Skip to content

Commit 1244a72

Browse files
authored
Merge pull request #180355 from MicrosoftDocs/master
Merge master to live, 4AM
2 parents 46cc20a + f503565 commit 1244a72

File tree

95 files changed

+910
-530
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+910
-530
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -639,7 +639,7 @@
639639
- name: Getting help
640640
href: ../active-directory/develop/developer-support-help-options.md
641641
- name: Pricing
642-
href: https://azure.microsoft.com/pricing/details/active-directory-b2c/
642+
href: https://azure.microsoft.com/pricing/details/active-directory/external-identities/
643643
- name: Pricing calculator
644644
href: https://azure.microsoft.com/pricing/calculator/
645645
- name: Service updates

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
- name: Customize attribute mappings
1818
href: customize-application-attributes.md
1919
- name: App specific provisioning tutorials
20-
href: /azure/active-directory/saas-apps
20+
href: /azure/active-directory/saas-apps/tutorial-list
2121
- name: Provisioning to SQL based apps
2222
href: tutorial-ecma-sql-connector.md
2323
- name: Concepts
@@ -129,7 +129,7 @@
129129
- name: Microsoft Q&A question page
130130
href: /answers/topics/azure-active-directory.html
131131
- name: Pricing
132-
href: https://azure.microsoft.com/pricing/details/active-directory
132+
href: https://azure.microsoft.com/pricing/details/active-directory/
133133
- name: Service updates
134134
href: https://azure.microsoft.com/updates/?product=active-directory
135135
- name: Stack Overflow

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: overview
1010
ms.workload: identity
11-
ms.date: 05/28/2021
11+
ms.date: 11/15/2021
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -19,11 +19,9 @@ In Azure Active Directory (Azure AD), the term *app provisioning* refers to auto
1919

2020
![Diagram that shows provisioning scenarios.](../governance/media/what-is-provisioning/provisioning.png)
2121

22-
Azure AD to software as a service (SaaS) application provisioning refers to automatically creating user identities and roles in the cloud ([SaaS](https://azure.microsoft.com/overview/what-is-saas/)) applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and more.
22+
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and more.
2323

24-
Azure AD supports provisioning users into SaaS applications and applications hosted on-premises or an infrastructure as a service (IaaS) solution such as a virtual machine. You might have a legacy application that relies on an LDAP user store or a SQL database. By using the Azure AD provisioning service, you can create, update, and delete users into on-premises applications without having to open up firewalls or deal with TCP ports.
25-
26-
Using lightweight agents, you can provision users into on-premises applications and govern access. When Azure AD is used with the application proxy, you can manage access to your on-premises application and provide automatic user provisioning (with the provisioning service) and single sign-on (with app proxy).
24+
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://aka.ms/scimoverview), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-scim-provisioning) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-ldap-connector-configure) user store or a [SQL](https://docs.microsoft.com/azure/active-directory/app-provisioning/tutorial-ecma-sql-connector) database, Azure AD can support those as well.
2725

2826
App provisioning lets you:
2927

articles/active-directory/app-proxy/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
expanded: true
1212
items:
1313
- name: List of app integration tutorials
14-
href: /azure/active-directory/saas-apps/
14+
href: /azure/active-directory/saas-apps/tutorial-list
1515
- name: Add an on-premises app with Application Proxy
1616
href: application-proxy-add-on-premises-application.md
1717
- name: Samples
@@ -170,7 +170,7 @@
170170
- name: Microsoft Q&A question page
171171
href: /answers/topics/azure-active-directory.html
172172
- name: Pricing
173-
href: https://azure.microsoft.com/pricing/details/active-directory
173+
href: https://azure.microsoft.com/pricing/details/active-directory/
174174
- name: Service updates
175175
href: https://azure.microsoft.com/updates/?product=active-directory
176176
- name: Stack Overflow

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@
5757
- name: Licenses
5858
href: concept-mfa-licensing.md
5959
- name: MFA for Office 365
60-
href: /office365/admin/security-and-compliance/set-up-multi-factor-authentication
60+
href: /microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication
6161
- name: FAQ
6262
href: multi-factor-authentication-faq.yml
6363
- name: Operator assistance
@@ -268,7 +268,7 @@
268268
- name: MFA user guide
269269
href: https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc
270270
- name: Code samples
271-
href: https://azure.microsoft.com/resources/samples/?service=active-directory
271+
href: /samples/browse/?products=azure
272272
- name: Azure PowerShell cmdlets
273273
href: /powershell/azure/
274274
- name: Microsoft Graph REST API beta

