Skip to content

Commit 278af35

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pauljewell-dev-guide-python-blobs
2 parents 6930f2a + 60e0ff4 commit 278af35

File tree

445 files changed

+3350
-1926
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

445 files changed

+3350
-1926
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27981,9 +27981,14 @@
2798127981
"redirect_document_id": false
2798227982
},
2798327983
{
27984-
"source_path": "articles/load-balancer/protect-load-balancer-with-ddos-standard.md",
27985-
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer",
27986-
"redirect_document_id": false
27987-
}
27984+
"source_path": "articles/communication-services/quickstarts/voice-video-calling/get-started-android-webview.md",
27985+
"redirect_URL": "/azure/communication-services/quickstarts/voice-video-calling/get-started-webview?pivots=platform-android",
27986+
"redirect_document_id": false
27987+
},
27988+
{
27989+
"source_path": "articles/load-balancer/protect-load-balancer-with-ddos-standard.md",
27990+
"redirect_URL": "/azure/load-balancer/tutorial-protect-load-balancer",
27991+
"redirect_document_id": false
27992+
}
2798827993
]
2798927994
}

articles/active-directory-b2c/partner-gallery.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4545
|:-------------------------|:--------------|
4646
| ![Screenshot of a asignio logo](./media/partner-gallery/asignio-logo.png) | [Asignio](./partner-asignio.md) is a passwordless, soft biometric, and MFA solution. Asignio uses a combination of the patented Asignio Signature and live facial verification for user authentication. The changeable biometric signature eliminates passwords, fraud, phishing, and credential reuse through omni-channel authentication. |
4747
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
48+
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
4849
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4950
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |
5051
| ![Screenshot of a idemia logo](./media/partner-gallery/idemia-logo.png) | [IDEMIA](./partner-idemia.md) is a passwordless authentication provider, which provides real-time consent-based services with biometric authentication like faceID and fingerprinting eliminating fraud and credential reuse. |
@@ -111,7 +112,7 @@ Microsoft partners with the following ISVs for tools that can help with implemen
111112
| ISV partner | Description and integration walkthroughs |
112113
|:-------------------------|:--------------|
113114
| ![Screenshot of a grit ief editor logo.](./media/partner-gallery/grit-logo.png) | [Grit Visual Identity Experience Framework Editor](./partner-grit-editor.md) provides a low code/no code experience for developers to create sophisticated authentication user journeys. The tool comes with integrated debugger and templates for the most used scenarios.|
114-
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
115+
115116

116117
## Additional information
117118

articles/active-directory-b2c/userjourneys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 08/31/2021
11+
ms.date: 01/27/2023
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -232,7 +232,7 @@ Preconditions can check multiple preconditions. The following example checks whe
232232

233233
## Claims provider selection
234234

235-
Identity provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
235+
Claims provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
236236

237237
1. **Buttons** - It starts with type of `ClaimsProviderSelection`, or `CombinedSignInAndSignUp` that contains a list of options a user can choose from. The order of the options inside the `ClaimsProviderSelections` element controls the order of the buttons presented to the user.
238238
2. **Actions** - Followed by type of `ClaimsExchange`. The ClaimsExchange contains list of actions. The action is a reference to a technical profile, such as [OAuth2](oauth2-technical-profile.md), [OpenID Connect](openid-connect-technical-profile.md), [claims transformation](claims-transformation-technical-profile.md), or [self-asserted](self-asserted-technical-profile.md). When a user clicks on one of the buttons, the corresponding action is executed.

articles/active-directory/cloud-sync/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,8 @@
7272
href: how-to-gmsa-cmdlets.md
7373
- name: How to map usertype with cloud sync
7474
href: how-to-map-usertype.md
75+
- name: Azure AD cloud sync insights workbook
76+
href: how-to-cloud-sync-workbook.md
7577
- name: Develop
7678
items:
7779
- name: Transformations

articles/active-directory/cloud-sync/custom-attribute-mapping.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ For additional information on directory extensions see [Using directory extensio
3030
3131
## Syncing directory extensions for Azure Active Directory Connect cloud sync
3232

33-
You can use [directory extensions](https://learn.microsoft.com/graph/api/resources/extensionproperty?view=graph-rest-1.0) to extend the synchronization schema directory definition in Azure Active Directory (Azure AD) with your own attributes.
33+
You can use [directory extensions](/graph/api/resources/extensionproperty?view=graph-rest-1.0&preserve-view=true) to extend the synchronization schema directory definition in Azure Active Directory (Azure AD) with your own attributes.
3434

