Skip to content

Commit 20f7473

Browse files
authored
Merge pull request #254692 from MicrosoftDocs/main
10/11/2023 PM Publish
2 parents d758a80 + e1c6b3b commit 20f7473

File tree

156 files changed

+867
-698
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

156 files changed

+867
-698
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -470,6 +470,12 @@
470470
"branch": "featurestore/pup",
471471
"branch_mapping": {}
472472
},
473+
{
474+
"path_to_root": "azureml-examples-temp-fix",
475+
"url": "https://github.com/Azure/azureml-examples",
476+
"branch": "temp-fix-doc-error",
477+
"branch_mapping": {}
478+
},
473479
{
474480
"path_to_root": "terraform",
475481
"url": "https://github.com/Azure/terraform",

articles/active-directory/devices/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ sections:
167167
168168
- question: My users can't search printers from Microsoft Entra joined devices. How can I enable printing from those devices?
169169
answer: |
170-
To deploy printers for Microsoft Entra joined devices, see [Deploy Windows Server Hybrid Cloud Print with Pre-Authentication](/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy). You need an on-premises Windows Server to deploy hybrid cloud print. Currently, cloud-based print service isn't available.
170+
Organizations can choose to [deploy Windows Server Hybrid Cloud Print with Pre-Authentication](/windows-server/administration/hybrid-cloud-print/hybrid-cloud-print-deploy) or [Universal Print](/universal-print/fundamentals/universal-print-whatis) for their Microsoft Entra joined devices.
171171
172172
173173

articles/active-directory/fundamentals/add-custom-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: elkuzmen
1515
---
1616
# Add your custom domain name to your tenant
1717

18-
Microsoft Entra tenants come with an initial domain name like, `domainname.onmicrosoft.com`. You can't change or delete the initial domain name, but you can add your organization's names. Adding custom domain names helps you to create user names that are familiar to your users, such as `[email protected]`.
18+
Microsoft Entra tenants come with an initial domain name like, `domainname.onmicrosoft.com`. You can't change or delete the initial domain name, but you can add your organization's name to the initial domain. By adding your custom domain name, you can then add user names that are familiar to your users, such as `[email protected]`.
1919

2020
## Before you begin
2121

@@ -44,7 +44,7 @@ For more information about subscription roles, see [Azure roles](../../role-base
4444
After you create your directory, you can add your custom domain name.
4545

4646
> [!IMPORTANT]
47-
> When updating domain information, you may be unable to complete the process and encounter a HTTP 500 Internal Server Error message. Under some conditions, this error may be expected. This message may appear if you try to use a protected DNS suffix. Protected DNS suffixes may only be used by Microsoft. If you believe that this operation should have been completed successfully, please contact your Microsoft representative for assistance.
47+
> When updating domain information, you may be unable to complete the process and encounter a HTTP 500 Internal Server Error message. Under some conditions, this error may be expected. This message may appear if you try to use a protected DNS suffix. Protected DNS suffixes may only be used by Microsoft. If you believe that this operation should have been completed successfully, please contact your Microsoft representative for assistance.
4848
4949
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Domain Name Administrator](../roles/permissions-reference.md#domain-name-administrator).
5050

articles/active-directory/fundamentals/add-users.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -92,11 +92,7 @@ When a user is deleted, any licenses consumed by the user are made available for
9292
After you've added your users, you can do the following basic processes:
9393

9494
- [Add or change profile information](./how-to-manage-user-profile-info.md)
95-
9695
- [Assign roles to users](./how-subscriptions-associated-directory.md)
97-
9896
- [Create a basic group and add members](./how-to-manage-groups.md)
99-
10097
- [Work with dynamic groups and users](../enterprise-users/groups-create-rule.md)
101-
10298
- [Add guest users from another directory](../external-identities/what-is-b2b.md)

articles/active-directory/fundamentals/concept-learn-about-groups.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,9 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Learn about groups and access rights in Microsoft Entra ID
1919

20-
Microsoft Entra ID provides several ways to manage access to resources, applications, and tasks. With Microsoft Entra groups, you can grant access and permissions to a group of users instead of for each individual user. Limiting access to Microsoft Entra resources to only those users who need access is one of the core security principles of [Zero Trust](/security/zero-trust/zero-trust-overview). This article provides an overview of how groups and access rights can be used together to make managing your Microsoft Entra users easier while also applying security best practices.
20+
Microsoft Entra ID provides several ways to manage access to resources, applications, and tasks. With Microsoft Entra groups, you can grant access and permissions to a group of users instead of for each individual user. Limiting access to Microsoft Entra resources to only those users who need access is one of the core security principles of [Zero Trust](/security/zero-trust/zero-trust-overview).
21+
22+
This article provides an overview of how groups and access rights can be used together to make managing your Microsoft Entra users easier while also applying security best practices.
2123

2224
Microsoft Entra ID lets you use groups to manage access to applications, data, and resources. Resources can be:
2325

@@ -89,11 +91,7 @@ After a user requests to join a group, the request is forwarded to the group own
8991
## Next steps
9092

9193
- [Create and manage Microsoft Entra groups and group membership](how-to-manage-groups.md)
92-
9394
- [Learn about group-based licensing in Microsoft Entra ID](./licensing-whatis-azure-portal.md)
94-
9595
- [Manage access to SaaS apps using groups](../enterprise-users/groups-saasapps.md)
96-
9796
- [Manage dynamic rules for users in a group](../enterprise-users/groups-create-rule.md)
98-
9997
- [Learn about Privileged Identity Management for Microsoft Entra roles](../privileged-identity-management/pim-create-roles-and-resource-roles-review.md)

0 commit comments

Comments
 (0)