Skip to content

Commit 296c2ad

Browse files
authored
Merge pull request #244599 from MicrosoftDocs/main
7/11 OOB Publishing at 8AM
2 parents 6addc33 + b72044d commit 296c2ad

File tree

40 files changed

+286
-87
lines changed

40 files changed

+286
-87
lines changed
37.7 KB
Loading
18.5 KB
Loading
Lines changed: 181 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,181 @@
1+
---
2+
title: New name for Azure Active Directory
3+
description: Learn how we're unifying the Microsoft Entra product family and how we're renaming Azure Active Directory (Azure AD) to Microsoft Entra ID.
4+
services: active-directory
5+
author: CelesteDG
6+
manager: CelesteDG
7+
ms.service: active-directory
8+
ms.subservice: fundamentals
9+
ms.topic: overview
10+
ms.date: 07/11/2023
11+
ms.author: celested
12+
ms.reviewer: nicholepet
13+
14+
# Customer intent: As a new or existing customer, I want to learn more about the new name for Azure Active Directory (Azure AD) and understand the impact the name change may have on other products, new or existing license(s), what I need to do, and where I can learn more about Microsoft Entra products.
15+
---
16+
17+
# New name for Azure Active Directory
18+
19+
To unify the [Microsoft Entra](/entra) product family, reflect the progression to modern multicloud identity security, and simplify secure access experiences for all, we're renaming Azure Active Directory (Azure AD) to Microsoft Entra ID.
20+
21+
## No action is required from you
22+
23+
If you're using Azure AD today or are currently deploying Azure AD in your organizations, you can continue to use the service without interruption. All existing deployments, configurations, and integrations will continue to function as they do today without any action from you.
24+
25+
You can continue to use familiar Azure AD capabilities that you can access through the Azure portal, Microsoft 365 admin center, and the [Microsoft Entra admin center](https://entra.microsoft.com).
26+
27+
## Only the name is changing
28+
29+
All features and capabilities are still available in the product. Licensing, terms, service-level agreements, product certifications, support and pricing remain the same.
30+
31+
Service plan display names will change on October 1, 2023. Microsoft Entra ID Free, Microsoft Entra ID P1, and Microsoft Entra ID P2 will be the new names of standalone offers, and all capabilities included in the current Azure AD plans remain the same. Microsoft Entra ID – currently known as Azure AD – will continue to be included in Microsoft 365 licensing plans, including Microsoft 365 E3 and Microsoft 365 E5. Details on pricing and what’s included are available on the [pricing and free trials page](https://aka.ms/PricingEntra).
32+
33+
:::image type="content" source="./media/new-name/azure-ad-new-name.png" alt-text="Diagram showing the new name for Azure AD and Azure AD External Identities." border="false" lightbox="./media/new-name/azure-ad-new-name-high-res.png":::
34+
35+
During 2023, you may see both the current Azure AD name and the new Microsoft Entra ID name in support area paths. For self-service support, look for the topic path of "Microsoft Entra" or "Azure Active Directory/Microsoft Entra ID."
36+
37+
## Identity developer and devops experiences aren't impacted by the rename
38+
39+
To make the transition seamless, all existing login URLs, APIs, PowerShell cmdlets, and Microsoft Authentication Libraries (MSAL) stay the same, as do developer experiences and tooling.
40+
41+
Microsoft identity platform encompasses all our identity and access developer assets. It will continue to provide the resources to help you build applications that your users and customers can sign in to using their Microsoft identities or social accounts.
42+
43+
Naming is also not changing for:
44+
45+
- [Microsoft Authentication Library (MSAL)](../develop/msal-overview.md) - Use to acquire security tokens from the Microsoft identity platform to authenticate users and access secured web APIs to provide secure access to Microsoft Graph, other Microsoft APIs, third-party web APIs, or your own web API.
46+
- [Microsoft Graph](/graph) - Get programmatic access to organizations, user, and application data stored in Microsoft Entra ID.
47+
- [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) - Acts as an API wrapper for the Microsoft Graph APIs and helps administer every Microsoft Entra ID feature that has an API in Microsoft Graph.
48+
- [Windows Server Active Directory](/troubleshoot/windows-server/identity/active-directory-overview), commonly known as "Active Directory," and all related Windows Server identity services associated with Active Directory.
49+
- [Active Directory Federation Services (AD FS)](/windows-server/identity/active-directory-federation-services) nor [Active Directory Domain Services (AD DS)](/windows-server/identity/ad-ds/active-directory-domain-services) nor the product name "Active Directory" or any corresponding features.