3535
>[!Important]
3636
> Directory extension for Azure Active Directory Connect cloud sync is only supported for applications with the identifier URI “api://<tenantId>/CloudSyncCustomExtensionsApp” and the [Tenant Schema Extension App](../hybrid/how-to-connect-sync-feature-directory-extensions.md#configuration-changes-in-azure-ad-made-by-the-wizard) created by Azure AD Connect
3737
3838
### Create application and service principal for directory extension
3939

40-
You need to create an [application](https://learn.microsoft.com/graph/api/resources/application?view=graph-rest-1.0) with the identifier URI "api://<tenantId>/CloudSyncCustomExtensionsApp" if it doesn't exist and create a service principal for the application if it doesn't exist.
40+
You need to create an [application](/graph/api/resources/application?view=graph-rest-1.0&preserve-view=true) with the identifier URI "api://<tenantId>/CloudSyncCustomExtensionsApp" if it doesn't exist and create a service principal for the application if it doesn't exist.
4141

4242

4343
1. Check if application with the identifier URI "api://<tenantId>/CloudSyncCustomExtensionsApp" exists.
@@ -48,15 +48,15 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
4848
GET /applications?$filter=identifierUris/any(uri:uri eq 'api://<tenantId>/CloudSyncCustomExtensionsApp')
4949
```
5050
51-
For more information, see [Get application](https://learn.microsoft.com/graph/api/application-get?view=graph-rest-1.0&tabs=http)
51+
For more information, see [Get application](/graph/api/application-get?view=graph-rest-1.0&tabs=http&preserve-view=true)
5252
5353
- Using PowerShell
5454
5555
```
5656
Get-AzureADApplication -Filter "identifierUris/any(uri:uri eq 'api://<tenantId>/CloudSyncCustomExtensionsApp')"
5757
```
5858
59-
For more information, see [Get-AzureADApplication](https://learn.microsoft.com/powershell/module/azuread/get-azureadapplication?view=azureadps-2.0)
59+
For more information, see [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication?view=azureadps-2.0&preserve-view=true)
6060
6161
2. If the application doesn't exist, create the application with identifier URI “api://&LT;tenantId&GT;/CloudSyncCustomExtensionsApp.”
6262
@@ -70,13 +70,13 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
7070
"identifierUris": ["api://<tenant id>/CloudSyncCustomExtensionsApp"]
7171
}
7272
```
73-
For more information, see [create application](https://learn.microsoft.com/graph/api/application-post-applications?view=graph-rest-1.0&tabs=http)
73+
For more information, see [create application](/graph/api/application-post-applications?view=graph-rest-1.0&tabs=http&preserve-view=true)
7474
7575
- Using PowerShell
7676
```
7777
New-AzureADApplication -DisplayName "CloudSyncCustomExtensionsApp" -IdentifierUris "api://<tenant id>/CloudSyncCustomExtensionsApp"
7878
```
79-
For more information, see [New-AzureADApplication](https://learn.microsoft.com/powershell/module/azuread/new-azureadapplication?view=azureadps-2.0)
79+
For more information, see [New-AzureADApplication](/powershell/module/azuread/new-azureadapplication?view=azureadps-2.0&preserve-view=true)
8080
8181
8282
@@ -86,13 +86,13 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
8686
```
8787
GET /servicePrincipals?$filter=(appId eq '{appId}')
8888
```
89-
For more information, see [get service principal](https://learn.microsoft.com/graph/api/serviceprincipal-get?view=graph-rest-1.0&tabs=http)
89+
For more information, see [get service principal](/graph/api/serviceprincipal-get?view=graph-rest-1.0&tabs=http&preserve-view=true)
9090
9191
- Using PowerShell
9292
```
9393
Get-AzureADServicePrincipal -ObjectId '<application objectid>'
9494
```
95-
For more information, see [Get-AzureADServicePrincipal](https://learn.microsoft.com/powershell/module/azuread/get-azureadserviceprincipal?view=azureadps-2.0)
95+
For more information, see [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal?view=azureadps-2.0&preserve-view=true&preserve-view=true)
9696
9797
9898
4. If a service principal doesn't exist, create a new service principal for the application with identifier URI “api://&LT;tenantId&GT;/CloudSyncCustomExtensionsApp”
@@ -107,31 +107,31 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
107107
"<application appId>"
108108
}
109109
```
110-
For more information, see [create servicePrincipal](https://learn.microsoft.com/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http)
110+
For more information, see [create servicePrincipal](/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http&preserve-view=true)
