold is evaluated on?
86-
It is evaluated each cycle. If the number of deletions does not exceed the threshold during a
86+
It is evaluated each cycle. If the number of deletions doesn't exceed the threshold during a
8787
single cycle, the “circuit breaker” won’t be triggered. If multiple cycles are needed to reach a
8888
steady state, the deletion threshold will be evaluated per cycle.
8989

articles/active-directory/app-provisioning/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -119,8 +119,8 @@ items:
119119
href: workday-attribute-reference.md
120120
- name: Provisioning Agent version history
121121
href: provisioning-agent-release-version-history.md
122-
- name: Migrate connector from MIM Sync
123-
href: on-premises-migrate-microsoft-identity-manager.md
122+
- name: Migrate connector from MIM Sync
123+
href: on-premises-migrate-microsoft-identity-manager.md
124124
- name: Resources
125125
items:
126126
- name: Support and help options for developers
@@ -136,4 +136,4 @@ items:
136136
- name: Stack Overflow
137137
href: https://stackoverflow.com/questions/tagged/azure-active-directory
138138
- name: Videos
139-
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory
139+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory

articles/advisor/advisor-cost-recommendations.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,13 @@ Advisor considers resizing virtual machines when it's possible to fit the curren
4242
- The last 7 days of utilization data are considered
4343
- Metrics are sampled every 30 seconds, aggregated to 1 min and then further aggregated to 30 mins (we take the average of max values while aggregating to 30 mins)
4444
- An appropriate SKU is determined based on the following criteria:
45-
- Performance of the workloads on the new SKU should not be impacted. This is achieved by:
46-
- For user-facing workloads: P95 of the CPU and Outbound Network utilization, and P100 of Memory utilization don’t go above 80% on the new SKU
47-
- For non user-facing workloads:
48-
- P95 of CPU and Outbound Network utilization don’t go above 40% on the recommended SKU
49-
- P100 of Memory utilization doesn’t go above 60% on the recommended SKU
45+
- Performance of the workloads on the new SKU should not be impacted.
46+
- Target for user-facing workloads:
47+
- P95 of CPU and Outbound Network utilization at 40% or lower on the recommended SKU
48+
- P100 of Memory utilization at 60% or lower on the recommended SKU
49+
- Target for non user-facing workloads:
50+
- P95 of the CPU and Outbound Network utilization at 80% or lower on the new SKU
51+
- P100 of Memory utilization at 80% or lower on the new SKU
5052
- The new SKU has the same Accelerated Networking and Premium Storage capabilities
5153
- The new SKU is supported in the current region of the Virtual Machine with the recommendation
5254
- The new SKU is less expensive

articles/application-gateway/rewrite-http-headers-url.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ For example, say you have the following header rewrite rule for the header `"Acc
176176
Here, with only header rewrite configured, the WAF evaluation will be done on `"Accept" : "text/html"`. But when you configure URL rewrite or host header rewrite, then the WAF evaluation will be done on `"Accept" : "image/png"`.
177177

178178
>[!NOTE]
179-
> URL rewrite operations are expected to cause a minor increase in the CPU utilization of your WAF Application Gateway. It is recommended that you monitor the [CPU utilization metric](high-traffic-support.md) for a brief period of time after enabling the URL rewrite rules on your WAF Application Gateway.
179+
> URL rewrite operations may cause a minor increase in the compute utilization of your WAF Application Gateway. In application gateway v1 deployments, it is recommended that you monitor the [CPU utilization metric](high-traffic-support.md) for a brief period of time after enabling the URL rewrite rules on your WAF Application Gateway.
180180
181181
### Common scenarios for header rewrite
182182

articles/automanage/repair-automanage-account.md

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: automanage
55
ms.workload: infrastructure
66
ms.topic: conceptual
77
ms.date: 11/05/2020
8-
ms.custom: devx-track-azurepowershell, devx-track-azurecli
8+
ms.custom: devx-track-azurepowershell, devx-track-azurecli, subject-rbac-steps
99
---
1010

1111
# Repair an Automanage Account
@@ -65,12 +65,24 @@ If you're using an ARM template or the Azure CLI, you'll need the Principal ID (
6565
- Azure portal: Go to **Azure Active Directory** and search for your Automanage Account by name. Under **Enterprise Applications**, select the Automanage Account name when it appears.
6666

