Skip to content

Commit 2b8f725

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vnet-pl-resolver
2 parents a8552b1 + 7fb24f6 commit 2b8f725

File tree

13 files changed

+97
-115
lines changed

13 files changed

+97
-115
lines changed

articles/active-directory/develop/custom-extension-configure-saml-app.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Source claims from an external store (SAML app)
33
titleSuffix: Microsoft identity platform
44
description: Use a custom claims provider to augment tokens with claims from an external identity system. Configure a SAML app to receive tokens with external claims.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -40,9 +40,11 @@ The following steps are for registering a demo [XRayClaims](https://adfshelp.mic
4040

4141
Add a new, non-gallery SAML application in your tenant:
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com).
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4444

45-
1. Go to **Azure Active Directory** and then **Enterprise applications**. Select **New application** and then **Create your own application**.
45+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
46+
47+
1. Select **New application** and then **Create your own application**.
4648

4749
1. Add a name for the app. For example, **AzureADClaimsXRay**. Select the **Integrate any other application you don't find in the gallery (Non-gallery)** option and select **Create**.
4850

articles/active-directory/develop/custom-extension-get-started.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Get started with custom claims providers (preview)
33
titleSuffix: Microsoft identity platform
44
description: Learn how to develop and register an Azure Active Directory custom authentication extensions REST API. The custom authentication extension allows you to source claims from a data store that is external to Azure Active Directory.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -157,14 +157,11 @@ The following screenshot demonstrates how to configure the Azure HTTP trigger fu
157157

158158
In this step, you configure a custom authentication extension, which will be used by Azure AD to call your Azure function. The custom authentication extension contains information about your REST API endpoint, the claims that it parses from your REST API, and how to authenticate to your REST API. Follow these steps to register a custom authentication extension:
159159

160-
# [Azure portal](#tab/azure-portal)
160+
# [Microsoft Entra admin center](#tab/entra-admin-center)
161161

162-
1. Sign in to the [Azure portal](https://portal.azure.com).
163-
1. Under **Azure services**, select **Azure Active Directory**.
164-
1. Ensure your user account has the Global Administrator or Application Administrator and Authentication Extensibility Administrator role. Otherwise, learn how to [assign a role](../roles/manage-roles-portal.md).
165-
1. From the menu, select **Enterprise applications**.
166-
1. Under **Manage**, select the **Custom authentication extensions**.
167-
1. Select **Create a custom authentication extension**.
162+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer) and [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
163+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
164+
1. Select **Custom authentication extensions**, and then select **Create a custom authentication extension**.
168165
1. In **Basics**, select the **tokenIssuanceStart** event and select **Next**.
169166
1. In **Endpoint Configuration**, fill in the following properties:
170167

@@ -361,8 +358,9 @@ Follow these steps to register the **jwt.ms** web application:
361358

362359
### 3.1 Register a test web application
363360

364-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
365-
1. Select **App registrations**, and then select **New registration**.
361+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer).
362+
1. Browse to **Identity** > **Applications** > **Application registrations**.
363+
1. Select **New registration**.
366364
1. Enter a **Name** for the application. For example, **My Test application**.
367365
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
368366
1. In the **Select a platform** dropdown in **Redirect URI**, select **Web** and then enter `https://jwt.ms` in the URL text box.
@@ -414,12 +412,12 @@ For tokens to be issued with claims incoming from the custom authentication exte
414412

415413
Follow these steps to connect the *My Test application* with your custom authentication extension:
416414

417-
# [Azure portal](#tab/azure-portal)
415+
# [Microsoft Entra admin center](#tab/entra-admin-center)
418416

419417
First assign the custom authentication extension as a custom claims provider source:
420418

421-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
422-
1. Select **App registrations**, and find the *My Test application* registration you created.
419+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-administrator).
420+
1. Browse to **Identity** > **Applications** > **Application registrations**.
423421
1. In the **Overview** page, under **Managed application in local directory**, select **My Test application**.
424422
1. Under **Manage**, select **Single sign-on**.
425423
1. Under **Attributes & Claims**, select **Edit**.
@@ -630,7 +628,7 @@ If you configured the [Microsoft identity provider](#step-5-protect-your-azure-f
630628

631629
1. Under the **App registration**, enter the application ID (client ID) of the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
632630

633-
1. Go to your Azure AD tenant in which your custom authentication extension is registered, and select **Azure Active Directory** > **App registrations**.
631+
1. In the Microsoft Entra admin center:
634632
1. Select the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
635633
1. Select **Certificates & secrets** > **Client secrets** > **New client secret**.
636634
1. Add a description for your client secret.