50+
- [Azure Active Directory B2C](../../active-directory-b2c/index.yml) will continue to be available as an Azure service.
51+
- [Any deprecated or retired functionality, feature, or service](what-is-deprecated.md) of Azure AD.
52+
53+
## Frequently asked questions
54+
55+
### When is the name change happening?
56+
57+
The name change will start appearing across Microsoft experiences after a 30-day notification period, which started July 11, 2023. Display names for SKUs and service plans will change on October 1, 2023. We expect most naming text string changes in Microsoft experiences to be completed by the end of 2023.
58+
59+
### Why is the name being changed?
60+
61+
As part of our ongoing commitment to simplify secure access experiences for everyone, the renaming of Azure AD to Microsoft Entra ID is designed to make it easier to use and navigate the unified and expanded Microsoft Entra product family.
62+
63+
### What is Microsoft Entra?
64+
65+
Microsoft Entra helps you protect all identities and secure network access everywhere. The expanded product family includes:
66+
67+
| Identity and access management | New identity categories | Network access |
68+
|---------|---------|---------|
69+
| [Microsoft Entra ID (currently known as Azure AD)](../index.yml) | [Microsoft Entra Verified ID](../verifiable-credentials/index.yml) | [Microsoft Entra Internet Access](https://aka.ms/GlobalSecureAccessDocs) |
70+
| [Microsoft Entra ID Governance](../governance/index.yml) | [Microsoft Entra Permissions Management](../cloud-infrastructure-entitlement-management/index.yml) | [Microsoft Entra Private Access](https://aka.ms/GlobalSecureAccessDocs) |
71+
| [Microsoft Entra External ID](../external-identities/index.yml) | [Microsoft Entra Workload ID](../workload-identities/index.yml) | |
72+
73+
### Where can I manage Microsoft Entra ID?
74+
75+
You can manage Microsoft Entra ID and all other Microsoft Entra solutions in the [Microsoft Entra admin center](https://entra.microsoft.com) or [Azure portal](https://portal.azure.com).
76+
77+
### What are the display names for service plans and SKUs?
78+
79+
Licensing, pricing, and functionality aren't changing. Display names will be updated October 1, 2023 as follows.
80+
81+
| **Old display name for service plan** | **New display name for service plan** |
82+
|---------|---------|
83+
| Azure Active Directory Free | Microsoft Entra ID Free |
84+
| Azure Active Directory Premium P1 | Microsoft Entra ID P1 |
85+
| Azure Active Directory Premium P2 | Microsoft Entra ID P2 |
86+
| Azure Active Directory for education | Microsoft Entra ID for education |
87+
| **Old display name for product SKU** | **New display name for product SKU** |
88+
| Azure Active Directory Premium P1 | Microsoft Entra ID P1 |
89+
| Azure Active Directory Premium P1 for students | Microsoft Entra ID P1 for students |
90+
| Azure Active Directory Premium P1 for faculty | Microsoft Entra ID P1 for faculty |
91+
| Azure Active Directory Premium P1 for government | Microsoft Entra ID P1 for government |
92+
| Azure Active Directory Premium P2 | Microsoft Entra ID P2 |
93+
| Azure Active Directory Premium P2 for students | Microsoft Entra ID P2 for students |
94+
| Azure Active Directory Premium P2 for faculty | Microsoft Entra ID P2 for faculty |
95+
| Azure Active Directory Premium P2 for government | Microsoft Entra ID P2 for government |
96+
| Azure Active Directory F2 | Microsoft Entra ID F2 |
97+
98+
### Is Azure AD going away?
99+
100+
No, only the name Azure AD is going away. Capabilities remain the same.
101+
102+
### What will happen to the Azure AD capabilities and features like App Gallery or Conditional Access?
103+
104+
The naming of features changes to Microsoft Entra. For example:
105+
106+
- Azure AD tenant -> Microsoft Entra tenant
107+
- Azure AD account -> Microsoft Entra account
108+
- Azure AD joined -> Microsoft Entra joined
109+
- Azure AD Conditional Access -> Microsoft Entra Conditional Access
110+
111+
All features and capabilities remain unchanged aside from the name. Customers can continue to use all features without any interruption.
112+
113+
### Are licenses changing? Are there any changes to pricing?
114+
115+
No. Prices, terms and service level agreements (SLAs) remain the same. Pricing details are available at <https://www.microsoft.com/security/business/microsoft-entra-pricing>.
116+
117+
### Will Microsoft Entra ID be available as a free service with an Azure subscription?
118+
119+
Customers currently using Azure AD Free as part of their Azure, Microsoft 365, Dynamics 365, Teams, or Intune subscription will continue to have access to the same capabilities. It will be called Microsoft Entra ID Free. Get the free version at <https://www.microsoft.com/security/business/microsoft-entra-pricing>.
