Skip to content

Commit 1869831

Browse files
committed
Merge branch 'release-qumolo' of https://github.com/MicrosoftDocs/azure-docs-pr into fxl---review-release-qumolo
2 parents df17ff8 + 3daab31 commit 1869831

File tree

333 files changed

+3188
-2371
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

333 files changed

+3188
-2371
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4381,6 +4381,21 @@
43814381
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43824382
"redirect_document_id": false
43834383
},
4384+
{
4385+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-access-api-with-certificates.md",
4386+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4387+
"redirect_document_id": false
4388+
},
4389+
{
4390+
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-graph-api.md",
4391+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4392+
"redirect_document_id": false
4393+
},
4394+
{
4395+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-reporting-api.md",
4396+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
4397+
"redirect_document_id": false
4398+
},
43844399
{
43854400
"source_path_from_root": "/articles/active-directory/customize-branding.md",
43864401
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",

.openpublishing.redirection.azure-productivity.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,11 @@
8484
"source_path": "articles/lab-services/how-to-manage-vm-pool-within-canvas.md",
8585
"redirect_url": "/azure/lab-services/how-to-manage-labs-within-canvas",
8686
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "articles/lab-services/how-to-enable-nested-virtualization-template-vm.md",
90+
"redirect_url": "/azure/lab-services/concept-nested-virtualization-template-vm",
91+
"redirect_document_id": true
8792
}
8893
]
8994
}

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-php.md",
5+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-php",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/storage/blobs/storage-quickstart-blobs-ruby.md",
10+
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-ruby",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/backup/backup-afs.md",
515
"redirect_url": "/azure/backup/backup-azure-files",
25.8 KB
Loading
-1.07 KB
Loading
1.45 KB
Loading
6.49 KB
Loading

articles/active-directory/external-identities/self-service-sign-up-user-flow.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 01/06/2023
8+
ms.date: 01/16/2023
99

1010
ms.author: mimart
1111
author: msmimart
@@ -52,7 +52,8 @@ Before you can add a self-service sign-up user flow to your applications, you ne
5252
1. Select **User settings**, and then under **External users**, select **Manage external collaboration settings**.
5353
1. Set the **Enable guest self-service sign up via user flows** toggle to **Yes**.
5454

55-
![Enable guest self-service sign-up](media/self-service-sign-up-user-flow/enable-self-service-sign-up.png)
55+
:::image type="content" source="media/self-service-sign-up-user-flow/enable-self-service-sign-up.png" alt-text="Screenshot of the enable guest self-service sign up toggle.":::
56+
5657
5. Select **Save**.
5758
## Create the user flow for self-service sign-up
5859

@@ -63,17 +64,17 @@ Next, you'll create the user flow for self-service sign-up and add it to an appl
6364
3. In the left menu, select **External Identities**.
6465
4. Select **User flows**, and then select **New user flow**.
6566

66-
![Add a new user flow button](media/self-service-sign-up-user-flow/new-user-flow.png)
67+
:::image type="content" source="media/self-service-sign-up-user-flow/new-user-flow.png" alt-text="Screenshot of the new user flow button.":::
6768

6869
5. Select the user flow type (for example, **Sign up and sign in**), and then select the version (**Recommended** or **Preview**).
69-
6. On the **Create** page, enter a **Name** for the user flow. Note that the name is automatically prefixed with **B2X_1_**.
70+
6. On the **Create** page, enter a **Name** for the user flow. The name is automatically prefixed with **B2X_1_**.
7071
7. In the **Identity providers** list, select one or more identity providers that your external users can use to log into your application. **Azure Active Directory Sign up** is selected by default. (See [Before you begin](#before-you-begin) earlier in this article to learn how to add identity providers.)
71-
8. Under **User attributes**, choose the attributes you want to collect from the user. For additional attributes, select **Show more**. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
72+
8. Under **User attributes**, choose the attributes you want to collect from the user. For more attributes, select **Show more**. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
7273

73-
![Create a new user flow page](media/self-service-sign-up-user-flow/create-user-flow.png)
74+
:::image type="content" source="media/self-service-sign-up-user-flow/create-user-flow.png" alt-text="Screenshot of the new user flow creation page. ":::
7475

