Skip to content

Commit 1a32f7c

Browse files
authored
Merge branch 'MicrosoftDocs:main' into patch-2
2 parents acff695 + dc343f3 commit 1a32f7c

File tree

335 files changed

+5007
-2435
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

335 files changed

+5007
-2435
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 24 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,11 @@
100100
"redirect_url": "/azure/active-directory/saas-apps/easy-metrics-connector-tutorial",
101101
"redirect_document_id": false
102102
},
103+
{
104+
"source_path_from_root": "/articles/active-directory/saas-apps/gainsight-saml-tutorial.md",
105+
"redirect_url": "/azure/active-directory/saas-apps/gainsight-tutorial",
106+
"redirect_document_id": false
107+
},
103108
{
104109
"source_path_from_root": "/articles/active-directory/saas-apps/iauditor-tutorial.md",
105110
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",
@@ -1613,17 +1618,17 @@
16131618
{
16141619
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-protect-web-api-dotnet-core-prepare-api.md",
16151620
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-protect-web-api-dotnet-core-build-app",
1616-
"redirect_document_id": false
1621+
"redirect_document_id": false
16171622
},
16181623
{
16191624
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-protect-web-api-dotnet-core-protect-endpoints.md",
16201625
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-protect-web-api-dotnet-core-build-app",
1621-
"redirect_document_id": false
1626+
"redirect_document_id": false
16221627
},
16231628
{
16241629
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-protect-web-api-dotnet-core-test-api.md",
16251630
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-protect-web-api-dotnet-core-test-api",
1626-
"redirect_document_id": false
1631+
"redirect_document_id": false
16271632
},
16281633
{
16291634
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-browserless-app-dotnet-sign-in-overview.md",
@@ -1633,17 +1638,17 @@
16331638
{
16341639
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-browserless-app-dotnet-sign-in-prepare-app.md",
16351640
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-browserless-app-dotnet-sign-in-build-app",
1636-
"redirect_document_id": false
1641+
"redirect_document_id": false
16371642
},
16381643
{
16391644
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-browserless-app-dotnet-sign-in-prepare-tenant.md",
16401645
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-browserless-app-dotnet-sign-in-prepare-tenant",
1641-
"redirect_document_id": false
1646+
"redirect_document_id": false
16421647
},
16431648
{
16441649
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-browserless-app-dotnet-sign-in-sign-in.md",
16451650
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-browserless-app-dotnet-sign-in-build-app",
1646-
"redirect_document_id": false
1651+
"redirect_document_id": false
16471652
},
16481653
{
16491654
"source_path_from_root": "/articles/active-directory/external-identities/delegate-invitations.md",
@@ -1678,17 +1683,17 @@
16781683
{
16791684
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-node-sign-in-overview.md",
16801685
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-node-sign-in-prepare-tenant",
1681-
"redirect_document_id": true
1686+
"redirect_document_id": true
16821687
},
16831688
{
16841689
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-node-sign-in-prepare-tenant.md",
16851690
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-node-sign-in-prepare-tenant",
1686-
"redirect_document_id": false
1691+
"redirect_document_id": false
16871692
},
16881693
{
16891694
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-node-sign-in-prepare-app.md",
16901695
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-node-sign-in-prepare-tenant",
1691-
"redirect_document_id": false
1696+
"redirect_document_id": false
16921697
},
16931698
{
16941699
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-node-sign-in-sign-in-out.md",
@@ -1703,32 +1708,32 @@
17031708
{
17041709
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-daemon-node-call-api-prepare-app.md",
17051710
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-daemon-node-call-api-prepare-tenant",
1706-
"redirect_document_id": false
1711+
"redirect_document_id": false
17071712
},
17081713
{
17091714
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-daemon-node-call-api-prepare-tenant.md",
17101715
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-daemon-node-call-api-prepare-tenant",
1711-
"redirect_document_id": false
1716+
"redirect_document_id": false
17121717
},
17131718
{
17141719
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-daemon-node-call-api-call-api.md",
17151720
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-daemon-node-call-api-prepare-tenant",
1716-
"redirect_document_id": false
1721+
"redirect_document_id": false
17171722
},
17181723
{
17191724
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-tenant.md",
17201725
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-tenant",
1721-
"redirect_document_id": false
1726+
"redirect_document_id": false
17221727
},
17231728
{
17241729
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-app.md",
17251730
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-app",
1726-
"redirect_document_id": false
1731+
"redirect_document_id": false
17271732
},
17281733
{
17291734
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-sign-out.md",
17301735
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-sign-out",
1731-
"redirect_document_id": false
1736+
"redirect_document_id": false
17321737
},
17331738
{
17341739
"source_path_from_root": "/articles/active-directory/external-identities/conditional-access.md",
@@ -13511,7 +13516,7 @@
1351113516
"redirect_document_id": false
1351213517
},
1351313518
{
13514-
"source_path_from_root": "/articles/active-directory/external-identities/customers/sample-single-page-application-angular.md",
13519+
"source_path_from_root": "/articles/active-directory/external-identities/customers/sample-single-page-application-angular.md",
1351513520
"redirect_url": "/azure/active-directory/external-identities/customers/sample-single-page-app-angular-sign-in",
1351613521
"redirect_document_id": false
1351713522
},
@@ -13540,7 +13545,8 @@
1354013545
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-react-sign-in-sign-out",
1354113546
"redirect_document_id": false
1354213547
},
13543-
{ "source_path_from_root": "/articles/active-directory/fundamentals/active-directory-whatis.md",
13548+
{
13549+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-whatis.md",
1354413550
"redirect_url": "/azure/active-directory/fundamentals/whatis",
1354513551
"redirect_document_id": false
1354613552
},
@@ -13637,6 +13643,6 @@
1363713643
"redirect_url": "/azure/active-directory/governance/licensing-fundamentals",
1363813644
"redirect_document_id": false
1363913645
}
13640-
13646+
1364113647
]
1364213648
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6310,11 +6310,6 @@
63106310
"redirect_url": "/azure/azure-monitor/agents/solution-agenthealth",
63116311
"redirect_document_id": false
63126312
},
6313-
{
6314-
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-hybrid-setup.md",
6315-
"redirect_url": "/azure/azure-monitor/containers/container-insights-enable-arc-enabled-clusters",
6316-
"redirect_document_id": false
6317-
},
63186313
{
63196314
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v3.md",
63206315
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
@@ -6324,11 +6319,6 @@
63246319
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v4.md",
63256320
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
63266321
"redirect_document_id": false
6327-
},
6328-
{
6329-
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-hybrid.md",
6330-
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6331-
"redirect_document_id": false
63326322
}
63336323
]
63346324
}

