Skip to content

Commit 1819072

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into alerts-recommend
2 parents c0e640d + fbcaa1d commit 1819072

File tree

513 files changed

+9675
-3207
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

513 files changed

+9675
-3207
lines changed

.openpublishing.redirection.iot-hub.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1014,6 +1014,11 @@
10141014
"redirect_url": "/azure/iot-hub/iot-hub-device-management-iot-toolkit",
10151015
"redirect_document_id": false
10161016
},
1017+
{
1018+
"source_path_from_root": "/articles/iot-hub/iot-hub-protocol-gateway.md",
1019+
"redirect_url": "/azure/iot-edge/iot-edge-as-gateway",
1020+
"redirect_document_id": false
1021+
},
10171022
{
10181023
"source_path_from_root": "/articles/iot-hub/iot-hub-visual-studio-cloud-device-messaging.md",
10191024
"redirect_url": "/azure/iot-hub/iot-hub-vscode-iot-toolkit-cloud-device-messaging",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16603,6 +16603,11 @@
1660316603
"redirect_url": "/azure/devtest-labs/devtest-lab-create-environment-from-arm",
1660416604
"redirect_document_id": false
1660516605
},
16606+
{
16607+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-troubleshoot-artifact-failure.md",
16608+
"redirect_url": "/azure/devtest-labs/devtest-lab-troubleshoot-apply-artifacts",
16609+
"redirect_document_id": false
16610+
},
1660616611
{
1660716612
"source_path_from_root": "/articles/dns/dns-getstarted-cli-nodejs.md",
1660816613
"redirect_url": "/azure/dns/dns-getstarted-cli",
@@ -27798,6 +27803,11 @@
2779827803
"redirect_url": "/azure/storsimple/storsimple-virtual-array-update-06-release-notes",
2779927804
"redirect_document_id": false
2780027805
},
27806+
{
27807+
"source_path_from_root": "/articles/private-5g-core/activate-sims.md",
27808+
"redirect_url": "/azure/private-5g-core/provision-sims-azure-portal",
27809+
"redirect_document_id": false
27810+
},
2780127811
{
2780227812
"source_path_from_root": "/articles/azure-resource-manager/resource-manager-template-lock.md",
2780327813
"redirect_url": "/azure/templates/microsoft.authorization/locks",

.openpublishing.redirection.media-services.json

Lines changed: 2029 additions & 30 deletions
Large diffs are not rendered by default.

CODEOWNERS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ articles/service-health @rboucher
3939
/articles/synapse-analytics/synapse-link/ @Rodrigossz @SnehaGunda @jovanpop-msft
4040

4141
# Cognitive Services
42-
/articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan @eric-urban
42+
/articles/cognitive-services/ @aahill @patrickfarley @nitinme @mrbullwinkle @laujan @eric-urban @jboback
4343

4444
# DevOps
4545
/articles/ansible/ @TomArcherMsft

articles/active-directory/develop/v2-permissions-and-consent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,13 +127,13 @@ With the Microsoft identity platform endpoint, you can ignore the static permiss
127127
Allowing an app to request permissions dynamically through the `scope` parameter gives developers full control over your user's experience. You can also front load your consent experience and ask for all permissions in one initial authorization request. If your app requires a large number of permissions, you can gather those permissions from the user incrementally as they try to use certain features of the app over time.
128128

129129
> [!IMPORTANT]
130-
> Dynamic consent can be convenient, but presents a big challenge for permissions that require admin consent, since the admin consent experience doesn't know about those permissions at consent time. If you require admin privileged permissions or if your app uses dynamic consent, you must register all of the permissions in the Azure portal (not just the subset of permissions that require admin consent). This enables tenant admins to consent on behalf of all their users.
130+
> Dynamic consent can be convenient, but presents a big challenge for permissions that require admin consent. The admin consent experience in the **App registrations** and **Enterprise applications** blades in the portal doesn't know about those dynamic permissions at consent time. We recommend that a developer list all the admin privileged permissions that are needed by the app in the portal. This enables tenant admins to consent on behalf of all their users in the portal, once. Users won't need to go through the consent experience for those permissions on sign in. The alternative is to use dynamic consent for those permissions. To grant admin consent, an individual admin signs in to the app, triggers a consent prompt for the appropriate permissions, and selects **consent for my entire org** in the consent dialogue.
131131
132132
### Admin consent
133133

134134
[Admin consent](#using-the-admin-consent-endpoint) is required when your app needs access to certain high-privilege permissions. Admin consent ensures that administrators have some additional controls before authorizing apps or users to access highly privileged data from the organization.
135135

136-
[Admin consent done on behalf of an organization](#requesting-consent-for-an-entire-tenant) still requires the static permissions registered for the app. Set those permissions for apps in the app registration portal if you need an admin to give consent on behalf of the entire organization. This reduces the cycles required by the organization admin to set up the application.
136+
[Admin consent done on behalf of an organization](#requesting-consent-for-an-entire-tenant) is highly recommended if your app has an enterprise audience. Admin consent done on behalf of an organization requires the static permissions to be registered for the app in the portal. Set those permissions for apps in the app registration portal if you need an admin to give consent on behalf of the entire organization. The admin can consent to those permissions on behalf of all users in the org, once. The users will not need to go through the consent experience for those permissions when signing in to the app. This is easier for users and reduces the cycles required by the organization admin to set up the application.
137137

138138
## Requesting individual user consent
139139

0 commit comments

Comments
 (0)