120+
121+
### What's changing for Microsoft 365 or Azure AD for Office 365?
122+
123+
Microsoft Entra ID – currently known as Azure AD – will continue to be available within Microsoft 365 enterprise and business premium offers. Office 365 was renamed Microsoft 365 in 2022. Unique capabilities in the Azure AD for Office 365 apps (such as company branding and self-service sign-in activity search) will now be available to all Microsoft customers in Microsoft Entra ID Free.
124+
125+
### What's changing for Microsoft 365 E3?
126+
127+
There are no changes to the identity features and functionality available in Microsoft 365 E3. Microsoft 365 E3 includes Microsoft Entra ID P1, currently known as Azure AD Premium P1.
128+
129+
### What's changing for Microsoft 365 E5?
130+
131+
In addition to the capabilities they already have, Microsoft 365 E5 customers will also get access to new identity protection capabilities like token protection, Conditional Access based on GPS-based location and step-up authentication for the most sensitive actions. Microsoft 365 E5 includes Microsoft Entra P2, currently known as Azure AD Premium P2.
132+
133+
### How and when are customers being notified?
134+
135+
The name changes are publicly announced as of July 11, 2023.
136+
137+
Banners, alerts, and message center posts will notify users of the name change. These will be displayed on the tenant overview page, portals including Azure, Microsoft 365, and Microsoft Entra admin center, and Microsoft Learn.
138+
139+
### What if I use the Azure AD name in my content or app?
140+
141+
We'd like your help spreading the word about the name change and implementing it in your own experiences. If you're a content creator, author of internal documentation for IT or identity security admins, developer of Azure AD–enabled apps, independent software vendor, or Microsoft partner, we hope you use the naming guidance outlined in the following section ([Azure AD name changes and exceptions](#azure-ad-name-changes-and-exceptions)) to make the name change in your content and product experiences by the end of 2023.
142+
143+
## Azure AD name changes and exceptions
144+
145+
We encourage content creators, organizations with internal documentation for IT or identity security admins, developers of Azure AD-enabled apps, independent software vendors, or partners of Microsoft to stay current with the new naming guidance by updating copy by the end of 2023. We recommend changing the name in customer-facing experiences, prioritizing highly visible surfaces.
146+
147+
### Product name
148+
149+
Replace the product name "Azure Active Directory" or "Azure AD" or "AAD" with Microsoft Entra ID.
150+
151+
*Microsoft Entra* is the correct name for the family of identity and network access solutions, one of which is *Microsoft Entra ID.*
152+
153+
### Logo/icon
154+
155+
Azure AD is becoming Microsoft Entra ID, and the product icon is also being updated. Work with your Microsoft partner organization to obtain the new product icon.
156+
157+
### Feature names
158+
159+
Capabilities or services formerly known as "Azure Active Directory &lt;feature name&gt;" or "Azure AD &lt;feature name&gt;" will be branded as Microsoft Entra product family features. For example:
160+
161+
- "Azure AD Conditional Access" is becoming "Microsoft Entra Conditional Access"
162+
- "Azure AD single sign-on" is becoming "Microsoft Entra single sign-on"
163+
- "Azure AD tenant" is becoming "Microsoft Entra tenant"
164+
165+
### Exceptions to Azure AD name change
166+
167+
Products or features that are being deprecated aren't being renamed. These products or features include:
168+
169+
- Azure AD Authentication Library (ADAL), replaced by [Microsoft Authentication Library (MSAL)](../develop/msal-overview.md)
170+
- Azure AD Graph, replaced by [Microsoft Graph](/graph)
171+
- Azure Active Directory PowerShell for Graph (Azure AD PowerShell), replaced by [Microsoft Graph PowerShell](/powershell/microsoftgraph)
172+
173+
Names that don't have "Azure AD" also aren't changing. These products or features include Active Directory Federation Services (AD FS), Microsoft identity platform, and Windows Server Active Directory Domain Services (AD DS).
174+
175+
End users shouldn't be exposed to the Azure AD or Microsoft Entra ID name. For sign-ins and account user experiences, follow guidance for work and school accounts in [Sign in with Microsoft branding guidelines](../develop/howto-add-branding-in-apps.md).
176+
177+
## Next steps
178+
179+
- [Stay up-to-date with what's new in Azure AD/Microsoft Entra ID](whats-new.md)
180+
- [Get started using Microsoft Entra ID at the Microsoft Entra admin center](https://entra.microsoft.com/)
181+
- [Learn more about Microsoft Entra with content from Microsoft Learn](/entra)

