Skip to content

Commit 2df9a2c

Browse files
committed
fixing merge conflict
2 parents f756c9b + 3d5923e commit 2df9a2c

File tree

195 files changed

+2673
-1728
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

195 files changed

+2673
-1728
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -541,6 +541,14 @@
541541
"source_path_from_root": "/articles/healthcare-apis/iot/iot-metrics-diagnostics-export.md",
542542
"redirect_url": "/azure/healthcare-apis/iot/how-to-enable-diagnostic-settings",
543543
"redirect_document_id": false
544-
}
544+
},
545+
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
546+
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
547+
"redirect_document_id": false
548+
},
549+
{ "source_path_from_root": "/articles/healthcare-apis/events/events-export-logs-metrics.md",
550+
"redirect_url": "/azure/healthcare-apis/events/events-enable-diagnostic-settings",
551+
"redirect_document_id": false
552+
}
545553
]
546554
}

articles/active-directory-b2c/force-password-reset.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,10 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 08/04/2022
12+
ms.date: 10/06/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
15+
ms.custom: b2c-support
1516
zone_pivot_groups: b2c-policy-type
1617
---
1718

@@ -132,6 +133,9 @@ Content-type: application/json
132133

133134
If you disabled the strong [password complexity](password-complexity.md), update the password policy to [DisableStrongPassword](user-profile-attributes.md#password-policy-attribute):
134135

