Skip to content

Commit 1147398

Browse files
authored
Merge pull request #235580 from MicrosoftDocs/main
4/24 AM Publish
2 parents d011baf + bf60385 commit 1147398

File tree

107 files changed

+665
-579
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+665
-579
lines changed

articles/active-directory-b2c/enable-authentication-web-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ Azure AD B2C identity provider settings are stored in the *appsettings.json* fil
260260
"Instance": "https://<your-tenant-name>.b2clogin.com",
261261
"ClientId": "<web-app-application-id>",
262262
"Domain": "<your-b2c-domain>",
263-
"SignedOutCallbackPath": "/signout/<your-sign-up-in-policy>",
263+
"SignedOutCallbackPath": "/signout-oidc
264264
"SignUpSignInPolicyId": "<your-sign-up-in-policy>"
265265
}
266266
```

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ For user flows, these extension properties are [managed by using the Azure porta
167167
Use the [Get organization details](/graph/api/organization-get) API to get your directory size quota. You need to add the `$select` query parameter as shown in the following HTTP request:
168168

169169
```http
170-
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
170+
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
171171
```
172172
Replace `organization-id` with your organization or tenant ID.
173173

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ Extension attributes in the Graph API are named by using the convention `extensi
189189
Note that the **Application (client) ID** as it's represented in the extension attribute name includes no hyphens. For example:
190190

191191
```json
192-
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyNumber": "212342"
192+
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyNumber": "212342"
193193
```
194194

195195
The following data types are supported when defining an attribute in a schema extension:
Loading
5.25 KB
Loading
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/partner-list.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 01/26/2023
11+
ms.date: 04/24/2023
1212
ms.author: jfields
1313
---
1414

@@ -46,7 +46,9 @@ If you're a partner and would like to be considered for the Entra Permissions Ma
4646
| ![Screenshot of a invoke logo.](media/partner-list/partner-invoke.png) | [Invoke's Entra PM multicloud risk assessment](https://www.invokellc.com/offers/microsoft-entra-permissions-management-multi-cloud-risk-assessment)|
4747
| ![Screenshot of a Vu logo.](media/partner-list/partner-oxford-computer-group.png) | [Permissions Management implementation and remediation](https://oxfordcomputergroup.com/microsoft-entra-permissions-management-implementation/)|
4848
| ![Screenshot of a Onfido logo.](media/partner-list/partner-ada-quest.png) | [adaQuest Microsoft Entra Permissions Management Risk Assessment](https://adaquest.com/entra-permission-risk-assessment/)
49-
49+
| ![Screenshot of Ascent Solutions logo.](media/partner-list/partner-ascent-solutions.png) | [Ascent Solutions Microsoft Entra Permissions Management Rapid Risk Assessment](https://www.meetascent.com/resources/microsoft-entra-permissions-rapid-risk-assessment)
50+
| ![Screenshot of Synergy Advisors logo.](media/partner-list/partner-synergy-advisors.png) | [Synergy Advisors Identity Optimization](https://synergyadvisors.biz/solutions-item/identity-optimization/)
51+
| ![Screenshot of BDO Digital logo.](media/partner-list/partner-bdo-digital.png) | [BDO Digital Managing Permissions Across Multicloud](https://www.bdodigital.com/services/security-compliance/cybersecurity/entra-permissions-management)
5052
## Next steps
5153

5254
* For an overview of Permissions Management, see [What's Permissions Management?](overview.md)

articles/active-directory/cloud-infrastructure-entitlement-management/product-privileged-role-insights.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ The **Azure AD Insights** tab shows you who is assigned to privileged roles in y
2222
> [!NOTE]
2323
> Keep role assignments permanent if a user has a an additional Microsoft account (for example, an account they use to sign in to Microsoft services like Skype, or Outlook.com). If you require multi-factor authentication to activate a role assignment, a user with an additional Microsoft account will be locked out.
2424
25+
## Prerequisite
26+
To view information on the Azure AD Insights tab, you must have Permissions Management Administrator role permissions.
27+
2528
## View information in the Azure AD Insights tab
2629

2730
1. From the Permissions Management home page, select the **Azure AD Insights** tab.

articles/active-directory/develop/configure-token-lifetimes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To get started, download the latest [Microsoft Graph PowerShell SDK](/powershell
2929
In the following steps, you'll create a policy that requires users to authenticate less frequently in your web app. This policy sets the lifetime of the access/ID tokens for your web app.
3030

3131
```powershell
32-
Connect-MgGraph -Scopes "Policy.ReadWrite.ApplicationConfiguration"
32+
Connect-MgGraph -Scopes "Policy.ReadWrite.ApplicationConfiguration","Policy.Read.All","Application.ReadWrite.All"
3333
3434
# Create a token lifetime policy
3535
$params = @{
@@ -76,4 +76,4 @@ GET https://graph.microsoft.com/v1.0/policies/tokenLifetimePolicies/4d2f137b-e8a
7676
```
7777

7878
## Next steps
79-
Learn about [authentication session management capabilities](../conditional-access/howto-conditional-access-session-lifetime.md) in Azure AD Conditional Access.
79+
Learn about [authentication session management capabilities](../conditional-access/howto-conditional-access-session-lifetime.md) in Azure AD Conditional Access.

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -90,13 +90,13 @@ If a device is managed by another management authority, like Microsoft Intune, b
9090

9191
You can use a device ID to verify the device ID details on the device or to troubleshoot via PowerShell. To access the copy option, select the device.
9292

93-
![Screenshot that shows a device ID and the copy button.](./media/device-management-azure-portal/35.png)
93+
![Screenshot that shows a device ID and the copy button.](./media/device-management-azure-portal/device-details.png)
9494

9595
## View or copy BitLocker keys
9696

9797
You can view and copy BitLocker keys to allow users to recover encrypted drives. These keys are available only for Windows devices that are encrypted and store their keys in Azure AD. You can find these keys when you view a device's details by selecting **Show Recovery Key**. Selecting **Show Recovery Key** will generate an audit log, which you can find in the `KeyManagement` category.
9898

99-
![Screenshot that shows how to view BitLocker keys.](./media/device-management-azure-portal/device-details-show-bitlocker-key.png)
99+
![Screenshot that shows how to view BitLocker keys.](./media/device-management-azure-portal/show-bitlocker-key.png)
100100

101101
To view or copy BitLocker keys, you need to be the owner of the device or have one of these roles:
102102

@@ -115,7 +115,7 @@ In this preview, you have the ability to infinitely scroll, reorder columns, and
115115
- Compliant state
116116
- Join type (Azure AD joined, Hybrid Azure AD joined, Azure AD registered)
117117
- Activity timestamp
118-
- OS
118+
- OS Type and Version
119119
- Device type (printer, secure VM, shared device, registered device)
120120
- MDM
121121
- Autopilot

0 commit comments

Comments
 (0)