Skip to content

Commit 2229a05

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-custom-roles-management-group-scope-ga
2 parents 08fa881 + 91d2cd5 commit 2229a05

21 files changed

+173
-260
lines changed

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ In this article, you'll learn how to configure the admin consent workflow to ena
2222

2323
The admin consent workflow gives admins a secure way to grant access to applications that require admin approval. When a user tries to access an application but is unable to provide consent, they can send a request for admin approval. The request is sent via email to admins who have been designated as reviewers. A reviewer takes action on the request, and the user is notified of the action.
2424

25-
To approve requests, a reviewer must be a global administrator, cloud application administrator, or application administrator. The reviewer must already have one of these admin roles assigned; simply designating them as a reviewer doesn't elevate their privileges.
25+
To approve requests, a reviewer must have the [permissions required](grant-admin-consent.md#prerequisites) to grant admin consent for the application requested. Simply designating them as a reviewer doesn't elevate their privileges.
2626

2727
## Prerequisites
2828

@@ -53,7 +53,7 @@ To enable the admin consent workflow and choose reviewers:
5353
1. Select **Save**. It can take up to an hour for the workflow to become enabled.
5454

5555
> [!NOTE]
56-
> You can add or remove reviewers for this workflow by modifying the **Who can review admin consent requests** list. A current limitation of this feature is that a reviewer can retain the ability to review requests that were made while they were designated as a reviewer.
56+
> You can add or remove reviewers for this workflow by modifying the **Who can review admin consent requests** list. A current limitation of this feature is that a reviewer retains the ability to review requests that were made while they were designated as a reviewer. Additionally, new reviewers will not be assigned to requests that were created before they were set as a reviewer.
5757
5858
## Configure the admin consent workflow using Microsoft Graph
5959

articles/active-directory/manage-apps/user-admin-consent-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 09/28/2022
11+
ms.date: 04/04/2023
1212
ms.author: jomondi
1313
ms.reviewer: phsignor
1414
ms.collection: M365-identity-device-management
@@ -48,13 +48,13 @@ For most organizations, one of the built-in options will be appropriate. Some ad
4848

4949
## Admin consent
5050

51-
During admin consent, a Privileged Administrator may grant an application access on behalf of other users (usually, on behalf of the entire organization). Also during admin consent, applications or services provide direct access to an API, which can be used by the application if there's no signed-in user.
51+
During admin consent, a Privileged Administrator may grant an application access on behalf of other users (usually, on behalf of the entire organization). Also during admin consent, applications or services provide direct access to an API, which can be used by the application if there's no signed-in user. The specific role needed to grant admin consent differs based on the permissions requested, which are outlined [here.](grant-admin-consent.md#prerequisites)
5252

5353
When your organization purchases a license or subscription for a new application, you might proactively want to set up the application so that all users in the organization can use it. To avoid the need for user consent, an administrator can grant consent for the application on behalf of all users in the organization.
5454

5555
After an administrator grants admin consent on behalf of the organization, users aren't usually prompted for consent for that application. In certain cases, a user might be prompted for consent even after consent was granted by an administrator. An example might be if an application requests another permission that the administrator hasn't already granted.
5656

57-
Granting admin consent on behalf of an organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of the organization's data, or the permission to do highly privileged operations. Examples of such operations might be role management, full access to all mailboxes or all sites, and full user impersonation.
57+
Granting admin consent on behalf of an organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of the organization's data, or the permission to do highly privileged operations. Examples of such operations might be role management, full access to all mailboxes or all sites, and full user impersonation.
5858

5959
Before you grant tenant-wide admin consent, ensure that you trust the application and the application publisher, for the level of access you're granting. If you aren't confident that you understand who controls the application and why the application is requesting the permissions, do *not* grant consent.
6060

@@ -90,4 +90,4 @@ After the admin consent workflow is enabled, users can request admin approval fo
9090
## Next steps
9191

9292
- [Configure user consent settings](configure-user-consent.md)
93-
- [Configure the admin consent workflow](configure-admin-consent-workflow.md)
93+
- [Configure the admin consent workflow](configure-admin-consent-workflow.md)

