Skip to content

Commit 194e5e9

Browse files
authored
Merge pull request #239831 from MicrosoftDocs/main
5/31 AM Publish
2 parents 9194b88 + e81bc8a commit 194e5e9

File tree

215 files changed

+2200
-1461
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

215 files changed

+2200
-1461
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-enterprise-app-role-management.md",
5+
"redirect_url": "/azure/active-directory/develop/enterprise-app-role-management",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/active-directory/develop/active-directory-schema-extensions.md",
510
"redirect_url": "/azure/active-directory/develop/schema-extensions",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7864,6 +7864,11 @@
78647864
"redirect_url": "/azure/azure-maps/power-bi-visual-add-3d-column-layer",
78657865
"redirect_document_id": false
78667866
},
7867+
{
7868+
"source_path_from_root": "/articles/azure-maps/power-bi-visual-migrate-from-bing-maps.md",
7869+
"redirect_url": "/azure/azure-maps/power-bi-visual-conversion",
7870+
"redirect_document_id": false
7871+
},
78677872
{
78687873
"source_path_from_root": "/articles/azure-portal/resource-group-portal-linked-resources.md",
78697874
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
@@ -22893,6 +22898,11 @@
2289322898
"source_path_from_root": "/articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md",
2289422899
"redirect_url": "/azure/active-directory/authentication/how-to-migrate-mfa-server-to-mfa-with-federation",
2289522900
"redirect_document_id": true
22901+
},
22902+
{
22903+
"source_path_from_root": "/articles/active-directory/manage-apps/migrate-okta-sync-provisioning-to-azure-active-directory.md",
22904+
"redirect_url": "/azure/active-directory/manage-apps/migrate-okta-sync-provisioning",
22905+
"redirect_document_id": true
2289622906
}
2289722907
]
2289822908
}

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ For passwordless sign-in to work, users should disable legacy notification throu
115115
1. Follow the steps at [Enable passwordless phone sign-in authentication](../authentication/howto-authentication-passwordless-phone.md#enable-passwordless-phone-sign-in-authentication-methods)
116116

117117
>[!IMPORTANT]
118-
>In the above configuration under step 4, please choose **Passwordless** option. Change the mode for each groups added for PSI for **Authentication mode**, choose **Passwordless** for passwordless sign-in to work with CBA.
118+
>In the above configuration under step 4, please choose **Passwordless** option. Change the mode for each groups added for PSI for **Authentication mode**, choose **Passwordless** for passwordless sign-in to work with CBA. If the admin configures "Any", the user can use either push or passwordless. If passwordless is preferred over push but still wants to allow push, admin can still choose "Any" but configure system preferred MFA or configure authentication strengths.
119119
120120
1. Select **Azure Active Directory** > **Security** > **Multifactor authentication** > **Additional cloud-based multifactor authentication settings**.
121121

articles/active-directory/develop/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -455,7 +455,7 @@
455455
- name: Configure optional claims
456456
href: optional-claims.md
457457
- name: Configure role claim
458-
href: active-directory-enterprise-app-role-management.md
458+
href: enterprise-app-role-management.md
459459
- name: Customize JWT claims
460460
href: jwt-claims-customization.md
461461
- name: Customize SAML claims
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ In Azure Active Directory (Azure AD), you can customize the role claim in the ac
2020

2121
## Prerequisites
2222

23-
- An Azure AD subscription with a set up tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
23+
- An Azure AD subscription with a configured tenant. For more information, see [Quickstart: Set up a tenant](quickstart-create-new-tenant.md).
2424
- An enterprise application that has been added to the tenant. For more information, see [Quickstart: Add an enterprise application](../manage-apps/add-application-portal.md).
2525
- Single sign-on (SSO) configured for the application. For more information, see [Enable single sign-on for an enterprise application](../manage-apps/add-application-portal-setup-sso.md).
26-
- A user account that will be assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
26+
- A user account that is assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
2727

2828
> [!NOTE]
2929
> This article explains how to create, update, or delete application roles on the service principal using APIs in Azure AD. To use the new user interface for App Roles, see [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md).
@@ -43,7 +43,7 @@ Use the following steps to locate the enterprise application:
4343

4444
Use the Microsoft Graph Explorer to add roles to an enterprise application.
4545

46-
1. Open [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window and sign in using the global admin or co-admin credentials for your tenant.
46+
1. Open [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window and sign in using the administrator credentials for your tenant.
4747

4848
> [!NOTE]
4949
> The Cloud App Administrator and App Administrator role won't work in this scenario. The Global Admin permissions are needed for directory read and write.

0 commit comments

Comments
 (0)