Skip to content

Commit 1affc3e

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 1158867 + 1002952 commit 1affc3e

File tree

66 files changed

+1380
-1266
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+1380
-1266
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -836,6 +836,7 @@
836836
"articles/event-hubs/.openpublishing.redirection.event-hubs.json",
837837
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
838838
"articles/iot-central/.openpublishing.redirection.iot-central.json",
839+
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
839840
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",
840841
"articles/iot-edge/.openpublishing.redirection.iot-edge.json",
841842
"articles/marketplace/.openpublishing.redirection.marketplace.json",

.openpublishing.redirection.json

Lines changed: 5 additions & 850 deletions
Large diffs are not rendered by default.

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 03/04/2021
9+
ms.date: 09/27/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -21,31 +21,31 @@ Accounts that are assigned administrative rights are targeted by attackers. Requ
2121

2222
Microsoft recommends you require MFA on the following roles at a minimum:
2323

24-
* Application administrator
25-
* Authentication Administrator
26-
* Billing administrator
27-
* Cloud application administrator
28-
* Conditional Access administrator
29-
* Exchange administrator
30-
* Global administrator
31-
* Helpdesk administrator
32-
* Password administrator
33-
* Privileged authentication administrator
34-
* Privileged Role Administrator
35-
* Security administrator
36-
* SharePoint administrator
37-
* User administrator
24+
- Global administrator
25+
- Application administrator
26+
- Authentication Administrator
27+
- Billing administrator
28+
- Cloud application administrator
29+
- Conditional Access administrator
30+
- Exchange administrator
31+
- Helpdesk administrator
32+
- Password administrator
33+
- Privileged authentication administrator
34+
- Privileged Role Administrator
35+
- Security administrator
36+
- SharePoint administrator
37+
- User administrator
3838

3939
Organizations can choose to include or exclude roles as they see fit.
4040

4141
## User exclusions
4242

4343
Conditional Access policies are powerful tools, we recommend excluding the following accounts from your policy:
4444

45-
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
46-
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
47-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
48-
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
45+
- **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
46+
- More information can be found in the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
47+
- **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
48+
- If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
4949

5050
## Create a Conditional Access policy
5151

@@ -57,20 +57,20 @@ The following steps will help create a Conditional Access policy to require thos
5757
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
5858
1. Under **Assignments**, select **Users and groups**
5959
1. Under **Include**, select **Directory roles** and choose built-in roles like:
60-
* Application administrator
61-
* Authentication Administrator
62-
* Billing administrator
63-
* Cloud application administrator
64-
* Conditional Access administrator
65-
* Exchange administrator
66-
* Global administrator
67-
* Helpdesk administrator
68-
* Password administrator
69-
* Privileged authentication administrator
70-
* Privileged Role Administrator
71-
* Security administrator
72-
* SharePoint administrator
73-
* User administrator
60+
- Global administrator
61+
- Application administrator
62+
- Authentication Administrator
63+
- Billing administrator
64+
- Cloud application administrator
65+
- Conditional Access administrator
66+
- Exchange administrator
67+
- Helpdesk administrator
68+
- Password administrator
69+
- Privileged authentication administrator
70+
- Privileged Role Administrator
71+
- Security administrator
72+
- SharePoint administrator
73+
- User administrator
7474

7575
> [!WARNING]
7676
> Conditional Access policies support built-in roles. Conditional Access policies are not enforced for other role types including [administrative unit-scoped](../roles/admin-units-assign-roles.md) or [custom roles](../roles/custom-create.md).

articles/active-directory/fundamentals/active-directory-deployment-checklist-p2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 10/29/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
13-
manager: daveba
13+
manager: karenhoran
1414
ms.reviewer: martinco
1515

1616
ms.collection: M365-identity-device-management

articles/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 01/26/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
13-
manager: daveba
13+
manager: karenhoran
1414
ms.reviewer: rogoya
1515

1616
ms.collection: M365-identity-device-management

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 09/17/2021
9+
ms.date: 09/27/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
13-
manager: daveba
13+
manager: karenhoran
1414
ms.reviewer: lvandenende
1515

