Skip to content

Commit 1784c3d

Browse files
committed
edit pass: microsoft-dev-box-docset
2 parents d1075eb + bacb702 commit 1784c3d

File tree

1,422 files changed

+8408
-40988
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,422 files changed

+8408
-40988
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -804,6 +804,11 @@
804804
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers.md",
805805
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-servers",
806806
"redirect_document_id": true
807+
},
808+
{
809+
"source_path_from_root": "/articles/defender-for-cloud/faq-azure-monitor-logs.yml",
810+
"redirect_url": "/azure/defender-for-cloud/faq-data-collection-agents",
811+
"redirect_document_id": true
807812
}
808813
]
809814
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-work-with-device-notifications.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#manage-device-notifications-from-an-ot-sensor-device-map",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-view-information-per-zone.md",
10+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#view-a-device-map-for-a-specific-zone",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-training-sessions.md",
515
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-ninja-training/ba-p/2428899",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -661,6 +661,10 @@
661661
"redirect_url": "/azure/healthcare-apis/iot/device-messages-through-iot-hub",
662662
"redirect_document_id": false
663663
},
664+
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-create-mappings-copies.md",
665+
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-mapping-debugger",
666+
"redirect_document_id": false
667+
},
664668
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
665669
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
666670
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7784,15 +7784,25 @@
77847784
"redirect_document_id": false
77857785
},
77867786
{
7787-
"source_path_from_root": "/articles/azure-maps/mobility-service-data-structure.md ",
7787+
"source_path_from_root": "/articles/azure-maps/mobility-service-data-structure.md",
77887788
"redirect_url": "/azure/azure-maps",
77897789
"redirect_document_id": false
77907790
},
77917791
{
7792-
"source_path_from_root": "/articles/azure-maps/power-bi-visual-getting-started.md ",
7792+
"source_path_from_root": "/articles/azure-maps/power-bi-visual-getting-started.md",
77937793
"redirect_url": "/azure/azure-maps/power-bi-visual-get-started",
77947794
"redirect_document_id": false
77957795
},
7796+
{
7797+
"source_path_from_root": "/articles/azure-maps/tutorial-creator-wfs.md",
7798+
"redirect_url": "/azure/azure-maps/how-to-creator-wfs",
7799+
"redirect_document_id": false
7800+
},
7801+
{
7802+
"source_path_from_root": "/articles/azure-maps/tutorial-creator-feature-stateset.md",
7803+
"redirect_url": "/azure/azure-maps/how-to-creator-feature-stateset",
7804+
"redirect_document_id": false
7805+
},
77967806
{
77977807
"source_path_from_root": "/articles/azure-portal/resource-group-portal-linked-resources.md",
77987808
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,41 @@
134134
"source_path_from_root": "/articles/virtual-desktop/powershell-module.md",
135135
"redirect_url": "/azure/virtual-desktop/cli-powershell",
136136
"redirect_document_id": true
137+
},
138+
{
139+
"source_path_from_root": "/articles/virtual-desktop/deploy-azure-ad-joined-vm.md",
140+
"redirect_url": "/azure/virtual-desktop/azure-ad-joined-session-hosts",
141+
"redirect_document_id": true
142+
},
143+
{
144+
"source_path_from_root": "/articles/virtual-desktop/configure-vm-gpu.md",
145+
"redirect_url": "/azure/virtual-desktop/enable-gpu-acceleration",
146+
"redirect_document_id": true
147+
},
148+
{
149+
"source_path_from_root": "/articles/virtual-desktop/create-validation-host-pool.md",
150+
"redirect_url": "/azure/virtual-desktop/configure-validation-environment",
151+
"redirect_document_id": true
152+
},
153+
{
154+
"source_path_from_root": "/articles/virtual-desktop/expand-existing-host-pool.md",
155+
"redirect_url": "/azure/virtual-desktop/add-session-hosts-host-pool",
156+
"redirect_document_id": true
157+
},
158+
{
159+
"source_path_from_root": "/articles/virtual-desktop/create-host-pools-azure-marketplace.md",
160+
"redirect_url": "/azure/virtual-desktop/create-host-pool",
161+
"redirect_document_id": true
162+
},
163+
{
164+
"source_path_from_root": "/articles/virtual-desktop/create-host-pools-powershell.md",
165+
"redirect_url": "/azure/virtual-desktop/create-host-pool",
166+
"redirect_document_id": false
167+
},
168+
{
169+
"source_path_from_root": "/articles/virtual-desktop/deploy-windows-server-virtual-machine.md",
170+
"redirect_url": "/azure/virtual-desktop/add-session-hosts-host-pool",
171+
"redirect_document_id": false
137172
}
138173
]
139174
}

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 03/01/2023
4+
ms.date: 03/06/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -30,6 +30,20 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3030

3131
- [Migrate applications using header-based authentication to Azure Active Directory B2C with Grit's app proxy](partner-grit-app-proxy.md)
3232
- [Configure Grit's biometric authentication with Azure Active Directory B2C](partner-grit-authentication.md)
33+
- [Create and run your own custom policies in Azure Active Directory B2C](custom-policies-series-overview.md)
34+
- [Write your first Azure Active Directory B2C custom policy - Hello World!](custom-policies-series-hello-world.md)
35+
- [Collect and manipulate user inputs by using Azure AD B2C custom policy](custom-policies-series-collect-user-input.md)
36+
- [Validate user inputs by using Azure Active Directory B2C custom policy](custom-policies-series-validate-user-input.md)
37+
- [Create branching in user journey by using Azure Active Directory B2C custom policy](custom-policies-series-branch-user-journey.md)
38+
- [Validate custom policy files by using TrustFrameworkPolicy schema](custom-policies-series-install-xml-extensions.md)
39+
- [Call a REST API by using Azure Active Directory B2C custom policy](custom-policies-series-call-rest-api.md)
40+
- [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md)
41+
- [Set up a sign-up and sign-in flow by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in.md)
42+
- [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md)
43+
- [Manage administrator accounts in Azure Active Directory B2C](tenant-management-manage-administrator.md)
44+
- [Manage emergency access accounts in Azure Active Directory B2C](tenant-management-emergency-access-account.md)
45+
- [Review tenant creation permission in Azure Active Directory B2C](tenant-management-check-tenant-creation-permission.md)
46+
- [Find tenant name and tenant ID in Azure Active Directory B2C](tenant-management-read-tenant-name.md)
3347