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ using Microsoft.Data.SqlClient;
111111
try
112112
{
113113
//
114-
// Open a connection to the server using Active Direcotry Managed Identity authentication.
114+
// Open a connection to the server using Active Directory Managed Identity authentication.
115115
//
116116
string connectionString = "Data Source=<AZURE-SQL-SERVERNAME>; Initial Catalog=<DATABASE>; Authentication=Active Directory Managed Identity; Encrypt=True";
117117
SqlConnection conn = new SqlConnection(connectionString);

articles/active-directory/reports-monitoring/howto-manage-inactive-user-accounts.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,24 +36,24 @@ The last successful sign-in provides potential insights into a user's continued
3636

3737
You detect inactive accounts by evaluating the **lastSignInDateTime** property exposed by the **signInActivity** resource type of the **Microsoft Graph** API. The **lastSignInDateTime** property shows the last time a user made a successful interactive sign-in to Azure AD. Using this property, you can implement a solution for the following scenarios:
3838

39-
- **Users by name**: In this scenario, you search for a specific user by name, which enables you to evaluate the lastSignInDateTime: `https://graph.microsoft.com/beta/users?$filter=startswith(displayName,'markvi')&$select=displayName,signInActivity`
39+
- **Users by name**: In this scenario, you search for a specific user by name, which enables you to evaluate the lastSignInDateTime: `https://graph.microsoft.com/v1.0/users?$filter=startswith(displayName,'markvi')&$select=displayName,signInActivity`
4040

41-
- **Users by date**: In this scenario, you request a list of users with a lastSignInDateTime before a specified date: `https://graph.microsoft.com/beta/users?filter=signInActivity/lastSignInDateTime le 2019-06-01T00:00:00Z`
41+
- **Users by date**: In this scenario, you request a list of users with a lastSignInDateTime before a specified date: `https://graph.microsoft.com/v1.0/users?$filter=signInActivity/lastSignInDateTime le 2019-06-01T00:00:00Z`
4242

4343
> [!NOTE]
4444
> There may be the need to generate a report of the last sign in date of all users, if so you can use the following scenario.
45-
> **Last Sign In Date and Time for All Users**: In this scenario, you request a list of all users, and the last lastSignInDateTime for each respective user: `https://graph.microsoft.com/beta/users?$select=displayName,signInActivity`
45+
> **Last Sign In Date and Time for All Users**: In this scenario, you request a list of all users, and the last lastSignInDateTime for each respective user: `https://graph.microsoft.com/v1.0/users?$select=displayName,signInActivity`
4646
4747
## What you need to know
4848

4949
This section lists what you need to know about the lastSignInDateTime property.
5050

5151
### How can I access this property?
5252

53-
The **lastSignInDateTime** property is exposed by the [signInActivity resource type](/graph/api/resources/signinactivity?view=graph-rest-beta&preserve-view=true) of the [Microsoft Graph API](/graph/overview#whats-in-microsoft-graph).
53+
The **lastSignInDateTime** property is exposed by the [signInActivity resource type](/graph/api/resources/signinactivity) of the [Microsoft Graph API](/graph/overview#whats-in-microsoft-graph).
5454

5555
> [!NOTE]
56-
> The signInActivity resource type is available only on the Microsoft Graph `beta` endpoint and isn't yet supported in US Government GCC High environments.
56+
> The signInActivity resource type isn't yet supported in US Government GCC High environments.
5757
5858
### Is the lastSignInDateTime property available through the Get-AzureAdUser cmdlet?
5959

@@ -65,10 +65,11 @@ To access this property, you need an Azure Active Directory Premium edition.
6565

6666
### What permission do I need to read the property?
6767

68-
To read this property, you need to grant the following rights:
68+
To read this property, you need to grant the app the following Microsoft Graph permissions:
6969

7070
- AuditLog.Read.All
7171
- Directory.Read.All
72+
- User.Read.All
7273

7374

7475
### When does Azure AD update the property?

articles/aks/aks-planned-maintenance-weekly-releases.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ author: kaarthis
99

1010
---
1111

12-
# Use Planned Maintenance window for scheduling exclusive Azure Kubernetes Service (AKS) weekly releases (Preview)
12+
# Use Planned Maintenance pre-created configurations to schedule Azure Kubernetes Service (AKS) weekly releases (preview)
1313