111111
112112
- Using PowerShell
113113
114114
```
115115
New-AzureADServicePrincipal -AppId '<appId>'
116116
```
117-
For more information, see [New-AzureADServicePrincipal](https://learn.microsoft.com/powershell/module/azuread/new-azureadserviceprincipal?view=azureadps-2.0)
117+
For more information, see [New-AzureADServicePrincipal](/powershell/module/azuread/new-azureadserviceprincipal?view=azureadps-2.0&preserve-view=true)
118118
119119
5. You can create directory extensions in Azure AD in several different ways.
120120
121121
|Method|Description|URL|
122122
|-----|-----|-----|
123-
|MS Graph|Create extensions using GRAPH|[Create extensionProperty](https://learn.microsoft.com/graph/api/application-post-extensionproperty?view=graph-rest-1.0&tabs=http)|
124-
|PowerShell|Create extensions using PowerShell|[New-AzureADApplicationExtensionProperty](https://learn.microsoft.com/powershell/module/azuread/new-azureadapplicationextensionproperty?view=azureadps-2.0)|
125-
Using Cloud Sync and Azure AD Connect|Create extensions using Azure AD Connect|[Create an extension attribute using Azure AD Connect](https://learn.microsoft.com/azure/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping#create-an-extension-attribute-using-azure-ad-connect)|
126-
|Customizing attributes to sync|Information on customizing which attributes to synch|[Customize which attributes to synchronize with Azure AD](https://learn.microsoft.com/azure/active-directory/hybrid/how-to-connect-sync-feature-directory-extensions#customize-which-attributes-to-synchronize-with-azure-ad)
123+
|MS Graph|Create extensions using GRAPH|[Create extensionProperty](/graph/api/application-post-extensionproperty?view=graph-rest-1.0&tabs=http&preserve-view=true)|
124+
|PowerShell|Create extensions using PowerShell|[New-AzureADApplicationExtensionProperty](/powershell/module/azuread/new-azureadapplicationextensionproperty?view=azureadps-2.0&preserve-view=true)|
125+
Using Cloud Sync and Azure AD Connect|Create extensions using Azure AD Connect|[Create an extension attribute using Azure AD Connect](../app-provisioning/user-provisioning-sync-attributes-for-mapping.md#create-an-extension-attribute-using-azure-ad-connect)|
126+
|Customizing attributes to sync|Information on customizing which attributes to synch|[Customize which attributes to synchronize with Azure AD](../hybrid/how-to-connect-sync-feature-directory-extensions.md#customize-which-attributes-to-synchronize-with-azure-ad)
127127
128128
## Use attribute mapping to map Directory Extensions
129129
If you have extended Active Directory to include custom attributes, you can add these attributes and map them to users.
130130
131131
To discover and map attributes, click **Add attribute mapping**. The attributes will automatically be discovered and will be available in the drop-down under **source attribute**. Fill in the type of mapping you want and click **Apply**.
132132
[![Custom attribute mapping](media/custom-attribute-mapping/schema-1.png)](media/custom-attribute-mapping/schema-1.png#lightbox)
133133
134-
For information on new attributes that are added and updated in Azure AD see the [user resource type](https://docs.microsoft.com/graph/api/resources/user?view=graph-rest-1.0#properties) and consider subscribing to [change notifications](https://docs.microsoft.com/graph/webhooks).
134+
For information on new attributes that are added and updated in Azure AD see the [user resource type](/graph/api/resources/user?view=graph-rest-1.0#properties&preserve-view=true) and consider subscribing to [change notifications](/graph/webhooks).
135135
136136
For more information on extension attributes, see [Syncing extension attributes for Azure Active Directory Application Provisioning](../app-provisioning/user-provisioning-sync-attributes-for-mapping.md)
137137
Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,95 @@
1+
---
2+
title: 'Azure AD cloud sync insights workbook'
3+
description: This article describes the Azure Monitor workbook for cloud sync.
4+
services: active-directory
5+
author: billmath
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.topic: conceptual
9+
ms.workload: identity
10+
ms.date: 01/26/2023
11+
ms.subservice: hybrid
12+
ms.author: billmath
13+
ms.collection: M365-identity-device-management
14+
---
15+
16+
17+
18+
# Azure AD cloud sync insights workbook
19+
The Cloud sync workbook provides a flexible canvas for data analysis. The workbook allows you to create rich visual reports within the Azure portal. To learn more, see Azure Monitor Workbooks overview.