articles/active-directory/develop/custom-extension-troubleshoot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot a custom claims provider
33
titleSuffix: Microsoft identity platform
44
description: Troubleshoot and monitor your custom claims provider API. Learn how to use logging and Azure AD sign-in logs to find errors and issues in your custom claims provider API.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -44,9 +44,9 @@ Azure AD sign-in logs also integrate with [Azure Monitor](../../azure-monitor/in
4444

4545
To access the Azure AD sign-in logs:
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com).
48-
1. In the **Enterprise apps** experience for your given application, select on the **Sign-in** logs tab.
49-
1. Select the latest sign-in log.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
48+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
49+
1. Select **Sign-in logs**, and then select the latest sign-in log.
5050
1. For more details, select the **Authentication Events** tab. Information related to the custom authentication extension REST API call is displayed, including any [error codes](#error-codes-reference).
5151

5252
:::image type="content" source="media/custom-extension-troubleshoot/authentication-events.png" alt-text="Screenshot that shows the authentication events information." :::
@@ -89,8 +89,8 @@ Use the following table to diagnose an error code.
8989

9090
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom authentiction extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
9191

92-
1. Sign in to the [Azure portal](https://portal.azure.com) with your Azure administrator account.
93-
1. Select **Azure Active Directory** > **App registrations**.
92+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
93+
1. Browse to **Identity** > **Applications** > **Application registrations**.
9494
1. Select the *Azure Functions authentication events API* app registration [you created previously](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension).
9595
1. Copy the [application ID](custom-extension-get-started.md#22-grant-admin-consent).
9696
1. If you haven't created an app secret, follow these steps:

articles/active-directory/develop/developer-support-help-options.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ If you need an answer to a question or help in solving a problem not covered in
2323
<img alt='Azure support' src='./media/common/logo_azure.svg'>
2424
</div>
2525

26-
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Azure portal:
26+
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Microsoft Entra admin center:
2727

28-
- If you already have an Azure Support Plan, [open a support request here](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
28+
- If you already have an Azure Support Plan, [open a support request here](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
2929

30-
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
30+
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
3131

3232
- If you're not an Azure customer, you can open a support request with [Microsoft Support for business](https://support.serviceshub.microsoft.com/supportforbusiness).
3333

articles/azure-arc/data/version-log.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ This article identifies the component versions with each release of Azure Arc-en
1919

2020
## August 8, 2023
2121

22-
Aug 2023 preview release is now available.
23-
2422
|Component|Value|
2523
|-----------|-----------|
2624
|Container images tag |`v1.22.0_2023-08-08`|

articles/communication-services/concepts/numbers/sub-eligibility-number-capability.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,7 @@ Numbers can be purchased on eligible Azure subscriptions and in geographies wher
5454
> - [Switzerland](../numbers/phone-number-management-for-switzerland.md)
5555
> - [Taiwan](../numbers/phone-number-management-for-taiwan.md)
5656
> - [Thailand](../numbers/phone-number-management-for-thailand.md)
57+
> - [United Arab Emirates](../numbers/phone-number-management-for-united-arab-emirates.md)
5758
> - [United Kingdom](../numbers/phone-number-management-for-united-kingdom.md)
5859
> - [United States](../numbers/phone-number-management-for-united-states.md)
5960

articles/communication-services/concepts/pstn-pricing.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -428,6 +428,15 @@ All prices shown below are in USD.
428428
|-------------|---------------|-----------------|
429429
|Toll-free |N/A |USD 0.2377/min |
430430

431+
## United Arab Emirates telephony offers
432+
### Phone number leasing charges
433+
|Number type |Monthly fee |
434+
|--------------|--------------|
435+
|Toll-Free |USD 10.00/mo |
436+
### Usage charges
437+
|Number type |To make calls |To receive calls |
438+
|-------------|---------------|-----------------|
439+
|Toll-free |N/A |USD 0.2632/min |
431440

432441
## South Korea telephony offers
433442
### Phone number leasing charges
@@ -441,7 +450,6 @@ All prices shown below are in USD.
441450

442451

443452
## Philippines telephony offers
444-
445453
### Phone number leasing charges
446454
|Number type |Monthly fee |
447455
|--------------|--------------|
@@ -452,7 +460,6 @@ All prices shown below are in USD.
452460
|Toll-free |N/A |Starting at USD 0.3345/min |
453461

454462

455-
456463
***
457464

458465
Note: Pricing for all countries/regions is subject to change as pricing is market-based and depends on third-party suppliers of telephony services. Additionally, pricing may include requisite taxes and fees.