75-
> [!NOTE]
76-
> You can only collect attributes when a user signs up for the first time. After a user signs up, they will no longer be prompted to collect attribute information, even if you change the user flow.
76+
> [!NOTE]
77+
> You can only collect attributes when a user signs up for the first time. After a user signs up, they will no longer be prompted to collect attribute information, even if you change the user flow.
7778
7879
8. Select **Create**.
7980
9. The new user flow appears in the **User flows** list. If necessary, refresh the page.
@@ -86,7 +87,7 @@ You can choose order in which the attributes are displayed on the sign-up page.
8687
2. Select **External Identities**, select **User flows**.
8788
3. Select the self-service sign-up user flow from the list.
8889
4. Under **Customize**, select **Page layouts**.
89-
5. The attributes you chose to collect are listed. To change the order of display, select an attribute, and then select **Move up**, **Move down**, **Move to the top**, or **Move to the bottom**.
90+
5. The attributes you chose to collect are listed. To change the order of display, select an attribute, and then select **Move up**, **Move down**, **Move to top**, or **Move to bottom**.
9091
6. Select **Save**.
9192

9293
## Add applications to the self-service sign-up user flow
@@ -101,7 +102,7 @@ Now you'll associate applications with the user flow to enable sign-up for those
101102
6. In the left menu, under **Use**, select **Applications**.
102103
7. Select **Add application**.
103104

104-
![Assign an application to the user flow](media/self-service-sign-up-user-flow/assign-app-to-user-flow.png)
105+
:::image type="content" source="media/self-service-sign-up-user-flow/assign-app-to-user-flow.png" alt-text="Screenshot of adding an application to the user flow.":::
105106

106107
8. Select the application from the list. Or use the search box to find the application, and then select it.
107108
9. Click **Select**.
@@ -112,4 +113,3 @@ Now you'll associate applications with the user flow to enable sign-up for those
112113
- [Add Facebook to your list of social identity providers](facebook-federation.md)
113114
- [Use API connectors to customize and extend your user flows via web APIs](api-connectors-overview.md)
114115
- [Add custom approval workflow to your user flow](self-service-sign-up-add-approvals.md)
115-
- [Learn more about initiating an OAuth 2.0 authorization code flow](../develop/v2-oauth2-auth-code-flow.md#request-an-authorization-code)

articles/active-directory/fundamentals/active-directory-users-profile-azure-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ The **Stay signed in?** prompt appears after a user successfully signs in. This
8484

8585
The following diagram shows the user sign-in flow for a managed tenant and federated tenant using the KMSI in prompt. This flow contains smart logic so that the **Stay signed in?** option won't be displayed if the machine learning system detects a high-risk sign-in or a sign-in from a shared device.
8686

87-
KMSI is only available on the default custom branding. It can't be added to language-specific branding. Some features of SharePoint Online and Office 2010 depend on users being able to choose to remain signed in. If you uncheck the **Show option to remain signed in** option, your users may see other unexpected prompts during the sign-in process.
87+
KMSI setting is available in User settings. Some features of SharePoint Online and Office 2010 depend on users being able to choose to remain signed in. If you uncheck the **Show option to remain signed in** option, your users may see other unexpected prompts during the sign-in process.
8888

8989
![Diagram showing the user sign-in flow for a managed vs. federated tenant](media/customize-branding/kmsi-workflow.png)
9090

@@ -106,7 +106,7 @@ Details about the sign-in error are found in the **Sign-in logs** in Azure AD. S
106106
* **Sign in error code**: 50140
107107
* **Failure reason**: This error occurred due to "Keep me signed in" interrupt when the user was signing in.
108108

109-
You can stop users from seeing the interrupt by setting the **Show option to remain signed in** setting to **No** in the advanced branding settings. This setting disables the KMSI prompt for all users in your Azure AD directory.
109+
You can stop users from seeing the interrupt by setting the **Show option to remain signed in** setting to **No** in the user settings. This setting disables the KMSI prompt for all users in your Azure AD directory.
110110

