Skip to content

Commit 2ab5aa7

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-marmalade
2 parents 4793a27 + 1ab35d0 commit 2ab5aa7

File tree

105 files changed

+1586
-422
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+1586
-422
lines changed

articles/active-directory/b2b/add-users-administrator.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 11/12/2019
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -41,9 +41,6 @@ To add B2B collaboration users to the directory, follow these steps:
4141

4242
![Shows where New guest user is in the UI](./media/add-users-administrator/new-guest-user-in-all-users.png)
4343

44-
> [!NOTE]
45-
> The **New guest user** option is also available on the **Organizational relationships** page. In **Azure Active Directory**, under **Manage**, select **Organizational relationships**.
46-
4744
5. On the **New user** page, select **Invite user** and then add the guest user's information.
4845

4946
> [!NOTE]

articles/active-directory/b2b/auditing-and-reporting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 12/14/2018
9+
ms.date: 05/11/2020
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
With guest users, you have auditing capabilities similar to with member users.
2121

2222
## Access reviews
23-
You can use access reviews to periodically verify whether guest users still need access to your resources. The **Access reviews** feature is available in **Azure Active Directory** under **Manage** > **Organizational Relationships**. (You can also search for "access reviews" from **All services** in the Azure portal.) To learn how to use access reviews, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
23+
You can use access reviews to periodically verify whether guest users still need access to your resources. The **Access reviews** feature is available in **Azure Active Directory** under **Organizational Relationships** > **Access reviews** (or **External Identities** > **Access reviews** ). You can also search for "access reviews" from **All services** in the Azure portal. To learn how to use access reviews, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
2424

2525
## Audit logs
2626

articles/active-directory/b2b/delegate-invitations.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 04/11/2019
9+
ms.date: 05/11/2020
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -34,11 +34,9 @@ By default, all users, including guests, can invite guest users.
3434
### To configure external collaboration settings:
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com) as a tenant administrator.
37-
2. Select **Azure Active Directory** > **Users** > **User settings**.
38-
3. Under **External users**, select **Manage external collaboration settings**.
39-
> [!NOTE]
40-
> The **External collaboration settings** are also available from the **Organizational relationships** page. In Azure Active Directory, under **Manage**, go to **Organizational relationships** > **Settings**.
41-
4. On the **External collaboration settings** page, choose the policies you want to enable.
37+
2. Select **Azure Active Directory**.
38+
3. Select **Organizational Relationships** > **Settings** (or select **External Identities** > **External collaboration settings**).
39+
6. On the **External collaboration settings** page, choose the policies you want to enable.
4240

4341
![External collaboration settings](./media/delegate-invitations/control-who-to-invite.png)
4442

articles/active-directory/b2b/direct-federation.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 05/07/2020
9+
ms.date: 05/11/2020
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -143,8 +143,8 @@ Next, you'll configure federation with the identity provider configured in step
143143
### To configure direct federation in the Azure AD portal
144144

145145
1. Go to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
146-
2. Select **Organizational Relationships**.
147-
3. Select **Identity providers**, and then select **New SAML/WS-Fed IdP**.
146+
2. Select **Organizational Relationships** > **All identity providers** (or **External Identities** > **All identity providers**).
147+
3. Select , and then select **New SAML/WS-Fed IdP**.
148148

149149
![Screenshot showing button for adding a new SAML or WS-Fed IdP](media/direct-federation/new-saml-wsfed-idp.png)
150150

@@ -191,8 +191,8 @@ Now test your direct federation setup by inviting a new B2B guest user. For deta
191191
## How do I edit a direct federation relationship?
192192

193193
1. Go to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
194-
2. Select **Organizational Relationships**.
195-
3. Select **Identity providers**
194+
2. Select **Organizational Relationships** (or **External Identities**).
195+
3. Select **All identity providers**
196196
4. Under **SAML/WS-Fed identity providers**, select the provider.
197197
5. In the identity provider details pane, update the values.
198198
6. Select **Save**.
@@ -203,8 +203,8 @@ You can remove your direct federation setup. If you do, direct federation guest
203203
To remove direct federation with an identity provider in the Azure AD portal:
204204

205205
1. Go to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
206-
2. Select **Organizational Relationships**.
207-
3. Select **Identity providers**.
206+
2. Select **Organizational Relationships** (or **External Identities**).
207+
3. Select **All identity providers**.
208208
4. Select the identity provider, and then select **Delete**.
209209
5. Select **Yes** to confirm deletion.
210210

articles/active-directory/b2b/google-federation.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 03/05/2020
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -88,8 +88,8 @@ Now you'll set the Google client ID and client secret, either by entering it in
8888

8989
#### To configure Google federation in the Azure AD portal
9090
1. Go to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
91-
2. Select **Organizational Relationships**.
92-
3. Select **Identity providers**, and then click the **Google** button.
91+
2. Select **Organizational Relationships** (or **External Identities**).
92+
3. Select **All identity providers**, and then click the **Google** button.
9393
4. Enter a name. Then enter the client ID and client secret you obtained earlier. Select **Save**.
9494

9595
![Screenshot showing the Add Google identity provider page](media/google-federation/google-identity-provider.png)
@@ -111,8 +111,8 @@ You can delete your Google federation setup. If you do so, Google guest users wh
111111

112112
### To delete Google federation in the Azure AD portal:
113113
1. Go to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
114-
2. Select **Organizational Relationships**.
115-
3. Select **Identity providers**.
114+
2. Select **Organizational Relationships** (or **External Identities**).
115+
3. Select **All identity providers**.
116116
4. On the **Google** line, select the context menu (**...**) and then select **Delete**.
117117