6767
### Azure portal
68+
6869
1. Under **Subscriptions**, go to the subscription that contains your automanaged VMs.
69-
1. Go to **Access control (IAM)**.
70-
1. Select **Add role assignments**.
71-
1. Select the **Contributor** role and enter the name of your Automanage Account.
72-
1. Select **Save**.
73-
1. Repeat steps 3 through 5, this time with the **Resource Policy Contributor** role.
70+
71+
1. Select **Access control (IAM)**.
72+
73+
1. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
74+
75+
1. Assign the following role. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
76+
77+
| Setting | Value |
78+
| --- | --- |
79+
| Role | Contributor |
80+
| Assign access to | User, group, or service principal |
81+
| Members | \<Name of your Automanage account> |
82+
83+
![Screenshot showing Add role assignment page in Azure portal.](../../includes/role-based-access-control/media/add-role-assignment-page.png)
84+
85+
1. Repeat steps 2 through 4, selecting the **Resource Policy Contributor** role.
7486

7587
### ARM template
7688
Run the following ARM template. You'll need the Principal ID of your Automanage Account. The steps to get it are at the start of this section. Enter the ID when you're prompted.

articles/automation/automation-role-based-access-control.md

Lines changed: 12 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: automation
55
ms.subservice: shared-capabilities
66
ms.date: 09/10/2021
77
ms.topic: how-to
8-
ms.custom: devx-track-azurepowershell
8+
ms.custom: devx-track-azurepowershell, subject-rbac-steps
99
#Customer intent: As an administrator, I want to understand permissions so that I use the least necessary set of permissions.
1010
---
1111

@@ -328,42 +328,26 @@ The following section shows you how to configure Azure RBAC on your Automation a
328328

329329
### Configure Azure RBAC using the Azure portal
330330

331-
1. Log in to the [Azure portal](https://portal.azure.com/) and open your Automation account from the Automation Accounts page.
332-
2. Click on **Access control (IAM)** to open the Access control (IAM) page. You can use this page to add new users, groups, and applications to manage your Automation account and view existing roles that are configurable for the Automation account.
333-
3. Click the **Role assignments** tab.
331+
1. Sign in to the [Azure portal](https://portal.azure.com/) and open your Automation account from the **Automation Accounts** page.
334332

335-
![Access button](media/automation-role-based-access-control/automation-01-access-button.png)
333+
1. Select **Access control (IAM)** and select a role from the list of available roles. You can choose any of the available built-in roles that an Automation account supports or any custom role you might have defined. Assign the role to a user to which you want to give permissions.
336334

337-
#### Add a new user and assign a role
335+
For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
338336

339-
1. From the Access control (IAM) page, click **+ Add role assignment**. This action opens the Add role assignment page where you can add a user, group, or application, and assign a corresponding role.
340-
341-
2. Select a role from the list of available roles. You can choose any of the available built-in roles that an Automation account supports or any custom role you may have defined.
342-
343-
3. Type the name of the user that you want to give permissions to in the **Select** field. Choose the user from the list and click **Save**.
344-
345-
![Add users](media/automation-role-based-access-control/automation-04-add-users.png)
346-
347-
Now you should see the user added to the Users page, with the selected role assigned.
348-
349-
![List users](media/automation-role-based-access-control/automation-05-list-users.png)
350-
351-
You can also assign a role to the user from the Roles page.
337+
> [!NOTE]
338+
> You can only set role-based access control at the Automation account scope and not at any resource below the Automation account.
352339
353-
4. Click **Roles** from the Access control (IAM) page to open the Roles page. You can view the name of the role and the number of users and groups assigned to that role.
340+
#### Remove role assignments from a user
354341

355-
![Assign role from users page](media/automation-role-based-access-control/automation-06-assign-role-from-users-blade.png)
342+
You can remove the access permission for a user who isn't managing the Automation account, or who no longer works for the organization. The following steps show how to remove the role assignments from a user. For detailed steps, see [Remove Azure role assignments](../../articles/role-based-access-control/role-assignments-remove.md):
356343

357-
> [!NOTE]
358-
> You can only set role-based access control at the Automation account scope and not at any resource below the Automation account.
344+
1. Open **Access control (IAM)** at a scope, such as management group, subscription, resource group, or resource, where you want to remove access.
359345

360-
#### Remove a user
346+
1. Select the **Role assignments** tab to view all the role assignments at this scope.
361347

362-
You can remove the access permission for a user who isn't managing the Automation account, or who no longer works for the organization. Following are the steps to remove a user:
348+
1. In the list of role assignments, add a checkmark next to the user with the role assignment you want to remove.
363349

364-
1. From the Access control (IAM) page, select the user to remove and click **Remove**.
365-
2. Click the **Remove** button in the assignment details pane.
366-
3. Click **Yes** to confirm removal.
350+
1. Select **Remove**.
367351

368352
![Remove users](media/automation-role-based-access-control/automation-08-remove-users.png)
369353

0 commit comments

Comments
 (0)