Skip to content

Commit 2097f3d

Browse files
authored
Merge pull request #222662 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST 12/30
2 parents 66c10a5 + bc00b28 commit 2097f3d

21 files changed

+1562
-551
lines changed

articles/active-directory/roles/permissions-reference.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: roles
1111
ms.topic: reference
12-
ms.date: 11/04/2022
12+
ms.date: 12/29/2022
1313
ms.author: rolyon
1414
ms.reviewer: abhijeetsinha
1515
ms.custom: generated, it-pro, fasttrack-edit
@@ -632,6 +632,7 @@ Users with this role have the ability to manage Azure Active Directory Condition
632632
> | microsoft.directory/conditionalAccessPolicies/basic/update | Update basic properties for conditional access policies |
633633
> | microsoft.directory/conditionalAccessPolicies/owners/update | Update owners for conditional access policies |
634634
> | microsoft.directory/conditionalAccessPolicies/tenantDefault/update | Update the default tenant for conditional access policies |
635+
> | microsoft.directory/resourceNamespaces/resourceActions/authenticationContext/update | Update Conditional Access authentication context of Microsoft 365 role-based access control (RBAC) resource actions |
635636
636637
## Customer LockBox Access Approver
637638

@@ -1005,6 +1006,7 @@ Users with this role have access to all administrative features in Azure Active
10051006
> | microsoft.directory/crossTenantAccessPolicy/partners/tenantRestrictions/update | Update tenant restrictions of cross-tenant access policy for partners |
10061007
> | microsoft.directory/privilegedIdentityManagement/allProperties/read | Read all resources in Privileged Identity Management |
10071008
> | microsoft.directory/provisioningLogs/allProperties/read | Read all properties of provisioning logs |
1009+
> | microsoft.directory/resourceNamespaces/resourceActions/authenticationContext/update | Update Conditional Access authentication context of Microsoft 365 role-based access control (RBAC) resource actions |
10081010
> | microsoft.directory/roleAssignments/allProperties/allTasks | Create and delete role assignments, and read and update all role assignment properties |
10091011
> | microsoft.directory/roleDefinitions/allProperties/allTasks | Create and delete role definitions, and read and update all properties |
10101012
> | microsoft.directory/scopedRoleMemberships/allProperties/allTasks | Create and delete scopedRoleMemberships, and read and update all properties |
@@ -1043,9 +1045,13 @@ Users with this role have access to all administrative features in Azure Active
10431045
> | microsoft.azure.supportTickets/allEntities/allTasks | Create and manage Azure support tickets |
10441046
> | microsoft.cloudPC/allEntities/allProperties/allTasks | Manage all aspects of Windows 365 |
10451047
> | microsoft.commerce.billing/allEntities/allProperties/allTasks | Manage all aspects of Office 365 billing |
1048+
> | microsoft.commerce.billing/purchases/standard/read | Read purchase services in M365 Admin Center. |
10461049
> | microsoft.dynamics365/allEntities/allTasks | Manage all aspects of Dynamics 365 |
10471050
> | microsoft.edge/allEntities/allProperties/allTasks | Manage all aspects of Microsoft Edge |
10481051
> | microsoft.flow/allEntities/allTasks | Manage all aspects of Microsoft Power Automate |
1052+
> | microsoft.hardware.support/shippingAddress/allProperties/allTasks | Create, read, update, and delete shipping addresses for Microsoft hardware warranty claims, including shipping addresses created by others |
1053+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1054+
> | microsoft.hardware.support/warrantyClaims/allProperties/allTasks | Create and manage all aspects of Microsoft hardware warranty claims |
10491055
> | microsoft.insights/allEntities/allProperties/allTasks | Manage all aspects of Insights app |
10501056
> | microsoft.intune/allEntities/allTasks | Manage all aspects of Microsoft Intune |
10511057
> | microsoft.office365.complianceManager/allEntities/allTasks | Manage all aspects of Office 365 Compliance Manager |
@@ -1159,7 +1165,11 @@ Users with this role **cannot** do the following:
11591165
> | microsoft.directory/lifecycleWorkflows/workflows/allProperties/read | Read all properties of lifecycle workflows and tasks in Azure AD |
11601166
> | microsoft.cloudPC/allEntities/allProperties/read | Read all aspects of Windows 365 |
11611167
> | microsoft.commerce.billing/allEntities/allProperties/read | Read all resources of Office 365 billing |
1168+
> | microsoft.commerce.billing/purchases/standard/read | Read purchase services in M365 Admin Center. |
11621169
> | microsoft.edge/allEntities/allProperties/read | Read all aspects of Microsoft Edge |
1170+
> | microsoft.hardware.support/shippingAddress/allProperties/read | Read shipping addresses for Microsoft hardware warranty claims, including existing shipping addresses created by others |
1171+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1172+
> | microsoft.hardware.support/warrantyClaims/allProperties/read | Read Microsoft hardware warranty claims |
11631173
> | microsoft.insights/allEntities/allProperties/read | Read all aspects of Viva Insights |
11641174
> | microsoft.office365.messageCenter/messages/read | Read messages in Message Center in the Microsoft 365 admin center, excluding security messages |
11651175
> | microsoft.office365.messageCenter/securityMessages/read | Read security messages in Message Center in the Microsoft 365 admin center |
@@ -1548,6 +1558,9 @@ A warranty claim is a request to have the hardware repaired or replaced in accor
15481558
> [!div class="mx-tableFixed"]
15491559
> | Actions | Description |
15501560
> | --- | --- |
1561+
> | microsoft.hardware.support/shippingAddress/allProperties/allTasks | Create, read, update, and delete shipping addresses for Microsoft hardware warranty claims, including shipping addresses created by others |
1562+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1563+
> | microsoft.hardware.support/warrantyClaims/allProperties/allTasks | Create and manage all aspects of Microsoft hardware warranty claims |
15511564
> | microsoft.office365.messageCenter/messages/read | Read messages in Message Center in the Microsoft 365 admin center, excluding security messages |
15521565
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
15531566
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
@@ -1567,8 +1580,12 @@ A warranty claim is a request to have the hardware repaired or replaced in accor
15671580
> [!div class="mx-tableFixed"]
15681581
> | Actions | Description |
15691582
> | --- | --- |
1583+
> | microsoft.hardware.support/shippingAddress/allProperties/read | Read shipping addresses for Microsoft hardware warranty claims, including existing shipping addresses created by others |
1584+
> | microsoft.hardware.support/warrantyClaims/createAsOwner | Create Microsoft hardware warranty claims where creator is the owner |
15701585
> | microsoft.office365.supportTickets/allEntities/allTasks | Create and manage Microsoft 365 service requests |
15711586
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
1587+
> | microsoft.hardware.support/shippingStatus/allProperties/read | Read shipping status for open Microsoft hardware warranty claims |
1588+
> | microsoft.hardware.support/warrantyClaims/allProperties/read | Read Microsoft hardware warranty claims |
15721589
15731590
## Modern Commerce User
15741591