1616
ms.collection: M365-identity-device-management
@@ -59,18 +59,18 @@ Users with privileged access have increased access to your environment. Because
5959
After registration with Azure AD Multi-Factor Authentication is finished, the following nine Azure AD administrator roles will be required to do extra authentication every time they sign in:
6060

6161
- Global administrator
62-
- SharePoint administrator
63-
- Exchange administrator
64-
- Conditional Access administrator
65-
- Security administrator
66-
- Helpdesk administrator
67-
- Billing administrator
68-
- User administrator
69-
- Authentication administrator
70-
- Password administrator
71-
- Privileged authentication administrator
72-
- Application administrator
73-
- Cloud application administrator
62+
- Application administrator
63+
- Authentication administrator
64+
- Billing administrator
65+
- Cloud application administrator
66+
- Conditional Access administrator
67+
- Exchange administrator
68+
- Helpdesk administrator
69+
- Password administrator
70+
- Privileged authentication administrator
71+
- Security administrator
72+
- SharePoint administrator
73+
- User administrator
7474

7575
> [!WARNING]
7676
> Ensure your directory has at least two accounts with global administrator privileges assigned to them. This will help in the case that one global administrator is locked out. For more detail see the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).

articles/active-directory/fundamentals/concept-secure-remote-workers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 04/27/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
13-
manager: daveba
13+
manager: karenhoran
1414
ms.reviewer: davidspo
1515

1616
ms.collection: M365-identity-device-management

articles/automation/automation-use-azure-ad.md

Lines changed: 28 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Use Azure AD in Azure Automation to authenticate to Azure
33
description: This article tells how to use Azure AD within Azure Automation as the provider for authentication to Azure.
44
services: automation
5-
ms.date: 03/30/2020
5+
ms.date: 09/23/2021
66
ms.topic: conceptual
77
ms.custom: devx-track-azurepowershell
88
---
@@ -46,7 +46,7 @@ Before installing the Azure AD modules on your computer:
4646
4747
1. Ensure that the Microsoft .NET Framework 3.5.x feature is enabled on your computer. It's likely that your computer has a newer version installed, but backward compatibility with older versions of the .NET Framework can be enabled or disabled.
4848

49-
2. Install the 64-bit version of the [Microsoft Online Services Sign-in Assistant](/microsoft-365/enterprise/connect-to-microsoft-365-powershell?view=o365-worldwide#step-1-install-the-required-software-1).
49+
2. Install the 64-bit version of the [Microsoft Online Services Sign-in Assistant](/microsoft-365/enterprise/connect-to-microsoft-365-powershell?view=o365-worldwide&preserve-view=true#step-1-install-the-required-software-1).
5050

5151
3. Run Windows PowerShell as an administrator to create an elevated Windows PowerShell command prompt.
5252

@@ -92,10 +92,10 @@ To prepare a new credential asset in Windows PowerShell, your script first creat
9292

9393
## Manage Azure resources from an Azure Automation runbook
9494

95-
You can manage Azure resources from Azure Automation runbooks using the credential asset. Below is an example PowerShell runbook that collects the credential asset to use for stopping and starting virtual machines in an Azure subscription. This runbook first uses `Get-AutomationPSCredential` to retrieve the credential to use to authenticate to Azure. It then calls the [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount) cmdlet to connect to Azure using the credential. The script uses the [Select-AzureSubscription](/powershell/module/servicemanagement/azure.service/select-azuresubscription) cmdlet to choose the subscription to work with.
95+
You can manage Azure resources from Azure Automation runbooks using the credential asset. Below is an example PowerShell runbook that collects the credential asset to use for stopping and starting virtual machines in an Azure subscription. This runbook first uses `Get-AutomationPSCredential` to retrieve the credential to use to authenticate to Azure. It then calls the [Connect-AzAccount](/powershell/module/az.accounts/connect-azaccount) cmdlet to connect to Azure using the credential.
9696

