Skip to content

Commit 26218b1

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ga-sentinel
2 parents e56a6b1 + f5c4a46 commit 26218b1

File tree

392 files changed

+5156
-3224
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

392 files changed

+5156
-3224
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5330,6 +5330,11 @@
53305330
"redirect_url": "/azure/azure-functions/functions-create-vnet",
53315331
"redirect_document_id": false
53325332
},
5333+
{
5334+
"source_path": "articles/azure-functions/tutorial-vs-code-serverless-python.md",
5335+
"redirect_url": "/azure/python/tutorial-vs-code-serverless-python-01",
5336+
"redirect_document_id": false
5337+
},
53335338
{
53345339
"source_path": "articles/automation/automation-source-control-integration.md",
53355340
"redirect_url": "/azure/automation/source-control-integration",
@@ -26204,11 +26209,6 @@
2620426209
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#custom-alert-rules-preview",
2620526210
"redirect_document_id": false
2620626211
},
26207-
{
26208-
"source_path": "articles/security-center/security-center-threat-intel.md",
26209-
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#menu_securityeventsmap",
26210-
"redirect_document_id": false
26211-
},
2621226212
{
2621326213
"source_path": "articles/virtual-network/virtual-network-deploy-multinic-arm-cli.md",
2621426214
"redirect_url": "/azure/virtual-machines/linux/multiple-nics",

articles/active-directory/authentication/concept-password-ban-bad-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
# Enforce Azure AD password protection for Windows Server Active Directory
1919

20-
Azure AD password protection is a feature that enhances password policies in an organization. On-premises deployment of password protection uses both the global and custom banned-password lists that are stored in Azure AD. It does the same checks on-premises as Azure AD for cloud-based changes.
20+
Azure AD password protection is a feature that enhances password policies in an organization. On-premises deployment of password protection uses both the global and custom banned-password lists that are stored in Azure AD. It does the same checks on-premises as Azure AD does for cloud-based changes. These checks are performed during password changes and password reset scenarios.
2121

2222
## Design principles
2323

articles/active-directory/conditional-access/howto-conditional-access-policy-block-legacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Due to the increased risk associated with legacy authentication protocols, Micro
2121

2222
## Create a Conditional Access policy
2323

24-
The following steps will help create a Conditional Access policy to require those assigned administrative roles to perform multi-factor authentication.
24+
The following steps will help create a Conditional Access policy to block legacy authentication requests.
2525

2626
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
2727
1. Browse to **Azure Active Directory** > **Conditional Access**.

articles/active-directory/develop/howto-app-gallery-listing.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ To list an application in the Azure AD app gallery, you first need to implement
7777
![TimeLine of listing OpenID Connect application into the gallery](./media/howto-app-gallery-listing/openid.png)
7878

7979
* If you want to add your application to list in the gallery using OpenID Connect, select **OpenID Connect & OAuth 2.0** as above.
80-
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
80+
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
8181

8282
- **SAML 2.0** or **WS-Fed**: If your app supports SAML 2.0, you can integrate it directly with an Azure AD tenant by using the [instructions to add a custom application](../active-directory-saas-custom-apps.md).
8383

@@ -95,6 +95,12 @@ Create a web application that has an HTML sign-in page to configure [password-ba
9595
* If you want to add your application to list in the gallery using Password SSO, select **Password SSO** as above.
9696
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
9797

98+
## Requesting for User Provisioning
99+
100+
Follow the below process to request for user provisioning-
101+
102+
![TimeLine of listing saml application into the gallery](./media/howto-app-gallery-listing/user-provisioning.png)
103+
98104
## Update/Remove existing listing
99105

100106
To update or remove an existing application in the Azure AD app gallery, you first need to submit the request in the [Application Network Portal](https://microsoft.sharepoint.com/teams/apponboarding/Apps). If you have an Office 365 account, use that to sign in to this portal. If not, use your Microsoft account (such as Outlook or Hotmail) to sign in.
@@ -103,9 +109,9 @@ To update or remove an existing application in the Azure AD app gallery, you fir
103109

104110
![TimeLine of listing saml application into the gallery](./media/howto-app-gallery-listing/updateorremove.png)
105111

106-
* If you want to update an existing application, select **Update existing application listing**.
107-
* If you want to remove an existing application from the Azure AD gallery, select **Remove existing application listing**.
108-
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
112+
* If you want to update an existing application, select appropriate option as per your requirement.
113+
* If you want to remove an existing application from the Azure AD gallery, select **Remove my application listing from the gallery**.
114+
* If you have any issues regarding access, contact the [Azure AD SSO Integration Team](<mailto:[email protected]>).
109115

110116
## Listing requests by customers
111117

@@ -121,11 +127,11 @@ Below is the flow of customer requested applications-
121127

122128
The timeline for the process of listing a SAML 2.0 or WS-Fed application in the gallery is 7-10 business days.
123129

124-
![TimeLine of listing SAML application into the gallery](./media/howto-app-gallery-listing/timeline.png)
130+
![TimeLine of listing SAML application into the gallery](./media/howto-app-gallery-listing/timeline.png)
125131

126132
The timeline for the process of listing an OpenID Connect application in the gallery is 2-5 business days.
127133

128-
![TimeLine of listing SAML application into the gallery](./media/howto-app-gallery-listing/timeline2.png)
134+
![TimeLine of listing SAML application into the gallery](./media/howto-app-gallery-listing/timeline2.png)
129135

130136
## Escalations
131137

-2.32 KB
Loading
3.96 KB
Loading
2.81 KB
Loading
3.9 KB
Loading
4.78 KB
Loading
39.5 KB
Loading

0 commit comments

Comments
 (0)