3448
### Updated articles
3549

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,10 @@ Azure AD uses this integration to enable the following cloud HR application (app
2525
- **Provision cloud-only users to Azure AD:** In scenarios where Active Directory isn't used, provision users directly from the cloud HR app to Azure AD.
2626
- **Write back to the cloud HR app:** Write the email addresses and username attributes from Azure AD back to the cloud HR app.
2727

28+
The following video provides guidance on planning your HR-driven provisioning integrations.
29+
30+
> [!VIDEO https://www.youtube-nocookie.com/embed/HsdBt40xEHs]
31+
2832
> [!NOTE]
2933
> This deployment plan shows you how to deploy your cloud HR app workflows with Azure AD user provisioning. For information on how to deploy automatic user provisioning to software as a service (SaaS) apps, see [Plan an automatic user provisioning deployment](./plan-auto-user-provisioning.md).
3034
@@ -90,7 +94,8 @@ You also need a valid Azure AD Premium P1 or higher subscription license for eve
9094
| Videos | [What is user provisioning in Active Azure Directory?](https://youtu.be/_ZjARPpI6NI) |
9195
| | [How to deploy user provisioning in Active Azure Directory](https://youtu.be/pKzyts6kfrw) |
9296
| Tutorials | [List of tutorials on how to integrate SaaS apps with Azure AD](../saas-apps/tutorial-list.md) |
93-
| | [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#frequently-asked-questions-faq) |
97+
| | [Tutorial: Configure automatic user provisioning with Workday](../saas-apps/workday-inbound-tutorial.md) |
98+
| | [Tutorial: Configure automatic user provisioning with SAP SuccessFactors](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md) |
9499
| FAQ | [Automated user provisioning](../app-provisioning/user-provisioning.md#what-applications-and-systems-can-i-use-with-azure-ad-automatic-user-provisioning) |
95100
| | [Provisioning from Workday to Azure AD](../saas-apps/workday-inbound-tutorial.md#frequently-asked-questions-faq) |
96101

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 11 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -141,34 +141,28 @@ IIF(IsPresent([alternativeSecurityId]),
141141

142142
## Look up certificateUserIds using Microsoft Graph queries
143143

144-
Tenant admins can run MS Graph queries to find all the users with a given certificateUserId value.
144+
Authorized callers can run Microsoft Graph queries to find all the users with a given certificateUserId value. On the Microsoft Graph [user](/graph/api/resources/user) object, the collection of certificateUserIds are stored in the **authorizationInfo** property.
145145

146-
GET all user objects that have the value '[email protected]' value in certificateUserIds:
146+
To retrieve all user objects that have the value '[email protected]' in certificateUserIds:
147147

148-
```http
149-
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds/any(x:x eq '[email protected]')
150-
```
151-
152-
```http
153-
GET https://graph.microsoft.com/v1.0/users?$filter=startswith(certificateUserIds, '[email protected]')
148+
```msgraph-interactive
149+
GET https://graph.microsoft.com/v1.0/users?$filter=authorizationInfo/certificateUserIds/any(x:x eq '[email protected]')&$count=true
150+
ConsistencyLevel: eventual
154151
```
155152

156-
```http
157-
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds eq '[email protected]'
158-
```
153+
You can also use the `not` and `startsWith` operators to match the filter condition. To filter against the certificateUserIds object, the request must include the `$count=true` query string and the **ConsistencyLevel** header set to `eventual`.
159154

160-
## Update certificate user IDs using Microsoft Graph queries
161-
PATCH the user object certificateUserIds value for a given userId
155+
## Update certificateUserIds using Microsoft Graph queries
156+
157+
Run a PATCH request to update the certificateUserIds for a given user.
162158

163159
#### Request body:
164160

165161
```http
166-
PATCH https://graph.microsoft.us/v1.0/users/{id}
162+
PATCH https://graph.microsoft.com/v1.0/users/{id}
167163
Content-Type: application/json
168-
{
169164
170-
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#users(authorizationInfo,department)/$entity",
171-
"department": "Accounting",
165+
{
172166
"authorizationInfo": {
173167
"certificateUserIds": [
174168
"X509:<PN>123456789098765@mil"

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,7 @@ Configure both the **Notify users on password resets** and the **Notify all admi
194194
> - Public: [email protected]
195195
> - China: [email protected]
196196
> - Government: [email protected]
197+
>
197198
> If you observe issues in receiving notifications, please check your spam settings.
198199
199200
### Customization settings

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Ensure that your client meets the following requirements:
107107
- TCP connectivity from the client to either the public or private IP address of the VM. (ProxyCommand or SSH forwarding to a machine with connectivity also works.)
108108

109109
> [!IMPORTANT]
110-
> SSH clients based on PuTTY don't support OpenSSH certificates and can't be used to log in with Azure AD OpenSSH certificate-based authentication.
110+
> SSH clients based on PuTTY now supports OpenSSH certificates and can be used to log in with Azure AD OpenSSH certificate-based authentication.
111111
112112
## Enable Azure AD login for a Linux VM in Azure
113113

0 commit comments

Comments
 (0)