97-
```azurepowershell
98-
Workflow Stop-Start-AzureVM
97+
```powershell
98+
Workflow Workflow
9999
{
100100
Param
101101
(
@@ -110,9 +110,25 @@ Workflow Stop-Start-AzureVM
110110
$Action
111111
)
112112
113-
$credential = Get-AutomationPSCredential -Name 'AzureCredential'
114-
Connect-AzAccount -Credential $credential
115-
Select-AzureSubscription -SubscriptionId $AzureSubscriptionId
113+
# Ensures you do not inherit an AzContext in your runbook
114+
Disable-AzContextAutosave -Scope Process
115+
116+
# Connect to Azure with system-assigned managed identity
117+
$AzureContext = (Connect-AzAccount -Identity).context
118+
119+
# set and store context
120+
$AzureContext = Set-AzContext -SubscriptionName $AzureContext.Subscription -DefaultProfile $AzureContext
121+
122+
# get credential
123+
$credential = Get-AutomationPSCredential -Name "AzureCredential"
124+
125+
# Connect to Azure with credential
126+
$AzureContext = (Connect-AzAccount -Credential $credential -TenantId $AzureContext.Subscription.TenantId).context
127+
128+
# set and store context
129+
$AzureContext = Set-AzContext -SubscriptionName $AzureContext.Subscription `
130+
-TenantId $AzureContext.Subscription.TenantId `
131+
-DefaultProfile $AzureContext
116132
117133
if($AzureVMList -ne "All")
118134
{
@@ -121,14 +137,13 @@ Workflow Stop-Start-AzureVM
121137
}
122138
else
123139
{
124-
$AzureVMs = (Get-AzVM).Name
140+
$AzureVMs = (Get-AzVM -DefaultProfile $AzureContext).Name
125141
[System.Collections.ArrayList]$AzureVMsToHandle = $AzureVMs
126-
127142
}
128143
129144
foreach($AzureVM in $AzureVMsToHandle)
130145
{
131-
if(!(Get-AzVM | ? {$_.Name -eq $AzureVM}))
146+
if(!(Get-AzVM -DefaultProfile $AzureContext | ? {$_.Name -eq $AzureVM}))
132147
{
133148
throw " AzureVM : [$AzureVM] - Does not exist! - Check your inputs "
134149
}
@@ -139,15 +154,15 @@ Workflow Stop-Start-AzureVM
139154
Write-Output "Stopping VMs";
140155
foreach -parallel ($AzureVM in $AzureVMsToHandle)
141156
{
142-
Get-AzVM | ? {$_.Name -eq $AzureVM} | Stop-AzVM -Force
157+
Get-AzVM -DefaultProfile $AzureContext | ? {$_.Name -eq $AzureVM} | Stop-AzVM -DefaultProfile $AzureContext -Force
143158
}
144159
}
145160
else
146161
{
147162
Write-Output "Starting VMs";
148163
foreach -parallel ($AzureVM in $AzureVMsToHandle)
149164
{
150-
Get-AzVM | ? {$_.Name -eq $AzureVM} | Start-AzVM
165+
Get-AzVM -DefaultProfile $AzureContext | ? {$_.Name -eq $AzureVM} | Start-AzVM -DefaultProfile $AzureContext
151166
}
152167
}
153168
}