118118
![Screenshot showing the Delete option for the social identity provider](media/google-federation/google-social-identity-providers.png)

articles/active-directory/b2b/one-time-passcode.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 04/08/2019
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -54,7 +54,7 @@ When a guest user redeems an invitation or uses a link to a resource that has be
5454

5555
At the time of invitation, there's no indication that the user you're inviting will use one-time passcode authentication. But when the guest user signs in, one-time passcode authentication will be the fallback method if no other authentication methods can be used.
5656

57-
You can view guest users who authenticate with one-time passcodes in the Azure portal by going to **Azure Active Directory** > **Organizational relationships** > **Users from other organizations**.
57+
You can view guest users who authenticate with one-time passcodes in the Azure portal by going to **Azure Active Directory** > **Users**.
5858

5959
![Screenshot showing a one-time passcode user with Source value of OTP](media/one-time-passcode/otp-users.png)
6060

@@ -70,8 +70,7 @@ It might take a few minutes for the opt-in action to take effect. After that, on
7070
### To opt in using the Azure AD portal
7171
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD global administrator.
7272
2. In the navigation pane, select **Azure Active Directory**.
73-
3. Under **Manage**, select **Organizational Relationships**.
74-
4. Select **Settings**.
73+
3. Select **Organizational Relationships** > **Settings** (or select **External Identities** > **External collaboration settings**).
7574
5. Under **Enable Email One-Time Passcode for guests (Preview)**, select **Yes**.
7675

7776
### To opt in using PowerShell
@@ -137,8 +136,7 @@ It may take a few minutes for the opt-out action to take effect. If you turn off
137136
### To turn off the preview using the Azure AD portal
138137
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD global administrator.
139138
2. In the navigation pane, select **Azure Active Directory**.
140-
3. Under **Manage**, select **Organizational Relationships**.
141-
4. Select **Settings**.
139+
3. Select **Organizational Relationships** > **Settings** (or select **External Identities** > **External collaboration settings**).
142140
5. Under **Enable Email One-Time Passcode for guests (Preview)**, select **No**.
143141

144142
### To turn off the preview using PowerShell

articles/active-directory/b2b/redemption-experience.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 03/19/2020
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -98,7 +98,7 @@ When a guest signs in to access resources in a partner organization for the firs
9898

9999
![Screenshot showing new terms of use](media/redemption-experience/terms-of-use-accept.png)
100100

101-
You can configure see [terms of use](../governance/active-directory-tou.md) in **Manage** > **Organizational relationships** > **Terms of use**.
101+
You can configure [terms of use](../governance/active-directory-tou.md) in **Organizational relationships** (or **External Identities**) > **Terms of use**.
102102

103103
3. Unless otherwise specified, the guest is redirected to the Apps access panel, which lists the applications the guest can access.
104104

articles/active-directory/develop/tutorial-v2-angular.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,6 @@ If a back-end API doesn't require a scope (not recommended), you can use *client
339339
340340
## Next steps
341341
342-
Next, learn how to sign in a user and acquire tokens in the Angular tutorial:
342+
If you're new to identity and access management, we have several articles to help you learn modern authentication concepts, starting with [authentication vs. authorization](authentication-vs-authorization.md).
343343

344-
> [!div class="nextstepaction"]
345-
> [Angular tutorial](https://docs.microsoft.com/azure/active-directory/develop/tutorial-v2-angular)
344+
If you'd like to dive deeper into single-page application development on the Microsoft identity platform, the multi-part [Scenario: Single-page application](scenario-spa-overview.md) series of articles can help you get started.

articles/active-directory/managed-identities-azure-resources/services-support-managed-identities.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,19 @@ Refer to the following list to configure managed identity for Azure App Service
6767
- [Azure PowerShell](/azure/app-service/overview-managed-identity#using-azure-powershell)
6868
- [Azure Resource Manager template](/azure/app-service/overview-managed-identity#using-an-azure-resource-manager-template)
6969

70+
71+
### Azure Kubernetes Service (AKS)
72+
73+
| Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
74+
| --- | :-: | :-: | :-: | :-: |
75+
| System assigned | ![Available][check] | - | - | - |
76+
| User assigned | ![Available][check] | - | - | - |
77+
78+
79+
For more information, see [Use managed identities in Azure Kubernetes Service](https://docs.microsoft.com/azure/aks/use-managed-identity).
80+
81+
82+
7083
### Azure Blueprints
7184

7285
|Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |

articles/active-directory/privileged-identity-management/powershell-for-azure-ad-roles.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 04/28/2020
16+
ms.date: 05/11/2020
1717
ms.author: curtand
1818
ms.custom: pim
1919
ms.collection: M365-identity-device-management
@@ -119,11 +119,10 @@ There are four main objects in the setting. Only three of these objects are curr
119119

120120
[![](media/powershell-for-azure-ad-roles/get-update-role-settings-result.png "Get and update role settings")](media/powershell-for-azure-ad-roles/get-update-role-settings-result.png#lightbox)
121121

122-
To update the role setting, you will need to first define a setting object as follows:
122+
To update the role setting, you must get the existing setting object for a particular role and make changes to it:
123123

124-
$setting = New-Object Microsoft.Open.MSGraph.Model.AzureADMSPrivilegedRuleSetting
125-
$setting.RuleIdentifier = "JustificationRule"
126-
$setting.Setting = "{'required':false}"
124+
$setting = Get-AzureADMSPrivilegedRoleSetting -ProviderId 'aadRoles' -Filter "roleDefinitionId eq 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'"
125+
$setting.UserMemberSetting.justificationRule = '{"required":false}'
127126

128127
You can then go ahead and apply the setting to one of the objects for a particular role as shown below. The ID here is the role setting ID that can be retrieved from the result of the list role settings cmdlet.
129128

0 commit comments

Comments
 (0)