Skip to content

Commit 2cda20c

Browse files
Merge pull request #246706 from alexbuckgit/alexbuckgit/docutune-autopr-20230729-210233-6011453-ignore-build
[BULK] DocuTune - Fix formatting issues (part 1)
2 parents af94fbf + 9c7870e commit 2cda20c

9 files changed

+23
-22
lines changed

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,10 +55,11 @@ This section describes how you can assign the necessary permissions to a managed
5555

5656
[![Screenshot of managed identity name.](media/inbound-provisioning-api-grant-access/managed-identity-name.png)](media/inbound-provisioning-api-grant-access/managed-identity-name.png#lightbox)
5757

58-
1. Run the following PowerShell script to assign permissions to your managed identity.
58+
1. Run the following PowerShell script to assign permissions to your managed identity.
59+
5960
```powershell
6061
Install-Module Microsoft.Graph -Scope CurrentUser
61-
62+
6263
Connect-MgGraph -Scopes "Application.Read.All","AppRoleAssignment.ReadWrite.All,RoleManagement.ReadWrite.Directory"
6364
Select-MgProfile Beta
6465
$graphApp = Get-MgServicePrincipal -Filter "AppId eq '00000003-0000-0000-c000-000000000000'"
@@ -75,7 +76,7 @@ This section describes how you can assign the necessary permissions to a managed
7576
$managedID = Get-MgServicePrincipal -Filter "DisplayName eq 'CSV2SCIMBulkUpload'"
7677
New-MgServicePrincipalAppRoleAssignment -PrincipalId $managedID.Id -ServicePrincipalId $managedID.Id -ResourceId $graphApp.Id -AppRoleId $AppRole.Id
7778
```
78-
1. To confirm that the permission was applied, find the managed identity service principal under **Enterprise Applications** in Azure AD. Remove the **Application type** filter to see all service principals.
79+
1. To confirm that the permission was applied, find the managed identity service principal under **Enterprise Applications** in Azure AD. Remove the **Application type** filter to see all service principals.
7980
[![Screenshot of managed identity principal.](media/inbound-provisioning-api-grant-access/managed-identity-principal.png)](media/inbound-provisioning-api-grant-access/managed-identity-principal.png#lightbox)
8081
1. Click on the **Permissions** blade under **Security**. Ensure the permission is set.
8182
[![Screenshot of managed identity permissions.](media/inbound-provisioning-api-grant-access/managed-identity-permissions.png)](media/inbound-provisioning-api-grant-access/managed-identity-permissions.png#lightbox)

articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,8 @@ The PowerShell sample script published in the [Microsoft Entra ID inbound provis
8282
- Test-ScriptCommands.ps1 (sample usage commands)
8383
- UseClientCertificate.ps1 (script to generate self-signed certificate and upload it as service principal credential for use in OAuth flow)
8484
- `Sample1` (folder with more examples of how CSV file columns can be mapped to SCIM standard attributes. If you get different CSV files for employees, contractors, interns, you can create a separate AttributeMapping.psd1 file for each entity.)
85-
1. Download and install the latest version of PowerShell.
86-
1. Run the command to enable execution of remote signed scripts:
85+
1. Download and install the latest version of PowerShell.
86+
1. Run the command to enable execution of remote signed scripts:
8787
```powershell
8888
set-executionpolicy remotesigned
8989
```

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Once schema extensions are created, these extension attributes are automatically
4949
When you've more than 1000 service principals, you may find extensions missing in the source attribute list. If an attribute you've created doesn't automatically appear, then verify the attribute was created and add it manually to your schema. To verify it was created, use Microsoft Graph and [Graph Explorer](/graph/graph-explorer/graph-explorer-overview). To add it manually to your schema, see [Editing the list of supported attributes](customize-application-attributes.md#editing-the-list-of-supported-attributes).
5050

5151
### Create an extension attribute for cloud only users using Microsoft Graph
52-
You can extend the schema of Azure AD users using [Microsoft Graph](/graph/overview).
52+
You can extend the schema of Azure AD users using [Microsoft Graph](/graph/overview).
5353

5454
First, list the apps in your tenant to get the ID of the app you're working on. To learn more, see [List extensionProperties](/graph/api/application-list-extensionproperty).
5555

@@ -67,7 +67,7 @@ Content-type: application/json
6767
"name": "extensionName",
6868
"dataType": "string",
6969
"targetObjects": [
70-
"User"
70+
"User"
7171
]
7272
}
7373
```
@@ -89,10 +89,10 @@ GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_in
8989

9090

9191
### Create an extension attribute on a cloud only user using PowerShell
92-
Create a custom extension using PowerShell and assign a value to a user.
92+
Create a custom extension using PowerShell and assign a value to a user.
9393

9494
```
95-
#Connect to your Azure AD tenant
95+
#Connect to your Azure AD tenant
9696
Connect-AzureAD
9797
9898
#Create an application (you can instead use an existing application if you would like)
@@ -123,7 +123,7 @@ Cloud sync will automatically discover your extensions in on-premises Active Dir
123123
4. Select the configuration you wish to add the extension attribute and mapping.
124124
5. Under **Manage attributes** select **click to edit mappings**.
125125
6. Click **Add attribute mapping**. The attributes will automatically be discovered.
126-
7. The new attributes will be available in the drop-down under **source attribute**.
126+
7. The new attributes will be available in the drop-down under **source attribute**.
127127
8. Fill in the type of mapping you want and click **Apply**.
128128
[![Custom attribute mapping](media/user-provisioning-sync-attributes-for-mapping/schema-1.png)](media/user-provisioning-sync-attributes-for-mapping/schema-1.png#lightbox)
129129

