Skip to content

Commit 2cc6c67

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into bug-bash-article-3
2 parents a7954bd + bad33c7 commit 2cc6c67

File tree

278 files changed

+4024
-2411
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

278 files changed

+4024
-2411
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -884,6 +884,12 @@
884884
"branch": "main",
885885
"branch_mapping": {}
886886
},
887+
{
888+
"path_to_root": "azure-cosmos-tableapi-dotnet",
889+
"url": "https://github.com/Azure-Samples/cosmos-db-table-api-dotnet-samples",
890+
"branch": "v12",
891+
"branch_mapping": {}
892+
},
887893
{
888894
"path_to_root": "msdocs-django-postgresql-sample-app",
889895
"url": "https://github.com/Azure-Samples/msdocs-django-postgresql-sample-app",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6911,6 +6911,11 @@
69116911
"redirect_url": "/azure/azure-functions/functions-bindings-event-hubs-output",
69126912
"redirect_document_id": false
69136913
},
6914+
{
6915+
"source_path_from_root": "/articles/azure-functions/monitor-metrics.md",
6916+
"redirect_url": "/azure/azure-functions/monitor-functions",
6917+
"redirect_document_id": false
6918+
},
69146919
{
69156920
"source_path_from_root": "/articles/azure-functions/functions-bindings-errors.md",
69166921
"redirect_url": "/azure/azure-functions/functions-bindings-error-pages",

articles/active-directory-b2c/azure-monitor.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: how-to
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
14-
ms.date: 06/03/2022
14+
ms.date: 07/12/2022
1515
---
1616

1717
# Monitor Azure AD B2C with Azure Monitor
@@ -124,7 +124,7 @@ To create the custom authorization and delegation in Azure Lighthouse, we use an
124124
| Region | Select the region where the resource will be deployed. |
125125
| Msp Offer Name | A name describing this definition. For example, _Azure AD B2C Monitoring_. It's the name that will be displayed in Azure Lighthouse. The **MSP Offer Name** must be unique in your Azure AD. To monitor multiple Azure AD B2C tenants, use different names. |
126126
| Msp Offer Description | A brief description of your offer. For example, _Enables Azure Monitor in Azure AD B2C_. |
127-
| Managed By Tenant Id | The **Tenant ID** of your Azure AD B2C tenant (also known as the directory ID). |
127+
| Managed By Tenant ID | The **Tenant ID** of your Azure AD B2C tenant (also known as the directory ID). |
128128
| Authorizations | Specify a JSON array of objects that include the Azure AD `principalId`, `principalIdDisplayName`, and Azure `roleDefinitionId`. The `principalId` is the **Object ID** of the B2C group or user that will have access to resources in this Azure subscription. For this walkthrough, specify the group's Object ID that you recorded earlier. For the `roleDefinitionId`, use the [built-in role](../role-based-access-control/built-in-roles.md) value for the _Contributor role_, `b24988ac-6180-42a0-ab88-20f7382dd24c`. |
129129
| Rg Name | The name of the resource group you create earlier in your Azure AD tenant. For example, _azure-ad-b2c-monitor_. |
130130

@@ -173,18 +173,21 @@ You're ready to [create diagnostic settings](../active-directory/reports-monitor
173173
To configure monitoring settings for Azure AD B2C activity logs:
174174

175175
1. Sign in to the [Azure portal](https://portal.azure.com/) with your Azure AD B2C administrative account. This account must be a member of the security group you specified in the [Select a security group](#32-select-a-security-group) step.
176-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
177-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
176+
1. Make sure you're using the directory that contains your Azure AD B2C tenant:
177+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
178+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
178179
1. Select **Azure Active Directory**
179180
1. Under **Monitoring**, select **Diagnostic settings**.
180-
1. If there are existing settings for the resource, you'll see a list of settings already configured. Either select **Add diagnostic setting** to add a new setting, or select **Edit** to edit an existing setting. Each setting can have no more than one of each of the destination types.
181+
1. If there are existing settings for the resource, you'll see a list of settings already configured. Either select **Add diagnostic setting** to add a new setting, or select **Edit settings** to edit an existing setting. Each setting can have no more than one of each of the destination types.
181182

