Skip to content

Commit 16ab893

Browse files
authored
Merge pull request #237904 from MicrosoftDocs/main
5/11 PM Publish
2 parents 506c245 + 4f0f587 commit 16ab893

File tree

86 files changed

+468
-342
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+468
-342
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12450,6 +12450,31 @@
1245012450
"source_path_from_root": "/articles/active-directory/hybrid/whatis-phs.md",
1245112451
"redirect_url": "/azure/active-directory/hybrid/connect/whatis-phs",
1245212452
"redirect_document_id": false
12453+
},
12454+
12455+
{
12456+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md",
12457+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-approval-workflow",
12458+
"redirect_document_id": false
12459+
},
12460+
12461+
{
12462+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md",
12463+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-create-roles-and-resource-roles-review",
12464+
"redirect_document_id": false
12465+
},
12466+
12467+
{
12468+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-perform-azure-ad-roles-and-resource-roles-review.md",
12469+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-perform-roles-and-resource-roles-review",
12470+
"redirect_document_id": false
12471+
},
12472+
12473+
{
12474+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/pim-complete-azure-ad-roles-and-resource-roles-review.md",
12475+
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-complete-roles-and-resource-roles-review",
12476+
"redirect_document_id": false
1245312477
}
12478+
1245412479
]
1245512480
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17429,6 +17429,11 @@
1742917429
"redirect_url": "/azure/virtual-network/virtual-networks-using-network-configuration-file",
1743017430
"redirect_document_id": false
1743117431
},
17432+
{
17433+
"source_path_from_root": "/articles/virtual-network-manager/how-to-exclude-elements.md",
17434+
"redirect_url": "/azure/virtual-network-manager/how-to-define-network-group-membership-azure-policy",
17435+
"redirect_document_id": false
17436+
},
1743217437
{
1743317438
"source_path_from_root": "/articles/networking/virtual-network-test-latency.md",
1743417439
"redirect_url": "/azure/virtual-network/virtual-network-test-latency",

articles/active-directory/app-provisioning/on-premises-powershell-connector.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 02/08/2022
11+
ms.date: 05/11/2023
1212
ms.author: billmath
1313
ms.reviewer: arvinh
1414
---
@@ -167,7 +167,7 @@ The capabilities tab defines the behavior and functionality of the connector. Th
167167
|No Reference Values In First Export Pass|Unchecked|When checked, reference attributes are exported in a second export pass. |
168168
|Enable Object Rename|Unchecked|When checked, distinguished names can be modified. |
169169
|Delete-Add As Replace|Checked|Not supported. This will be ignored.|
170-
|Enable Export Password in First Pass|Checked|Not supported. This will be ignored.|
170+
|Enable Export Password in First Pass|Unchecked|Not supported. This will be ignored.|
171171
172172
173173
### Global Parameters
@@ -182,10 +182,10 @@ The Global Parameters tab enables you to configure the Windows PowerShell script
182182
|Partition Script|\<Blank>|
183183
|Hierarchy Script|\<Blank>|
184184
|Begin Import Script|\<Blank>|
185-
|Import Script|Paste ImportData code as value|
185+
|Import Script|[Paste the import script as the value](https://github.com/microsoft/MIMPowerShellConnectors/blob/master/src/ECMA2HostCSV/Scripts/Import%20Scripts.ps1)|
186186
|End Import Script|\<Blank>|
187-
|Begin Export Script|Paste Begin export code as value|
188-
|Export Script|Paste ExportData code as value|
187+
|Begin Export Script|\<Blank>|
188+
|Export Script|[Paste the import script as the value](https://github.com/microsoft/MIMPowerShellConnectors/blob/master/src/ECMA2HostCSV/Scripts/Export%20Script.ps1)|
189189
|End Export Script|\<Blank>|
190190
|Begin Password Script|\<Blank>|
191191
|Password Extension Script|\<Blank>|

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,9 @@ sections:
3737
How can an administrator enable Azure AD CBA?
3838
answer: |
3939
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
40-
1. Click **Azure Active Directory** > **Security** > **Authentication methods** > **Certificate-based Authentication** > **Basics**, click **Yes** to enable certificate-based authentication.
40+
2. Select **Azure Active Directory** > **Security** > **Authentication methods** > **Policies**.
41+
3. Select policy: **Certificate-based Authentication**.
42+
4. On the **Enable and Target** tab, select the **Enable** toggle to enable certificate-based authentication.
4143
4244
- question: |
4345
Is Azure AD CBA a free feature?

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,9 @@ The set of optional claims available by default for applications to use are list
6565
| `xms_tpl` | Tenant preferred language| JWT | | The resource tenant's preferred language, if set. Formatted LL ("en"). |
6666
| `ztdid` | Zero-touch Deployment ID | JWT | | The device identity used for [Windows AutoPilot](/windows/deployment/windows-autopilot/windows-10-autopilot) |
6767

68+
> [!WARNING]
69+
> Never use `email` or `upn` claim values to store or determine whether the user in an access token should have access to data. Mutable claim values like these can change over time, making them insecure and unreliable for authorization.
70+
6871
## v2.0-specific optional claims set
6972

7073
These claims are always included in v1.0 Azure AD tokens, but not included in v2.0 tokens unless requested. These claims are only applicable for JWTs (ID tokens and Access Tokens).