.openpublishing.redirection.json

Lines changed: 25 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7698,6 +7698,26 @@
76987698
"redirect_url": "/azure/azure-arc/servers/policy-reference",
76997699
"redirect_document_id": false
77007700
},
7701+
{
7702+
"source_path_from_root": "/articles/azure-arc/vmware-vsphere/disaster-recovery.md",
7703+
"redirect_url": "/azure/azure-arc/vmware-vsphere/recover-from-resource-bridge-deletion",
7704+
"redirect_document_id": false
7705+
},
7706+
{
7707+
"source_path_from_root": "/articles/azure-arc/vmware-vsphere/day2-operations-resource-bridge.md",
7708+
"redirect_url": "/azure/azure-arc/vmware-vsphere/administer-arc-vmware",
7709+
"redirect_document_id": false
7710+
},
7711+
{
7712+
"source_path_from_root": "/articles/azure-arc/vmware-vsphere/manage-access-to-arc-vmware-resources.md",
7713+
"redirect_url": "/azure/azure-arc/vmware-vsphere/setup-and-manage-self-service-access",
7714+
"redirect_document_id": false
7715+
},
7716+
{
7717+
"source_path_from_root": "/articles/azure-arc/vmware-vsphere/manage-vmware-vms-in-azure.md",
7718+
"redirect_url": "/azure/azure-arc/vmware-vsphere/perform-vm-ops-through-azure",
7719+
"redirect_document_id": false
7720+
},
77017721
{
77027722
"source_path_from_root": "/articles/redis-cache/index.md",
77037723
"redirect_url": "/azure/azure-cache-for-redis/",
@@ -24207,9 +24227,11 @@
2420724227
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-sign-in-sign-out.md",
2420824228
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-sign-in-sign-out",
2420924229
"redirect_document_id": false
24230+
},
24231+
{
24232+
"source_path_from_root": "/articles/bastion/bastion-connect-vm-rdp-linux.md",
24233+
"redirect_url": "/azure/bastion/bastion-connect-vm-ssh-linux",
24234+
"redirect_document_id": false
2421024235
}
24211-
24212-
24213-
2421424236
]
2421524237
}

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: overview
99
ms.workload: identity
10-
ms.date: 03/14/2023
10+
ms.date: 08/14/2023
1111
ms.author: kenwith
1212
ms.reviewer: arvinh
1313
---
@@ -20,9 +20,17 @@ In Azure Active Directory (Azure AD), the term *app provisioning* refers to auto
2020

2121
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and many more.
2222

23-
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. Your application must support [SCIM](https://aka.ms/scimoverview). Or, you must build a SCIM gateway to connect to your legacy application. If so, you can use the Azure AD Provisioning agent to [directly connect](./on-premises-scim-provisioning.md) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](./on-premises-ldap-connector-configure.md) user store or a [SQL](./tutorial-ecma-sql-connector.md) database, Azure AD can support these applications as well.
24-
25-
App provisioning lets you:
23+
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. The table below provides a mapping of protocols to connectors supported.
24+
25+
|Protocol |Connector|
26+
|-----|-----|
27+
| SCIM | [SCIM - SaaS](use-scim-to-provision-users-and-groups.md) <br />[SCIM - On-prem / Private network](./on-premises-scim-provisioning.md) |
28+
| LDAP | [LDAP](./on-premises-ldap-connector-configure.md)|
29+
| SQL | [SQL](./tutorial-ecma-sql-connector.md) |
30+
| REST | [Web Services](./on-premises-web-services-connector.md)|
31+
| SOAP | [Web Services](./on-premises-web-services-connector.md)|
32+
| Flat-file| [PowerShell](./on-premises-powershell-connector.md) |
33+
| Custom | [Custom ECMA connectors](./on-premises-custom-connector.md) <br /> [Connectors and gateways built by partners](./partner-driven-integrations.md)|
2634