14-
Planned Maintenance allows you to schedule weekly maintenance windows that will ensure the weekly releases [releases] are controlled. Maintenance Windows are configured using the Azure CLI, allowing you to select from a set of pre-available configurations.
14+
Planned Maintenance allows you to schedule weekly maintenance windows that ensure the weekly [releases] are controlled. You can select from the set of pre-created configurations and use the Azure CLI to configure your maintenance windows.
1515

16-
Weekly releases can also be scheduled with more fine-grained control using Planned Maintenance's `default` configuration type. For more information, see [Planned Maintenance to schedule and control upgrades][planned-maintenance].
16+
You can also be schedule with more fine-grained control using Planned Maintenance's `default` configuration type. For more information, see [Planned Maintenance to schedule and control upgrades][planned-maintenance].
1717

1818
## Before you begin
1919

articles/aks/planned-maintenance.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ There are currently three available configuration types: `default`, `aksManagedA
2323

2424
We recommend using `aksManagedAutoUpgradeSchedule` for all cluster upgrade scenarios and `aksManagedNodeOSUpgradeSchedule` for all node image upgrade scenarios, while `default` is meant exclusively for weekly releases. You can port `default` configurations to `aksManagedAutoUpgradeSchedule` configurations via the `az aks maintenanceconfiguration update` command.
2525

26+
To configure Planned Maintenance using pre-created configurations, see [Use Planned Maintenance pre-created configurations to schedule AKS weekly releases][pm-weekly].
27+
2628
## Before you begin
2729

2830
This article assumes that you have an existing AKS cluster. If you need an AKS cluster, see the AKS quickstart [using the Azure CLI][aks-quickstart-cli], [using Azure PowerShell][aks-quickstart-powershell], or [using the Azure portal][aks-quickstart-portal].

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: greg-lindsay
77
ms.service: application-gateway
88
ms.topic: how-to
9-
ms.date: 03/01/2023
9+
ms.date: 04/04/2023
1010
ms.author: greglin
1111
#Customer intent: As an administrator, I want to evaluate Azure Private Application Gateway
1212
---
@@ -174,7 +174,7 @@ After registration into the public preview, configuration of NSG, Route Table, a
174174

175175
## Resource Changes
176176

177-
After your gateway is provisioned, isn't tag is automatically assigned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
177+
After your gateway is provisioned, a resource tag is automatically assigned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
178178

179179
![View the EnhancedNetworkControl tag](./media/application-gateway-private-deployment/tags.png)
180180

articles/cdn/cdn-custom-ssl.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ Register Azure CDN as an app in your Azure Active Directory.
121121
> * You need to have the **Global Administrator** role to run this command.
122122
> * The service principal name was changed from `Microsoft.Azure.Cdn` to `Microsoft.AzureFrontDoor-Cdn`.
123123
124-
# [Azure PowerShell](#tab/powershell)
124+
#### Azure PowerShell
125125

126126
1. If needed, install [Azure PowerShell](/powershell/azure/install-az-ps) on your local machine.
127127

@@ -134,15 +134,15 @@ Register Azure CDN as an app in your Azure Active Directory.
134134

135135
Secret :
136136
ServicePrincipalNames : {205478c0-bd83-4e1b-a9d6-db63a3e1e1c8,
137-
https://microsoft.onmicrosoft.com/033ce1c9-f832-4658-b024-ef1cbea108b8}
137+
https://microsoft.onmicrosoft.com/033ce1c9-f832-4658-b024-ef1cbea108b8}
138138
ApplicationId : 205478c0-bd83-4e1b-a9d6-db63a3e1e1c8
139139
ObjectType : ServicePrincipal
140140
DisplayName : Microsoft.AzureFrontDoor-Cdn
141141
Id : abcdef12-3456-7890-abcd-ef1234567890
142142
Type :
143143
```
144144

145-
# [Azure CLI](#tab/cli)
145+
#### Azure CLI
146146

147147
1. If needed, install [Azure CLI](/cli/azure/install-azure-cli) on your local machine.
148148

0 commit comments

Comments
 (0)