@@ -1628,7 +1645,7 @@ Assign the Organizational Messages Writer role to users who need to do the follo
16281645
- Write, publish, and delete organizational messages using Microsoft 365 admin center or Microsoft Endpoint Manager
16291646
- Manage organizational message delivery options using Microsoft 365 admin center or Microsoft Endpoint Manager
16301647
- Read organizational message delivery results using Microsoft 365 admin center or Microsoft Endpoint Manager
1631-
- View usage reports and most settings in the Microsoft 365 admin center, but can't make changes
1648+
- View usage reports and most settings in the Microsoft 365 admin center, but can't make changes
16321649

16331650
> [!div class="mx-tableFixed"]
16341651
> | Actions | Description |
@@ -2008,6 +2025,7 @@ Azure Advanced Threat Protection | Monitor and respond to suspicious security ac
20082025
> | microsoft.directory/conditionalAccessPolicies/tenantDefault/update | Update the default tenant for conditional access policies |
20092026
> | microsoft.directory/privilegedIdentityManagement/allProperties/read | Read all resources in Privileged Identity Management |
20102027
> | microsoft.directory/provisioningLogs/allProperties/read | Read all properties of provisioning logs |
2028+
> | microsoft.directory/resourceNamespaces/resourceActions/authenticationContext/update | Update Conditional Access authentication context of Microsoft 365 role-based access control (RBAC) resource actions |
20112029
> | microsoft.directory/servicePrincipals/policies/update | Update policies of service principals |
20122030
> | microsoft.directory/signInReports/allProperties/read | Read all properties on sign-in reports, including privileged properties |
20132031
> | microsoft.azure.serviceHealth/allEntities/allTasks | Read and configure Azure Service Health |
@@ -2248,7 +2266,7 @@ Users with this role can manage [Teams-certified devices](https://www.microsoft.
22482266
> | microsoft.office365.webPortal/allEntities/standard/read | Read basic properties on all resources in the Microsoft 365 admin center |
22492267
> | microsoft.teams/devices/standard/read | Manage all aspects of Teams-certified devices including configuration policies |
22502268
2251-
## Tenant Creator
2269+
## Tenant Creator
22522270