2735
- **Automate provisioning**: Automatically create new accounts in the right systems for new people when they join your team or organization.
2836
- **Automate deprovisioning**: Automatically deactivate accounts in the right systems when people leave the team or organization.

articles/active-directory/architecture/recoverability-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,15 +124,15 @@ Microsoft Graph APIs are highly customizable based on your organizational needs.
124124

125125
*Securely store these configuration exports with access provided to a limited number of admins.
126126

127-
The [Azure AD Exporter](https://github.com/microsoft/azureadexporter) can provide most of the documentation you need:
127+
The [Entra Exporter](https://github.com/microsoft/entraexporter) can provide most of the documentation you need:
128128

129129
- Verify that you've implemented the desired configuration.
130130
- Use the exporter to capture current configurations.
131131
- Review the export, understand the settings for your tenant that aren't exported, and manually document them.
132132
- Store the output in a secure location with limited access.
133133

134134
> [!NOTE]
135-
> Settings in the legacy multifactor authentication portal for Application Proxy and federation settings might not be exported with the Azure AD Exporter, or with the Microsoft Graph API.
135+
> Settings in the legacy multifactor authentication portal for Application Proxy and federation settings might not be exported with the Entra Exporter, or with the Microsoft Graph API.
136136
The [Microsoft 365 Desired State Configuration](https://github.com/microsoft/Microsoft365DSC/wiki/What-is-Microsoft365DSC) module uses Microsoft Graph and PowerShell to retrieve the state of many of the configurations in Azure AD. This information can be used as reference information or, by using PowerShell Desired State Configuration scripting, to reapply a known good state.
137137

138138
Use [Conditional Access Graph APIs](https://github.com/Azure-Samples/azure-ad-conditional-access-apis) to manage policies like code. Automate approvals to promote policies from preproduction environments, backup and restore, monitor change, and plan ahead for emergencies.

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ OATH TOTP hardware tokens typically come with a secret key, or seed, pre-program
4040

4141
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
4242

43-
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
43+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
4444

4545
:::image type="content" border="true" source="./media/concept-authentication-methods/oath-tokens.png" alt-text="Screenshot of OATH token management." lightbox="./media/concept-authentication-methods/oath-tokens.png":::
4646

articles/active-directory/authentication/fido2-compatibility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The following tables show which transports are supported for each platform. Supp
7474
|---------|------|-----|-----|
7575
| Edge | &#10060; | &#10060; | &#10060; |
7676
| Chrome | &#x2705; | &#10060; | &#10060; |
77-
| Firefox | &#10060; | &#10060; | &#10060; |
77+
| Firefox | &#x2705; | &#10060; | &#10060; |
7878

7979

8080
### iOS

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.reviewer: calui
1717
# Sign-in to Azure AD with email as an alternate login ID (Preview)
1818

1919
> [!NOTE]
20-
> Sign-in to Azure AD with email as an alternate login ID is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
20+
> Sign-in to Azure AD with email as an alternate login ID is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
2121
2222
Many organizations want to let users sign in to Azure Active Directory (Azure AD) using the same credentials as their on-premises directory environment. With this approach, known as hybrid authentication, users only need to remember one set of credentials.
2323

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ OATH TOTP hardware tokens typically come with a secret key, or seed, pre-program
139139

140140
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
141141

142-
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms).
142+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://aka.ms/EntraPreviewsTermsOfUse).
143143

144144
![Screenshot that shows the OATH tokens section.](media/concept-authentication-methods/mfa-server-oath-tokens-azure-ad.png)
145145

articles/active-directory/develop/includes/develop-preview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ ms.topic: include
1515
# > FEATURE_OR_LIBRARY [!INCLUDE [PREVIEW BOILERPLATE](../../../includes/active-directory-develop-preview.md)]
1616
#
1717
---
18-
is in public preview. This preview is provided without a service-level agreement and isn't recommended for production workloads. Some features might be unsupported or have constrained capabilities. For more information, see [Supplemental terms of use for Microsoft Azure previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
18+
is in public preview. This preview is provided without a service-level agreement and isn't recommended for production workloads. Some features might be unsupported or have constrained capabilities. For more information, see [Universal License Terms for Online Services](https://aka.ms/EntraPreviewsTermsOfUse).

0 commit comments

Comments
 (0)