articles/active-directory/fundamentals/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ items:
66
items:
77
- name: What is Azure Active Directory?
88
href: active-directory-whatis.md
9+
- name: New name for Azure AD
10+
href: new-name.md
911
- name: Identity fundamentals
1012
href: identity-fundamental-concepts.md
1113
- name: Introduction to identity and access management (IAM)

articles/azure-monitor/alerts/alerts-processing-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ You can also define filters to narrow down which specific subset of alerts are a
5959

6060
| Filter | Description|
6161
|:---|:---|
62-
Alert context (payload) | The rule applies only to alerts that contain any of the filter's strings within the [alert context](./alerts-common-schema.md) section of the alert. This section includes fields specific to each alert type. This filter does not apply to log alert search results. |
62+
Alert context (payload) | The rule applies only to alerts that contain any of the filter's strings within the [alert context](./alerts-common-schema.md) section of the alert. This section includes fields specific to each alert type. |
6363
Alert rule ID | The rule applies only to alerts from a specific alert rule. The value should be the full resource ID, for example, `/subscriptions/SUB1/resourceGroups/RG1/providers/microsoft.insights/metricalerts/MY-API-LATENCY`. To locate the alert rule ID, open a specific alert rule in the portal, select **Properties**, and copy the **Resource ID** value. You can also locate it by listing your alert rules from PowerShell or the Azure CLI. |
6464
Alert rule name | The rule applies only to alerts with this alert rule name. It can also be useful with a **Contains** operator. |
6565
Description | The rule applies only to alerts that contain the specified string within the alert rule description field. |

articles/azure-monitor/logs/basic-logs-query.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,6 @@ For more information, see [Set a table's log data plan](basic-logs-configure.md)
1818
> [!NOTE]
1919
> Other tools that use the Azure API for querying - for example, Grafana and Power BI - cannot access Basic Logs.
2020
21-
> [!NOTE]
22-
> Billing of queries on Basic Logs is not yet enabled. You can query Basic Logs for free until early 2023.
23-
2421
[!INCLUDE [log-analytics-query-permissions](../../../includes/log-analytics-query-permissions.md)]
2522

2623
## Limitations

articles/azure-monitor/logs/ingest-logs-event-hub.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Ingest events from Azure Event Hubs into Azure Monitor Logs
2+
title: Ingest events from Azure Event Hubs into Azure Monitor Logs (Preview)
33
description: Ingest logs from Event Hubs into Azure Monitor Logs
44
services: azure-monitor
55
author: guywi-ms
@@ -13,7 +13,7 @@ ms.custom: references_regions
1313
---
1414