111111
You also can use the [persistent browser session controls in Conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md) to prevent users from seeing the KMSI prompt. This option allows you to disable the KMSI prompt for a select group of users (such as the global administrators) without affecting sign-in behavior for everyone else in the directory.
112112

articles/active-directory/fundamentals/how-to-customize-branding.md

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,25 @@ ms.collection: M365-identity-device-management
2020

2121
When users authenticate into your corporate intranet or web-based applications, Azure Active Directory (Azure AD) provides the identity and access management (IAM) service. You can add company branding that applies to all these sign-in experiences to create a consistent experience for your users.
2222

23-
The updated experience for adding company branding covered in this article is available as an Azure AD preview feature. To opt in and explore the new experience, go to **Azure AD** > **Preview features** and enable the **Enhanced Company Branding** feature.
23+
The default sign-in experience is the global look and feel that applies across all sign-ins to your tenant. Before you customize any settings, the default Microsoft branding will appear in your sign-in pages. You can customize this default experience with a custom background image or color, favicon, layout, header, and footer. You can also upload a custom CSS.
2424

25-
For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
25+
The updated experience for adding company branding covered in this article is available as an Azure AD preview feature. To opt in and explore the new experience, go to **Azure AD** > **Preview features** and enable the **Enhanced Company Branding** feature. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2626

2727
Instructions for the legacy company branding customization process can be found in the [Customize branding](customize-branding.md) article.
2828

29+
## User experience
30+
31+
You can customize the sign-in pages when users access your organization's tenant-specific apps. For Microsoft and SaaS applications (multi-tenant apps) such as <https://myapps.microsoft.com>, or <https://outlook.com> the customized sign-in page appears only after the user types their **Email**, or **Phone**, and select **Next**.
32+
33+
Some of the Microsoft applications support the home realm discovery `whr` query string parameter, or a domain variable. With the home realm discovery and domain parameter, the customized sign-in page will appear immediately in the first step.
34+
35+
In the following examples replace the contoso.com with your own tenant name, or verified domain name:
36+
37+
- For Microsoft Outlook `https://outlook.com/contoso.com`
38+
- For SharePoint online `https://contoso.sharepoint.com`
39+
- For my app portal `https://myapps.microsoft.com/?whr=contoso.com`
40+
- Self-service password reset `https://passwordreset.microsoftonline.com/?whr=contoso.com`
41+
2942
## License requirements
3043

3144
Adding custom branding requires one of the following licenses:
@@ -40,10 +53,6 @@ Azure AD Premium editions are available for customers in China using the worldwi
4053

4154
## Before you begin
4255

43-
You can customize the sign-in pages when users access your organization's tenant-specific apps, such as `https://outlook.com/woodgrove.com`, or when passing a domain variable, such as `https://passwordreset.microsoftonline.com/?whr=woodgrove.com`.
44-
45-
Custom branding appears after users authenticate for the first time. Users that start the sign-in process at a site like www\.office.com won't see the branding. After the first sign-in, the branding may take at least 15 minutes to appear.
46-
4756
**All branding elements are optional. Default settings will remain, if left unchanged.** For example, if you specify a banner logo but no background image, the sign-in page shows your logo with a default background image from the destination site such as Microsoft 365. Additionally, sign-in page branding doesn't carry over to personal Microsoft accounts. If your users or guests authenticate using a personal Microsoft account, the sign-in page won't reflect the branding of your organization.
4857

4958
**Images have different image and file size requirements.** Take note of the image requirements for each option. You may need to use a photo editor to create the right size images. The preferred image type for all images is PNG, but JPG is accepted.
@@ -148,4 +157,4 @@ The process for customizing the experience is the same as the [default sign-in e
148157

149158
- [Learn more about default user permissions in Azure AD](../fundamentals/users-default-permissions.md)
150159

151-
- [Manage the 'stay signed in' prompt](active-directory-users-profile-azure-portal.md#learn-about-the-stay-signed-in-prompt)
160+
- [Manage the 'stay signed in' prompt](active-directory-users-profile-azure-portal.md#learn-about-the-stay-signed-in-prompt)

0 commit comments

Comments
 (0)