@@ -142,11 +142,11 @@ If users who will access the applications originate in on-premises Active Direct
142142
1. Open the Azure AD Connect wizard, choose Tasks, and then choose **Customize synchronization options**.
143143

144144
![Azure Active Directory Connect wizard Additional tasks page](./media/user-provisioning-sync-attributes-for-mapping/active-directory-connect-customize.png)
145-
146-
2. Sign in as an Azure AD Global Administrator.
145+
146+
2. Sign in as an Azure AD Global Administrator.
147147

148148
3. On the **Optional Features** page, select **Directory extension attribute sync**.
149-
149+
150150
![Azure Active Directory Connect wizard Optional features page](./media/user-provisioning-sync-attributes-for-mapping/active-directory-connect-directory-extension-attribute-sync.png)
151151

152152
4. Select the attribute(s) you want to extend to Azure AD.
@@ -156,13 +156,13 @@ If users who will access the applications originate in on-premises Active Direct
156156
![Screenshot that shows the "Directory extensions" selection page](./media/user-provisioning-sync-attributes-for-mapping/active-directory-connect-directory-extensions.png)
157157

158158
5. Finish the Azure AD Connect wizard and allow a full synchronization cycle to run. When the cycle is complete, the schema is extended and the new values are synchronized between your on-premises AD and Azure AD.
159-
159+
160160
6. In the Azure portal, while you’re [editing user attribute mappings](customize-application-attributes.md), the **Source attribute** list will now contain the added attribute in the format `<attributename> (extension_<appID>_<attributename>)`, where appID is the identifier of a placeholder application in your tenant. Select the attribute and map it to the target application for provisioning.
161161

162162
![Azure Active Directory Connect wizard Directory extensions selection page](./media/user-provisioning-sync-attributes-for-mapping/attribute-mapping-extensions.png)
163163

164164
> [!NOTE]
165-
> The ability to provision reference attributes from on-premises AD, such as **managedby** or **DN/DistinguishedName**, is not supported today. You can request this feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789).
165+
> The ability to provision reference attributes from on-premises AD, such as **managedby** or **DN/DistinguishedName**, is not supported today. You can request this feature on [User Voice](https://feedback.azure.com/d365community/forum/22920db1-ad25-ec11-b6e6-000d3a4f0789).
166166
167167

168168
## Next steps

articles/active-directory/enterprise-users/groups-settings-v2-cmdlets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -270,7 +270,7 @@ To disable group creation for non-admin users:
270270

271271
2. If it returns `UsersPermissionToCreateGroupsEnabled : True`, then non-admin users can create groups. To disable this feature:
272272

273-
```powershell
273+
```powershell
274274
Set-MsolCompanySettings -UsersPermissionToCreateGroupsEnabled $False
275275
```
276276

articles/active-directory/external-identities/allow-deny-list.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,12 +104,12 @@ If the module is not installed, or you don't have a required version, do one of
104104

105105
- If no results are returned, run the following command to install the latest version of the AzureADPreview module:
106106

107-
```powershell
107+
```powershell
108108
Install-Module AzureADPreview
109109
```
110110
- If only the AzureAD module is shown in the results, run the following commands to install the AzureADPreview module:
111111

112-
```powershell
112+
```powershell
113113
Uninstall-Module AzureAD
114114
Install-Module AzureADPreview
115115
```

articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-sign-out.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ After installing the NuGet packages and adding necessary code for authentication
5858

5959
1. Next, add a reference to `_LoginPartial` in the *Layout.cshtml* file, which is located in the same folder. It's recommended to place this after the `navbar-collapse` class as shown in the following snippet:
6060

61-
```html
61+
```html
6262
<div class="navbar-collapse collapse d-sm-inline-flex flex-sm-row-reverse">
6363
<partial name="_LoginPartial" />
6464
</div>

articles/active-directory/external-identities/customers/tutorial-single-page-app-react-sign-in-prepare-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ All parts of the app that require authentication must be wrapped in the [`MsalPr
195195
root.render(
196196
<App instance={msalInstance}/>
197197
);
198-
```
198+
```
199199
200200
## Next steps
201201

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ In the example, the resource enterprise application is Microsoft Graph of object
184184

185185
1. Grant the delegated permissions to the client enterprise application by running the following request.
186186

187-
```http
187+
```http
188188
POST https://graph.microsoft.com/v1.0/oauth2PermissionGrants
189189
190190
Request body

articles/active-directory/manage-apps/grant-consent-single-user.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ In the example, the resource enterprise application is Microsoft Graph of object
138138

139139
1. Grant the delegated permissions to the client enterprise application on behalf of the user by running the following request.
140140

141-
```http
141+
```http
142142
POST https://graph.microsoft.com/v1.0/oauth2PermissionGrants
143143
144144
Request body

0 commit comments

Comments
 (0)