1515

16-
# Tutorial: Ingest events from Azure Event Hubs into Azure Monitor Logs
16+
# Tutorial: Ingest events from Azure Event Hubs into Azure Monitor Logs (Preview)
1717

1818
[Azure Event Hubs](../../event-hubs/event-hubs-about.md) is a big data streaming platform that collects events from multiple sources to be ingested by Azure and external services. This article explains how to ingest data directly from an event hub into a Log Analytics workspace.
1919

@@ -456,4 +456,4 @@ Learn more about to:
456456

457457
- [Create a custom table](../logs/create-custom-table.md#create-a-custom-table).
458458
- [Create a data collection endpoint](../essentials/data-collection-endpoint-overview.md#create-a-data-collection-endpoint).
459-
- [Update an existing data collection rule](../essentials/data-collection-rule-edit.md).
459+
- [Update an existing data collection rule](../essentials/data-collection-rule-edit.md).

articles/azure-monitor/logs/restore.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -127,14 +127,15 @@ You can:
127127
- Perform up to four restores per table per week.
128128
129129
## Pricing model
130-
The charge for maintaining restored logs is calculated based on the volume of data you restore, in GB, and the number or days for which you restore the data. Charges are prorated and subject to the minimum restore duration and data volume. There is no charge for querying against restored logs.
130+
The charge for restored logs is based on the volume of data you restore, in GB, and the duration for which you keep the restored data.
131+
- Charges are subject to a minimum restored data volume.
132+
- Charges are prorated hourly and subject to a minimum restore duration.
133+
- For more information, see [Azure Monitor pricing](https://azure.microsoft.com/pricing/details/monitor/).
131134
132-
For example, if your table holds 500 GB a day and you restore 10 days of data, you'll be charged for 5000 GB a day until you dismiss the restored data.
135+
For example, if your table holds 500 GB a day and you restore 10 days of data, you'll be charged for 5000 GB a day until you [dismiss the restored data](#dismiss-restored-data).
133136
134137
> [!NOTE]
135-
> Billing of restore is not yet enabled. You can restore logs for free until early 2023.
136-
137-
For more information, see [Azure Monitor pricing](https://azure.microsoft.com/pricing/details/monitor/).
138+
> There is no charge for querying restored logs.
138139
139140
## Next steps
140141

articles/azure-monitor/logs/search-jobs.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -269,13 +269,11 @@ You can use all functions and binary operators within these operators.
269269
## Pricing model
270270
The charge for a search job is based on:
271271

272-
- Search job execution - the amount of data the search job needs to scan.
273-
- Search job results - the amount of data ingested in the results table, based on the regular log data ingestion prices.
272+
- Search job execution - the amount of data the search job scans.
273+
- Search job results - the amount of data the search job finds and is ingested into the results table, based on the regular log data ingestion prices.
274274

275-
For example, if your table holds 500 GB per day, for a query on three days, you'll be charged for 1500 GB of scanned data. If the job returns 1000 records, you'll be charged for ingesting these 1000 records into the results table.
276-
277-
> [!NOTE]
278-
> Search job execution is free until early 2023. In other words, until early 2023, you will only incur charges for ingesting the search results, not for executing the search job.
275+
For example, if your table holds 500 GB per day, for a search over 30 days, you'll be charged for 15,000 GB of scanned data.
276+
If the search job finds 1,000 records that match the search query, you'll be charged for ingesting these 1,000 records into the results table.
279277

280278
For more information, see [Azure Monitor pricing](https://azure.microsoft.com/pricing/details/monitor/).
281279

articles/backup/scripts/backup-powershell-sample-backup-encrypted-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: In this article, learn how to use an Azure PowerShell Script sample
44
ms.topic: sample
55
ms.date: 03/05/2019
66
ms.custom: mvc, devx-track-azurepowershell
7-
author: jyothisuri
8-
ms.author: jsuri
7+
author: AbhishekMallick-MS
8+
ms.author: v-abhmallick
99
---
1010

1111
# Back up an encrypted Azure virtual machine with PowerShell

0 commit comments

Comments
 (0)