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@
148148
- name: Publish to App Source
149149
href: howto-get-appsource-certified.md
150150
- name: Publish to the Office 365 Seller Dashboard
151-
href: /office/dev/store/use-the-seller-dashboard-to-submit-to-the-office-store
151+
href: /office/dev/store/add-in-submission-guide
152152
- name: Azure Access Control Service
153153
displayName: ACS
154154
items:
@@ -184,11 +184,11 @@
184184
- name: Azure AD blog
185185
href: https://cloudblogs.microsoft.com/enterprisemobility/?product=azure-active-directory
186186
- name: Microsoft identity platform developer blog
187-
href: https://developer.microsoft.com/identity/blogs/
187+
href: https://devblogs.microsoft.com/microsoft365dev/category/microsoft-identity-platform/
188188
- name: Try Sign in with Microsoft
189-
href: https://azure.microsoft.com/develop/identity/signin/
189+
href: https://developer.microsoft.com/identity/add-sign-in-with-microsoft
190190
- name: Getting help
191191
displayName: support, help options
192192
href: ../develop/developer-support-help-options.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
193193
- name: Managed identities for Azure resources
194-
href: ../managed-identities-azure-resources/overview.md
194+
href: ../managed-identities-azure-resources/overview.md

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ To avoid infinite loops because of these scenarios, Azure AD issues a one hour C
185185
CAE only has insight into [IP-based named locations](../conditional-access/location-condition.md#ip-address-ranges). CAE doesn't have insight into other location conditions like [MFA trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) or country-based locations. When a user comes from an MFA trusted IP, trusted location that includes MFA Trusted IPs, or country location, CAE won't be enforced after that user moves to a different location. In those cases, Azure AD will issue a one-hour access token without instant IP enforcement check.
186186

187187
> [!IMPORTANT]
188-
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
188+
> If you want your location policies to be enforced in real time by continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
189189
190190
### Office and Web Account Manager settings
191191

articles/active-directory/develop/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -596,7 +596,7 @@
596596
- name: Publish to Azure AD App Gallery
597597
href: v2-howto-app-gallery-listing.md
598598
- name: Publish to the Office 365 Seller Dashboard
599-
href: /office/dev/store/use-the-seller-dashboard-to-submit-to-the-office-store
599+
href: /office/dev/store/add-in-submission-guide
600600
- name: Work with Visual Studio
601601
items:
602602
- name: Use the Active Directory connected service
@@ -687,7 +687,7 @@
687687
- name: Azure CLI
688688
href: /cli/azure/identity
689689
- name: Azure PowerShell
690-
href: /powershell/module/az.managedserviceidentity
690+
href: /powershell/module/az.managedserviceidentity/
691691
- name: Application types and OAuth 2.0
692692
displayName: App types, OAuth
693693
href: v2-app-types.md
@@ -745,7 +745,7 @@
745745
- name: Azure roadmap
746746
href: https://azure.microsoft.com/roadmap/?category=security-identity
747747
- name: Try Sign in with Microsoft
748-
href: https://azure.microsoft.com/develop/identity/signin/
748+
href: https://developer.microsoft.com/identity/add-sign-in-with-microsoft
749749
- name: Managed identities for Azure resources
750750
href: ../managed-identities-azure-resources/overview.md
751751
- name: Getting help

articles/active-directory/identity-protection/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,11 +49,11 @@
4949
- name: Graph APIs
5050
items:
5151
- name: riskDetection API
52-
href: /graph/api/resources/riskdetection?view=graph-rest-v1.0
52+
href: /graph/api/resources/riskdetection?view=graph-rest-1.0
5353
- name: riskyUsers API
54-
href: /graph/api/resources/riskyuser?view=graph-rest-v1.0
54+
href: /graph/api/resources/riskyuser?view=graph-rest-1.0
5555
- name: signIn API
56-
href: /graph/api/resources/signin?view=graph-rest-v1.0
56+
href: /graph/api/resources/signin?view=graph-rest-1.0
5757
- name: Glossary
5858
href: reference-identity-protection-glossary.md
5959
- name: Resources

articles/active-directory/manage-apps/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
- name: Tutorials
2626
items:
2727
- name: List of app integration tutorials
28-
href: /azure/active-directory/saas-apps/
28+
href: /azure/active-directory/saas-apps/tutorial-list
2929
- name: Samples
3030
items:
3131
- name: Overview of App Management samples
@@ -201,7 +201,7 @@
201201
- name: Microsoft Q&A question page
202202
href: /answers/topics/azure-active-directory.html
203203
- name: Pricing
204-
href: https://azure.microsoft.com/pricing/details/active-directory
204+
href: https://azure.microsoft.com/pricing/details/active-directory/
205205
- name: Service updates
206206
href: https://azure.microsoft.com/updates/?product=active-directory
207207
- name: Stack Overflow

0 commit comments

Comments
 (0)