articles/communication-services/includes/country-dropdown.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,5 +43,6 @@ ms.custom: references_regions
4343
> - [Switzerland](../concepts/numbers/phone-number-management-for-switzerland.md)
4444
> - [Taiwan](../concepts/numbers/phone-number-management-for-taiwan.md)
4545
> - [Thailand](../concepts/numbers/phone-number-management-for-thailand.md)
46+
> - [United Arab Emirates](../concepts/numbers/phone-number-management-for-united-arab-emirates.md)
4647
> - [United Kingdom](../concepts/numbers/phone-number-management-for-united-kingdom.md)
4748
> - [United States](../concepts/numbers/phone-number-management-for-united-states.md)

articles/communication-services/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1073,6 +1073,8 @@ items:
10731073
href: concepts/numbers/phone-number-management-for-taiwan.md
10741074
- name: Phone number management for Thailand
10751075
href: concepts/numbers/phone-number-management-for-thailand.md
1076+
- name: Phone number management for United Arab Emirates
1077+
href: concepts/numbers/phone-number-management-for-united-arab-emirates.md
10761078
- name: Phone number management for United Kingdom
10771079
href: concepts/numbers/phone-number-management-for-united-kingdom.md
10781080
- name: Phone number management for United States

articles/cost-management-billing/understand/mca-overview.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.reviewer: amberbhargava
66
ms.service: cost-management-billing
77
ms.subservice: billing
88
ms.topic: conceptual
9-
ms.date: 04/26/2023
9+
ms.date: 08/29/2023
1010
ms.author: banders
1111
---
1212

@@ -30,15 +30,22 @@ Roles on the billing account have the highest level of permissions. By default,
3030

3131
Use a billing profile to manage your invoice and payment methods. A monthly invoice is generated at the beginning of the month for each billing profile in your account. The invoice contains respective charges for all Azure subscriptions and other purchases from the previous month.
3232

33-
A billing profile is automatically created for your billing account. It contains one invoice section by default. You may create additional sections to easily track and organize costs based on your needs whether is it per project, department, or development environment. You'll see these sections on the billing profile's invoice reflecting the usage of each subscription and purchases you've assigned to it.
33+
A billing profile is automatically created for your billing account. It contains one invoice section by default. You may create more sections to easily track and organize costs based on your needs whether is it per project, department, or development environment. The sections are shown on the billing profile's invoice reflecting the usage of each subscription and purchases you've assigned to it.
3434

3535
Roles on the billing profiles have permissions to view and manage invoices and payment methods. Assign these roles to users who pay invoices like members of the accounting team in your organization. For more information, see [billing profile roles and tasks](../manage/understand-mca-roles.md#billing-profile-roles-and-tasks).
3636

37+
3738
### Each billing profile gets a monthly invoice
3839

3940
A monthly invoice is generated at the beginning of the month for each billing profile. The invoice contains all charges from the previous month.
4041

41-
You can view the invoice, download documents and change setting to get future invoices by email, in the Azure portal. For more information, see [download invoices for a Microsoft Customer Agreement](../manage/download-azure-invoice-daily-usage-date.md#download-invoices-for-a-microsoft-customer-agreement).
42+
You can view the invoice, download documents and the change setting to get future invoices by email, in the Azure portal. For more information, see [download invoices for a Microsoft Customer Agreement](../manage/download-azure-invoice-daily-usage-date.md#download-invoices-for-a-microsoft-customer-agreement).
43+
44+
If an invoice becomes overdue, past-due email notifications are only sent to users with role assignments on the overdue billing profile. Ensure that users who should receive overdue notifications have one of the following roles:
45+
46+
- Billing profile owner
47+
- Billing profile contributor
48+
- Invoice manager
4249

4350
### Invoice payment methods
4451

@@ -56,7 +63,7 @@ Apply policies to control Azure Marketplace and Reservation purchases using a bi
5663

5764
### Azure plans determine pricing and service level agreement for subscriptions
5865

59-
Azure plans determine the pricing and service level agreements for Azure subscriptions. They are automatically enabled when you create a billing profile. All invoice sections that are associated with the billing profile can use these plans. Users with access to the invoice section use the plans to create Azure subscriptions. The following Azure plans are supported in billing accounts for Microsoft Customer Agreement:
66+
Azure plans determine the pricing and service level agreements for Azure subscriptions. They're automatically enabled when you create a billing profile. All invoice sections that are associated with the billing profile can use these plans. Users with access to the invoice section use the plans to create Azure subscriptions. The following Azure plans are supported in billing accounts for Microsoft Customer Agreement:
6067

6168
| Plan | Definition |
6269
|------------------|-------------|

0 commit comments

Comments
 (0)