182-
![Diagnostics settings pane in Azure portal](./media/azure-monitor/azure-monitor-portal-05-diagnostic-settings-pane-enabled.png)
183+
![Screenshot of the diagnostics settings pane in Azure portal.](./media/azure-monitor/azure-monitor-portal-05-diagnostic-settings-pane-enabled.png)
183184

184185
1. Give your setting a name if it doesn't already have one.
185-
1. Check the box for each destination to send the logs. Select **Configure** to specify their settings **as described in the following table**.
186-
1. Select **Send to Log Analytics**, and then select the **Name of workspace** you created earlier (`AzureAdB2C`).
187186
1. Select **AuditLogs** and **SignInLogs**.
187+
1. Select **Send to Log Analytics Workspace**, and then:
188+
1. Under **Subscription**, select your subscription.
189+
2. Under **Log Analytics Workspace**, select the name of the workspace you created earlier such as `AzureAdB2C`.
190+
188191

189192
> [!NOTE]
190193
> Only the **AuditLogs** and **SignInLogs** diagnostic settings are currently supported for Azure AD B2C tenants.
@@ -204,7 +207,7 @@ Now you can configure your Log Analytics workspace to visualize your data and co
204207

205208
Log queries help you to fully use the value of the data collected in Azure Monitor Logs. A powerful query language allows you to join data from multiple tables, aggregate large sets of data, and perform complex operations with minimal code. Virtually any question can be answered and analysis performed as long as the supporting data has been collected, and you understand how to construct the right query. For more information, see [Get started with log queries in Azure Monitor](../azure-monitor/logs/get-started-queries.md).
206209

207-
1. From **Log Analytics workspace**, select **Logs**
210+
1. From **Log Analytics workspace** window, select **Logs**
208211
1. In the query editor, paste the following [Kusto Query Language](/azure/data-explorer/kusto/query/) query. This query shows policy usage by operation over the past x days. The default duration is set to 90 days (90d). Notice that the query is focused only on the operation where a token/code is issued by policy.
209212

210213
```kusto
@@ -253,7 +256,7 @@ Workbooks provide a flexible canvas for data analysis and the creation of rich v
253256

254257
Follow the instructions below to create a new workbook using a JSON Gallery Template. This workbook provides a **User Insights** and **Authentication** dashboard for Azure AD B2C tenant.
255258

256-
1. From the **Log Analytics workspace**, select **Workbooks**.
259+
1. From the **Log Analytics workspace** window, select **Workbooks**.
257260
1. From the toolbar, select **+ New** option to create a new workbook.
258261
1. On the **New workbook** page, select the **Advanced Editor** using the **</>** option on the toolbar.
259262

@@ -279,7 +282,7 @@ The workbook will display reports in the form of a dashboard.
279282

280283
## Create alerts
281284

282-
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or a number of events are occur within a particular time window. For example, alerts can be used to notify you when average number of sign in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
285+
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events occur. You can also create alerts on absence of an event, or a number of events occur within a particular time window. For example, alerts can be used to notify you when average number of sign in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
283286

284287
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there's a 25% drop in the **Total Requests** compared to previous period. Alert will run every 5 minutes and look for the drop in the last hour compared to the hour before it. The alerts are created using Kusto query language.
285288

133 KB
Loading
-9.98 KB
Loading

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/29/2021
11+
ms.date: 07/12/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -43,14 +43,15 @@ You learn how to register an application in the next tutorial.
4343

4444
1. Sign in to the [Azure portal](https://portal.azure.com/).
4545

46-
1. Switch to the directory that contains your subscription:
46+
1. Make sure you're using the directory that contains your subscription:
47+
4748
1. In the Azure portal toolbar, select the **Directories + subscriptions** filter icon.
4849

4950
![Directories + subscriptions filter icon](media/tutorial-create-tenant/directories-subscription-filter-icon.png)
5051

51-
1. Find the directory that contains your subscription and select the **Switch** button next to it. Switching a directory reloads the portal.
52+
1. Find the directory that contains your subscription and select the **Switch** button next to it. Switching a directory reloads the portal. If the directory that contains your subscription has the **Current** label next to it, you don't need to do anything.
5253

53-
![Directories + subscriptions with Switch button](media/tutorial-create-tenant/switch-directory.png)
54+
![Screenshot of the directories and subscriptions window.](media/tutorial-create-tenant/switch-directory.png)
5455

5556
1. Add **Microsoft.AzureActiveDirectory** as a resource provider for the Azure subscription you're using ([learn more](../azure-resource-manager/management/resource-providers-and-types.md?WT.mc_id=Portal-Microsoft_Azure_Support#register-resource-provider-1)):
5657

articles/active-directory-b2c/validation-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Following example uses these validation technical profiles:
8686
```xml
8787
<ValidationTechnicalProfiles>
8888
<ValidationTechnicalProfile ReferenceId="login-NonInteractive" ContinueOnError="false" />
89-
<ValidationTechnicalProfile ReferenceId="REST-ReadProfileFromCustomertsDatabase" ContinueOnError="true" >
89+
<ValidationTechnicalProfile ReferenceId="REST-ReadProfileFromCustomersDatabase" ContinueOnError="true" >
9090
<Preconditions>
9191
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
9292
<Value>userType</Value>