articles/azure-maps/tutorial-create-store-locator.md

Lines changed: 49 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -639,54 +639,55 @@ To add the JavaScript:
639639
//Load a custom image icon into the map resources.
640640
map.imageSprite.add('myCustomIcon', iconImageUrl).then(function() {
641641
642-
//Create a layer to render a coffee cup symbol above each bubble for an individual location.
643-
iconLayer = new atlas.layer.SymbolLayer(datasource, null, {
644-
iconOptions: {
645-
//Pass in the ID of the custom icon that was loaded into the map resources.
646-
image: 'myCustomIcon',
647-
648-
//Optionally, scale the size of the icon.
649-
font: ['SegoeUi-Bold'],
650-
651-
//Anchor the center of the icon image to the coordinate.
652-
anchor: 'center',
653-
654-
//Allow the icons to overlap.
655-
allowOverlap: true
656-
},
657-
658-
filter: ['!', ['has', 'point_count']] //Filter out clustered points from this layer.
659-
});
660-
661-
map.layers.add(iconLayer);
662-
663-
//When the mouse is over the cluster and icon layers, change the cursor to a pointer.
664-
map.events.add('mouseover', [clusterBubbleLayer, iconLayer], function() {
665-
map.getCanvasContainer().style.cursor = 'pointer';
666-
});
667-
668-
//When the mouse leaves the item on the cluster and icon layers, change the cursor back to the default (grab).
669-
map.events.add('mouseout', [clusterBubbleLayer, iconLayer], function() {
670-
map.getCanvasContainer().style.cursor = 'grab';
671-
});
672-
673-
//Add a click event to the cluster layer. When the user selects a cluster, zoom into it by two levels.
674-
map.events.add('click', clusterBubbleLayer, function(e) {
675-
map.setCamera({
676-
center: e.position,
677-
zoom: map.getCamera().zoom + 2
678-
});
679-
});
680-
681-
//Add a click event to the icon layer and show the shape that was selected.
682-
map.events.add('click', iconLayer, function(e) {
683-
showPopup(e.shapes[0]);
684-
});
685-
686-
//Add an event to monitor when the map is finished rendering the map after it has moved.
687-
map.events.add('render', function() {
688-
//Update the data in the list.
689-
updateListItems();
642+
//Create a layer to render a coffee cup symbol above each bubble for an individual location.
643+
iconLayer = new atlas.layer.SymbolLayer(datasource, null, {
644+
iconOptions: {
645+
//Pass in the ID of the custom icon that was loaded into the map resources.
646+
image: 'myCustomIcon',
647+
648+
//Optionally, scale the size of the icon.
649+
font: ['SegoeUi-Bold'],
650+
651+
//Anchor the center of the icon image to the coordinate.
652+
anchor: 'center',
653+
654+
//Allow the icons to overlap.
655+
allowOverlap: true
656+
},
657+
658+
filter: ['!', ['has', 'point_count']] //Filter out clustered points from this layer.
659+
});
660+
661+
map.layers.add(iconLayer);
662+
663+
//When the mouse is over the cluster and icon layers, change the cursor to a pointer.
664+
map.events.add('mouseover', [clusterBubbleLayer, iconLayer], function() {
665+
map.getCanvasContainer().style.cursor = 'pointer';
666+
});
667+
668+
//When the mouse leaves the item on the cluster and icon layers, change the cursor back to the default (grab).
669+
map.events.add('mouseout', [clusterBubbleLayer, iconLayer], function() {
670+
map.getCanvasContainer().style.cursor = 'grab';
671+
});
672+
673+
//Add a click event to the cluster layer. When the user selects a cluster, zoom into it by two levels.
674+
map.events.add('click', clusterBubbleLayer, function(e) {
675+
map.setCamera({
676+
center: e.position,
677+
zoom: map.getCamera().zoom + 2
678+
});
679+
});
680+
681+
//Add a click event to the icon layer and show the shape that was selected.
682+
map.events.add('click', iconLayer, function(e) {
683+
showPopup(e.shapes[0]);
684+
});
685+
686+
//Add an event to monitor when the map is finished rendering the map after it has moved.
687+
map.events.add('render', function() {
688+
//Update the data in the list.
689+
updateListItems();
690+
});
690691
});
691692
```
692693

articles/azure-relay/relay-what-is-it.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: What is Azure Relay? | Microsoft Docs
33
description: This article provides an overview of the Azure Relay service, which allows you to develop cloud applications that consume on-premises services running in your corporate network without opening a firewall connection or making intrusive changes to your network infrastructure.
44
ms.topic: conceptual
55
ms.date: 09/02/2021
6+
ms.custom: contperf-fy22q1
67
---
78

89
# What is Azure Relay?

0 commit comments

Comments
 (0)