22532271
Assign the Tenant Creator role to users who need to do the following tasks:
22542272
- Create both Azure Active Directory and Azure Active Directory B2C tenants even if the tenant creation toggle is turned off in the user settings
@@ -2259,7 +2277,7 @@ Assign the Tenant Creator role to users who need to do the following tasks:
22592277
> | Actions | Description |
22602278
> | --- | --- |
22612279
> | microsoft.directory/tenantManagement/tenants/create | Create new tenants in Azure Active Directory |
2262-
2280+
22632281
## Usage Summary Reports Reader
22642282

22652283
Users with this role can access tenant level aggregated data and associated insights in Microsoft 365 admin center for Usage and Productivity Score but cannot access any user level details or insights. In Microsoft 365 admin center for the two reports, we differentiate between tenant level aggregated data and user level details. This role gives an extra layer of protection on individual user identifiable data, which was requested by both customers and legal teams.
33.3 KB
Loading

articles/aks/operator-best-practices-multi-region.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,19 +50,19 @@ When you deploy your application, add another step to your CI/CD pipeline to dep
5050

5151
> **Best practice**
5252
>
53-
> Azure Traffic Manager can direct you to your closest AKS cluster and application instance. For the best performance and redundancy, direct all application traffic through Traffic Manager before it goes to your AKS cluster.
53+
> For the best performance and redundancy, direct all application traffic through Traffic Manager before it goes to your AKS cluster.
5454
55-
If you have multiple AKS clusters in different regions, use Traffic Manager to control traffic flow to the applications running in each cluster. [Azure Traffic Manager](../traffic-manager/index.yml) is a DNS-based traffic load balancer that can distribute network traffic across regions. Use Traffic Manager to route users based on cluster response time or based on geography.
55+
If you have multiple AKS clusters in different regions, use Traffic Manager to control traffic flow to the applications running in each cluster. [Azure Traffic Manager](../traffic-manager/index.yml) is a DNS-based traffic load balancer that can distribute network traffic across regions. Use Traffic Manager to route users based on cluster response time or based on priority.
5656

5757
![AKS with Traffic Manager](media/operator-best-practices-bc-dr/aks-azure-traffic-manager.png)
5858

5959
If you have a single AKS cluster, you typically connect to the service IP or DNS name of a given application. In a multi-cluster deployment, you should connect to a Traffic Manager DNS name that points to the services on each AKS cluster. Define these services by using Traffic Manager endpoints. Each endpoint is the *service load balancer IP*. Use this configuration to direct network traffic from the Traffic Manager endpoint in one region to the endpoint in a different region.
6060

61-
![Geographic routing through Traffic Manager](media/operator-best-practices-bc-dr/traffic-manager-geographic-routing.png)
61+
Traffic Manager performs DNS lookups and returns your most appropriate endpoint. With priority routing you can enable a primary service endpoint and multiple backup endpoints in case the primary or one of the backup endpoints is unavailable.
6262

63-
Traffic Manager performs DNS lookups and returns your most appropriate endpoint. Nested profiles can prioritize a primary location. For example, you should connect to their closest geographic region. If that region has a problem, Traffic Manager directs you to a secondary region. This approach ensures that you can connect to an application instance even if your closest geographic region is unavailable.
63+
![Priority routing through Traffic Manager](media/operator-best-practices-bc-dr/traffic-manager-priority-routing.png)
6464