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ After the first failure, the first retry happens within the next 2 hours (usuall
8282
- The fifth retry happens 48 hours after the first failure.
8383
- The sixth retry happens 72 hours after the first failure.
8484
- The seventh retry happens 96 hours after the first failure.
85-
- The eigth retry happens 120 hours after the first failure.
85+
- The eighth retry happens 120 hours after the first failure.
8686

8787
This cycle is repeated every 24 hours until the 30th day when retries are stopped and the job is disabled.
8888

articles/active-directory/authentication/howto-sspr-authenticationdata.md

Lines changed: 50 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/05/2020
9+
ms.date: 07/12/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -18,7 +18,7 @@ ms.custom: devx-track-azurepowershell
1818
---
1919
# Pre-populate user authentication contact information for Azure Active Directory self-service password reset (SSPR)
2020

21-
To use Azure Active Directory (Azure AD) self-service password reset (SSPR), authentication contact information for a user must be present. Some organizations have users register their authentication data themselves. Other organizations prefer to synchronize from authentication data that already exists in Active Directory Domain Services (AD DS). This synchronized data is made available to Azure AD and SSPR without requiring user interaction. When users need to change or reset their password, they can do so even if they haven't previously registered their contact information.
21+
To use Azure Active Directory (Azure AD) self-service password reset (SSPR), authentication information for a user must be present. Most organizations have users register their authentication data themselves while collecting information for MFA. Some organizations prefer to bootstrap this process through synchronization of authentication data that already exists in Active Directory Domain Services (AD DS). This synchronized data is made available to Azure AD and SSPR without requiring user interaction. When users need to change or reset their password, they can do so even if they haven't previously registered their contact information.
2222

2323
You can pre-populate authentication contact information if you meet the following requirements:
2424

@@ -80,13 +80,13 @@ The following fields can be set through PowerShell:
8080
* Can only be set if you're not synchronizing with an on-premises directory.
8181

8282
> [!IMPORTANT]
83-
> There's a known lack of parity in command features between PowerShell v1 and PowerShell v2. The [Microsoft Graph REST API (beta) for authentication methods](/graph/api/resources/authenticationmethods-overview) is the current engineering focus to provide modern interaction.
83+
> Azure AD PowerShell is planned for deprecation. You can start using [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) to interact with Azure AD as you would in Azure AD PowerShell, or use the [Microsoft Graph REST API for managing authentication methods](/graph/api/resources/authenticationmethods-overview).
8484
85-
### Use PowerShell version 1
85+
### Use Azure AD PowerShell version 1
8686

8787
To get started, [download and install the Azure AD PowerShell module](/previous-versions/azure/jj151815(v=azure.100)#bkmk_installmodule). After it's installed, use the following steps to configure each field.
8888

89-
#### Set the authentication data with PowerShell version 1
89+
#### Set the authentication data with Azure AD PowerShell version 1
9090

9191
```PowerShell
9292
Connect-MsolService
@@ -98,7 +98,7 @@ Set-MsolUser -UserPrincipalName [email protected] -PhoneNumber "+1 4252345678"
9898
Set-MsolUser -UserPrincipalName [email protected] -AlternateEmailAddresses @("[email protected]") -MobilePhone "+1 4251234567" -PhoneNumber "+1 4252345678"
9999
```
100100