20+
21+
This workbook is intended for Hybrid Identity Admins who use cloud sync to sync users from AD to Azure AD. It allows admins to gain insights into sync status and details.
22+
23+
The workbook can be accessed by select **Insights** on the left hand side of the cloud sync page.
24+
25+
26+
:::image type="content" source="media/how-to-cloud-sync-workbook/workbook-1.png" alt-text="Screenshot of the cloud sync workbook." lightbox="media/how-to-cloud-sync-workbook/workbook-1.png":::
27+
28+
>[!NOTE]
29+
>The Insights node is available at both the all configurations level and the individual configuration level. To view information on individual configurations select the Job Id for the configuration.
30+
31+
This workbook:
32+
33+
- Provides a synchronization summary of users and groups synchronized from AD to Azure AD
34+
- Provides a detailed view of information captured by the cloud sync provisioning logs.
35+
- Allows you to customize the data to tailor it to your specific needs
36+
37+
38+
39+
|Field|Description|
40+
|-----|-----|
41+
|Date|The range that you want to view data on.|
42+
|Status|View the provisioning status such as Success or Skipped.|
43+
|Action|View the provisioning actions taken such as Create or Delete.|
44+
|Job Id|Allows you to target specific Job Ids. This can be used to see individual configuration data if you have multiple configurations.|
45+
|SyncType|Filter by type of synchronization such as object or password.|
46+
47+
48+
## Enabling provisioning logs
49+
50+
You should already be familiar with Azure monitoring and Log Analytics. If not, jump over to learn about them and then come back to learn about application provisioning logs. To learn more about Azure monitoring, see [Azure Monitor overview](../../azure-monitor/overview.md). To learn more about Azure Monitor logs and Log Analytics, see [Overview of log queries in Azure Monitor](../../azure-monitor/logs/log-query-overview.md) and [Provisioning Logs for troubleshooting cloud sync](how-to-troubleshoot.md).
51+
52+
## Sync summary
53+
The sync summary section provides a summary of your organizations synchronization activities. These activities include:
54+
- Sync actions per day by action
55+
- Sync actions per day by status
56+
- Unique sync count by status
57+
- Recent sync errors
58+
59+
60+
61+
:::image type="content" source="media/how-to-cloud-sync-workbook/workbook-2.png" alt-text="Screenshot of the cloud sync summary." lightbox="media/how-to-cloud-sync-workbook/workbook-2.png":::
62+
63+
64+
## Sync details
65+
The sync details tab allows you to drill into the synchronization data and get more information. This information includes:
66+
- Objects sync by status
67+
- Sync log details
68+
69+
:::image type="content" source="media/how-to-cloud-sync-workbook/workbook-3.png" alt-text="Screenshot of the cloud sync details." lightbox="media/how-to-cloud-sync-workbook/workbook-3.png":::
70+
71+
You can further drill in to the sync log details for additional information.
72+
73+
:::image type="content" source="media/how-to-cloud-sync-workbook/workbook-4.png" alt-text="Screenshot of the log details." lightbox="media/how-to-cloud-sync-workbook/workbook-4.png":::
74+
75+
## Job Id
76+
A Job Id will be created for each configuration when it runs and is populated with data. You can look at individual configuration based on Job Id.
77+
78+
79+
80+
## Custom queries
81+
82+
You can create custom queries and show the data on Azure dashboards. To learn how, see [Create and share dashboards of Log Analytics data](../../azure-monitor/logs/get-started-queries.md). Also, be sure to check out [Overview of log queries in Azure Monitor](../../azure-monitor/logs/log-query-overview.md).
83+
84+
## Custom alerts
85+
86+
Azure Monitor lets you configure custom alerts so that you can get notified about key events related to Provisioning. For example, you might want to receive an alert on spikes in failures. Or perhaps spikes in disables or deletes. Another example of where you might want to be alerted is a lack of any provisioning, which indicates something is wrong.
87+
88+
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-log.md).
89+
90+
## Next steps
91+
92+
- [What is provisioning?](what-is-provisioning.md)
93+
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)
94+
- [Known limitations](how-to-prerequisites.md#known-limitations)
95+
- [Error codes](reference-error-codes.md)
56.4 KB
Loading
44 KB
Loading
76 KB
Loading
62.8 KB
Loading

0 commit comments

Comments
 (0)