65-
For information on how to set up endpoints and routing, see [Configure the geographic traffic routing method by using Traffic Manager](../traffic-manager/traffic-manager-configure-geographic-routing-method.md).
65+
For information on how to set up endpoints and routing, see [Configure priority traffic routing method in Traffic Manager](../traffic-manager/traffic-manager-configure-priority-routing-method.md).
6666

6767
### Application routing with Azure Front Door Service
6868

articles/azure-maps/how-to-dev-guide-csharp-sdk.md

Lines changed: 29 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ var client = new MapsSearchClient(credential);
151151
SearchAddressResult searchResult = client.FuzzySearch(
152152
"Starbucks", new FuzzySearchOptions
153153
{
154-
Coordinates = new GeoPosition(-122.31, 47.61),
154+
Coordinates = new GeoPosition(-122.34255, 47.61010),
155155
Language = SearchLanguage.EnglishUsa
156156
});
157157

@@ -160,8 +160,7 @@ SearchAddressResult searchResult = client.FuzzySearch(
160160
foreach (var result in searchResult.Results)
161161
{
162162
Console.WriteLine($"""
163-
* {result.PointOfInterest.Name}
164-
{result.Address.StreetNumber} {result.Address.StreetName}
163+
* {result.Address.StreetNumber} {result.Address.StreetName}
165164
{result.Address.Municipality} {result.Address.CountryCode} {result.Address.PostalCode}
166165
Coordinate: ({result.Position.Latitude:F4}, {result.Position.Longitude:F4})
167166
""");
@@ -185,46 +184,36 @@ dotnet run
185184
You should see a list of Starbucks address and coordinate results:
186185

187186
```text
188-
* Starbucks
189-
1600, East Jefferson Street
190-
Seattle US 98122
191-
Coordinate: (47.6065, -122.3110)
192-
* Starbucks
193-
800, 12th Avenue
194-
Seattle US 98122
195-
Coordinate: (47.6093, -122.3165)
196-
* Starbucks
197-
2201, East Madison Street
198-
Seattle US 98112
199-
Coordinate: (47.6180, -122.3036)
200-
* Starbucks
201-
101, Broadway East
202-
Seattle US 98102
203-
Coordinate: (47.6189, -122.3213)
204-
* Starbucks
205-
2300, South Jackson Street
206-
Seattle US 98144
207-
Coordinate: (47.5995, -122.3020)
208-
* Starbucks
209-
1600, East Olive Way
210-
Seattle US 98102
211-
Coordinate: (47.6195, -122.3251)
212-
* Starbucks
213-
1730, Howell Street
187+
* 1912 Pike Place
188+
Seattle US 98101
189+
Coordinate: 47.61016, -122.34248
190+
* 2118 Westlake Avenue
191+
Seattle US 98121
192+
Coordinate: 47.61731, -122.33782
193+
* 2601 Elliott Avenue
194+
Seattle US 98121
195+
Coordinate: 47.61426, -122.35261
196+
* 1730 Howell Street
214197
Seattle US 98101
215-
Coordinate: (47.6172, -122.3298)
216-
* Starbucks
217-
505, 5Th Ave S
198+
Coordinate: 47.61716, -122.3298
199+
* 220 1st Avenue South
218200
Seattle US 98104
219-
Coordinate: (47.5977, -122.3285)
220-
* Starbucks
221-
121, Lakeside Avenue South
222-
Seattle US 98122
223-
Coordinate: (47.6020, -122.2851)
224-
* Starbucks Regional Office
225-
220, 1st Avenue South
201+
Coordinate: 47.60027, -122.3338
202+
* 400 Occidental Avenue South
203+
Seattle US 98104
204+
Coordinate: 47.5991, -122.33278
205+
* 1600 East Olive Way
206+
Seattle US 98102
207+
Coordinate: 47.61948, -122.32505
208+
* 500 Mercer Street
209+
Seattle US 98109
210+
Coordinate: 47.62501, -122.34687
211+
* 505 5Th Ave S
226212
Seattle US 98104
227-
Coordinate: (47.6003, -122.3338)
213+
Coordinate: 47.59768, -122.32849
214+
* 425 Queen Anne Avenue North
215+
Seattle US 98109
216+
Coordinate: 47.62301, -122.3571
228217
```
229218

230219
## Search an address

0 commit comments

Comments
 (0)