101-
#### Read the authentication data with PowerShell version 1
101+
#### Read the authentication data with Azure AD PowerShell version 1
102102

103103
```PowerShell
104104
Connect-MsolService
@@ -120,21 +120,21 @@ Get-MsolUser -UserPrincipalName [email protected] | select -Expand StrongAuthentic
120120
Get-MsolUser -UserPrincipalName [email protected] | select -Expand StrongAuthenticationUserDetails | select Email
121121
```
122122

123-
### Use PowerShell version 2
123+
### Use Azure AD PowerShell version 2
124124

125125
To get started, [download and install the Azure AD version 2 PowerShell module](/powershell/module/azuread/).
126126

127127
To quickly install from recent versions of PowerShell that support `Install-Module`, run the following commands. The first line checks to see if the module is already installed:
128128

129129
```PowerShell
130-
Get-Module AzureADPreview
131-
Install-Module AzureADPreview
130+
Get-Module AzureAD
131+
Install-Module AzureAD
132132
Connect-AzureAD
133133
```
134134

135135
After the module is installed, use the following steps to configure each field.
136136

137-
#### Set the authentication data with PowerShell version 2
137+
#### Set the authentication data with Azure AD PowerShell version 2
138138

139139
```PowerShell
140140
Connect-AzureAD
@@ -146,7 +146,7 @@ Set-AzureADUser -ObjectId [email protected] -TelephoneNumber "+1 4252345678"
146146
Set-AzureADUser -ObjectId [email protected] -OtherMails @("[email protected]") -Mobile "+1 4251234567" -TelephoneNumber "+1 4252345678"
147147
```
148148

149-
#### Read the authentication data with PowerShell version 2
149+
#### Read the authentication data with Azure AD PowerShell version 2
150150

151151
```PowerShell
152152
Connect-AzureAD
@@ -158,6 +158,45 @@ Get-AzureADUser -ObjectID [email protected] | select TelephoneNumber
158158
Get-AzureADUser | select DisplayName,UserPrincipalName,otherMails,Mobile,TelephoneNumber | Format-Table
159159
```
160160

161+
### Use Microsoft Graph PowerShell
162+
163+
To get started, [download and install the Microsoft Graph PowerShell module](/powershell/microsoftgraph/overview).
164+
165+
To quickly install from recent versions of PowerShell that support `Install-Module`, run the following commands. The first line checks to see if the module is already installed:
166+
167+
```PowerShell
168+
Get-Module Microsoft.Graph
169+
Install-Module Microsoft.Graph
170+
Select-MgProfile -Name "beta"
171+
Connect-MgGraph -Scopes "User.ReadWrite.All"
172+
```
173+
174+
After the module is installed, use the following steps to configure each field.
175+
176+
#### Set the authentication data with Microsoft Graph PowerShell
177+
178+
```PowerShell
179+
Connect-MgGraph -Scopes "User.ReadWrite.All"
180+
181+
Update-MgUser -UserId '[email protected]' -otherMails @("[email protected]")
182+
Update-MgUser -UserId '[email protected]' -mobilePhone "+1 4251234567"
183+
Update-MgUser -UserId '[email protected]' -businessPhones "+1 4252345678"
184+
185+
Update-MgUser -UserId '[email protected]' -otherMails @("[email protected]") -mobilePhone "+1 4251234567" -businessPhones "+1 4252345678"
186+
```
187+
188+
#### Read the authentication data with Microsoft Graph PowerShell
189+
190+
```PowerShell
191+
Connect-MgGraph -Scopes "User.Read.All"
192+
193+
Get-MgUser -UserId '[email protected]' | select otherMails
194+
Get-MgUser -UserId '[email protected]' | select mobilePhone
195+
Get-MgUser -UserId '[email protected]' | select businessPhones
196+
197+
Get-MgUser -UserId '[email protected]' | Select businessPhones, mobilePhone, otherMails | Format-Table
198+
```
199+
161200
## Next steps
162201

163202
Once authentication contact information is pre-populated for users, complete the following tutorial to enable self-service password reset:

0 commit comments

Comments
 (0)