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ To enable security defaults in your directory:
4949
1. Sign in to the [Azure portal](https://portal.azure.com) as a security administrator, Conditional Access administrator, or global administrator.
5050
1. Browse to **Azure Active Directory** > **Properties**.
5151
1. Select **Manage security defaults**.
52-
1. Set **Security defaults** to **Enabled **.
52+
1. Set **Security defaults** to **Enabled**.
5353
1. Select **Save**.
5454

5555
![Screenshot of the Azure portal with the toggle to enable security defaults](./media/concept-fundamentals-security-defaults/security-defaults-azure-ad-portal.png)

articles/active-directory/governance/entitlement-management-access-package-assignments.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -154,8 +154,8 @@ You can assign a user to an access package in PowerShell with the `New-MgEntitle
154154
```powershell
155155
Connect-MgGraph -Scopes "EntitlementManagement.ReadWrite.All"
156156
Select-MgProfile -Name "beta"
157-
$accesspackage = Get-MgEntitlementManagementAccessPackage -DisplayNameEq "Marketing Campaign" -ExpandProperty "accessPackageAssignmentPolicies"
158-
$policy = $accesspackage.AccessPackageAssignmentPolicies[0]
157+
$accesspackage = Get-MgEntitlementManagementAccessPackage -DisplayNameEq "Marketing Campaign" -ExpandProperty "AssignmentPolicies"
158+
$policy = $accesspackage.AssignmentPolicies[0]
159159
$req = New-MgEntitlementManagementAccessPackageAssignmentRequest -AccessPackageId $accesspackage.Id -AssignmentPolicyId $policy.Id -TargetId "a43ee6df-3cc5-491a-ad9d-ea964ef8e464"
160160
```
161161

@@ -170,8 +170,8 @@ For example, if you want to ensure all the users who are currently members of a
170170
Connect-MgGraph -Scopes "EntitlementManagement.ReadWrite.All,Directory.Read.All"
171171
Select-MgProfile -Name "beta"
172172
$members = Get-MgGroupMember -GroupId "a34abd69-6bf8-4abd-ab6b-78218b77dc15"
173-
$accesspackage = Get-MgEntitlementManagementAccessPackage -DisplayNameEq "Marketing Campaign" -ExpandProperty "accessPackageAssignmentPolicies"
174-
$policy = $accesspackage.AccessPackageAssignmentPolicies[0]
173+
$accesspackage = Get-MgEntitlementManagementAccessPackage -DisplayNameEq "Marketing Campaign" -ExpandProperty "AssignmentPolicies"
174+
$policy = $accesspackage.AssignmentPolicies[0]
175175
$req = New-MgEntitlementManagementAccessPackageAssignment -AccessPackageId $accesspackage.Id -AssignmentPolicyId $policy.Id -RequiredGroupMember $members
176176
```
177177

@@ -183,8 +183,8 @@ If you wish to add an assignment for a user who is not yet in your directory, yo
183183
```powershell
184184
Connect-MgGraph -Scopes "EntitlementManagement.ReadWrite.All"
185185
Select-MgProfile -Name "beta"
186-
$accesspackage = Get-MgEntitlementManagementAccessPackage -DisplayNameEq "Marketing Campaign" -ExpandProperty "accessPackageAssignmentPolicies"
187-
$policy = $accesspackage.AccessPackageAssignmentPolicies[0]
186+
$accesspackage = Get-MgEntitlementManagementAccessPackage -DisplayNameEq "Marketing Campaign" -ExpandProperty "AssignmentPolicies"
187+
$policy = $accesspackage.AssignmentPolicies[0]
188188
$req = New-MgEntitlementManagementAccessPackageAssignmentRequest -AccessPackageId $accesspackage.Id -AssignmentPolicyId $policy.Id -TargetEmail "[email protected]"
189189
```
190190

articles/active-directory/privileged-identity-management/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@
5353
- name: Approve
5454
items:
5555
- name: Azure AD roles
56-
href: azure-ad-pim-approval-workflow.md
56+
href: pim-approval-workflow.md
5757
- name: Azure roles
5858
href: pim-resource-roles-approval-workflow.md
5959
- name: Groups
@@ -93,11 +93,11 @@
9393
- name: Azure AD roles and Azure resource roles
9494
items:
9595
- name: Create an access review
96-
href: pim-create-azure-ad-roles-and-resource-roles-review.md
96+
href: pim-create-roles-and-resource-roles-review.md
9797
- name: Perform an access review
98-
href: pim-perform-azure-ad-roles-and-resource-roles-review.md
98+
href: pim-perform-roles-and-resource-roles-review.md
9999
- name: Complete an access review
100-
href: pim-complete-azure-ad-roles-and-resource-roles-review.md
100+
href: pim-complete-roles-and-resource-roles-review.md
101101
- name: Discovery & Insights for Azure AD roles
102102
href: pim-security-wizard.md
103103
- name: Elevate access to manage Azure subscriptions

articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md renamed to articles/active-directory/privileged-identity-management/pim-approval-workflow.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,8 @@ ms.subservice: pim
1111
ms.topic: how-to
1212
ms.tgt_pltfrm: na
1313
ms.workload: identity
14-
ms.date: 07/11/2022
14+
ms.date: 05/11/2023
1515
ms.author: amsliu
16-
ms.reviewer: japere
1716
ms.custom: pim
1817
ms.collection: M365-identity-device-management
1918
---
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 5/11/2023
1515
ms.author: amsliu
1616
ms.reviewer: shaunliu
1717
ms.custom: pim

0 commit comments

Comments
 (0)