136+
> [!NOTE]
137+
> After the user resets their password, the passwordPolicies will be changed back to DisablePasswordExpiration
138+
135139
```http
136140
PATCH https://graph.microsoft.com/v1.0/users/<user-object-ID>
137141
Content-type: application/json

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The set of optional claims available by default for applications to use are list
5353
| `fwd` | IP address.| JWT | | Adds the original IPv4 address of the requesting client (when inside a VNET) |
5454
| `groups`| Optional formatting for group claims |JWT, SAML| |For details see [Group claims](#configuring-groups-optional-claims) below. For more information about group claims, see [How to configure group claims](../hybrid/how-to-connect-fed-group-claims.md). Used with the GroupMembershipClaims setting in the [application manifest](reference-app-manifest.md), which must be set as well.
5555
| `idtyp` | Token type | JWT access tokens | Special: only in app-only access tokens | Value is `app` when the token is an app-only token. This claim is the most accurate way for an API to determine if a token is an app token or an app+user token.|
56-
| `login_hint` | Login hint | JWT | MSA, Azure AD | An opaque, reliable login hint claim. This claim is the best value to use for the `login_hint` OAuth parameter in all flows to get SSO. It can be passed between applications to help them silently SSO as well - application A can sign in a user, read the `login_hint` claim, and then send the claim and the current tenant context to application B in the query string or fragment when the user selects on a link that takes them to application B. To avoid race conditions and reliability issues, the `login_hint` claim *doesn't* include the current tenant for the user, and defaults to the user's home tenant when used. If you're operating in a guest scenario where the user is from another tenant, you must provide a tenant identifier in the sign-in request, and pass the same to apps you partner with. This claim is intended for use with your SDK's existing `login_hint` functionality, however that it exposed. |
56+
| `login_hint` | Login hint | JWT | MSA, Azure AD | An opaque, reliable login hint claim that's base64 encoded. Do not modify this value. This claim is the best value to use for the `login_hint` OAuth parameter in all flows to get SSO. It can be passed between applications to help them silently SSO as well - application A can sign in a user, read the `login_hint` claim, and then send the claim and the current tenant context to application B in the query string or fragment when the user selects on a link that takes them to application B. To avoid race conditions and reliability issues, the `login_hint` claim *doesn't* include the current tenant for the user, and defaults to the user's home tenant when used. If you're operating in a guest scenario where the user is from another tenant, you must provide a tenant identifier in the sign-in request, and pass the same to apps you partner with. This claim is intended for use with your SDK's existing `login_hint` functionality, however that it exposed. |
5757
| `sid` | Session ID, used for per-session user sign-out. | JWT | Personal and Azure AD accounts. | |
5858
| `tenant_ctry` | Resource tenant's country/region | JWT | | Same as `ctry` except set at a tenant level by an admin. Must also be a standard two-letter value. |
5959
| `tenant_region_scope` | Region of the resource tenant | JWT | | |

articles/active-directory/governance/how-to-lifecycle-workflow-sync-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ The following table shows the scheduling (trigger) relevant attributes and the m
2323
|Attribute|Type|Supported in HR Inbound Provisioning|Support in Azure AD Connect Cloud Sync|Support in Azure AD Connect Sync|
2424
|-----|-----|-----|-----|-----|
2525
|employeeHireDate|DateTimeOffset|Yes|Yes|Yes|
26-
|employeeLeaveDateTime|DateTimeOffset|Yes|Not currently|Not currently|
26+
|employeeLeaveDateTime|DateTimeOffset|Yes|Yes|Not currently|
2727

2828
> [!NOTE]
29-
> To take advantaged of leaver scenarios, you can set the employeeLeaveDateTime manually for cloud-only users. For more information, see: [Configure the employeeLeaveDateTime property for a user](/graph/tutorial-lifecycle-workflows-set-employeeleavedatetime)
29+
> Manually setting the employeeLeaveDateTime for cloud-only users requires special permissions. For more information, see: [Configure the employeeLeaveDateTime property for a user](/graph/tutorial-lifecycle-workflows-set-employeeleavedatetime)
3030
3131
This document explains how to set up synchronization from on-premises Azure AD Connect cloud sync and Azure AD Connect for the required attributes.
3232

articles/active-directory/governance/lifecycle-workflow-tasks.md

Lines changed: 1 addition & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -74,10 +74,10 @@ For Microsoft Graph the parameters for the **Send welcome email to new hire** ta
7474
```Example for usage within the workflow
7575
{
7676
"category": "joiner",
77+
"continueOnError": true,
7778
"description": "Send welcome email to new hire",
7879
"displayName": "Send Welcome Email",
7980
"isEnabled": true,
80-
"continueOnError": true,
8181
"taskDefinitionId": "70b29d51-b59a-4773-9280-8841dfd3f2ea",
8282
"arguments": []
8383
}
@@ -344,7 +344,6 @@ For Microsoft Graph the parameters for the **Remove user from selected groups**
344344
```Example for usage within the workflow
345345
{
346346
"category": "leaver",
347-
"continueOnError": true,
348347
"displayName": "Remove user from selected groups",
349348
"description": "Remove user from membership of selected Azure AD groups",
350349
"isEnabled": true,
@@ -388,7 +387,6 @@ For Microsoft Graph the parameters for the **Remove users from all groups** task
388387
"displayName": "Remove user from all groups",
389388
"description": "Remove user from all Azure AD groups memberships",
390389
"isEnabled": true,
391-
"continueOnError": true,
392390
"taskDefinitionId": "b3a31406-2a15-4c9a-b25b-a658fa5f07fc",
393391
"arguments": []
394392
}
@@ -418,7 +416,6 @@ For Microsoft Graph the parameters for the **Remove User from Teams** task are a
418416
"displayName": "Remove user from selected Teams",
419417
"description": "Remove user from membership of selected Teams",
420418
"isEnabled": true,
421-
"continueOnError": true,
422419
"taskDefinitionId": "06aa7acb-01af-4824-8899-b14e5ed788d6",
423420
"arguments": [
424421
{
@@ -453,7 +450,6 @@ For Microsoft Graph the parameters for the **Remove users from all teams** task
453450
"description": "Remove user from all Teams",
454451
"displayName": "Remove user from all Teams memberships",
455452
"isEnabled": true,
456-
"continueOnError": true,
457453
"taskDefinitionId": "81f7b200-2816-4b3b-8c5d-dc556f07b024",
458454
"arguments": []
459455
}
@@ -485,7 +481,6 @@ For Microsoft Graph the parameters for the **Remove all license assignment from
485481
"displayName": "Remove all licenses for user",
486482
"description": "Remove all licenses assigned to the user",
487483
"isEnabled": true,
488-
"continueOnError": true,
489484
"taskDefinitionId": "8fa97d28-3e52-4985-b3a9-a1126f9b8b4e",
490485
"arguments": []
491486
}
@@ -516,7 +511,6 @@ For Microsoft Graph the parameters for the **Delete User** task are as follows:
516511
"displayName": "Delete user account",
517512
"description": "Delete user account in Azure AD",
518513
"isEnabled": true,
519-
"continueOnError": true,
520514
"taskDefinitionId": "8d18588d-9ad3-4c0f-99d0-ec215f0e3dff",
521515
"arguments": []
522516
}
@@ -550,7 +544,6 @@ For Microsoft Graph the parameters for the **Send email before user last day** t
550544
"displayName": "Send email before user’s last day",
551545
"description": "Send offboarding email to user’s manager before the last day of work",
552546
"isEnabled": true,
553-
"continueOnError": true,
554547
"taskDefinitionId": "52853a3e-f4e5-4eb8-bb24-1ac09a1da935",
555548
"arguments": []
556549
}
@@ -583,7 +576,6 @@ For Microsoft Graph the parameters for the **Send email on user last day** task
583576
"displayName": "Send email on user’s last day",
584577
"description": "Send offboarding email to user’s manager on the last day of work",
585578
"isEnabled": true,
586-
"continueOnError": true,
587579
"taskDefinitionId": "9c0a1eaf-5bda-4392-9d9e-6e155bb57411",
588580
"arguments": []
589581
}
@@ -617,7 +609,6 @@ For Microsoft Graph the parameters for the **Send offboarding email to users man
617609
"displayName": "Send offboarding email to user’s manager after the last day of work",
618610
"description": "Send email after user’s last day",
619611
"isEnabled": true,
620-
"continueOnError": true,
621612
"taskDefinitionId": "6f22ddd4-b3a5-47a4-a846-0d7c201a49ce",
622613
"arguments": []
623614
}

articles/active-directory/hybrid/how-to-connect-fed-o365-certs.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,9 @@ Update Microsoft 365 with the new token signing certificates to be used for the
174174
> [!NOTE]
175175
> If you need to support multiple top-level domains, such as contoso.com and fabrikam.com, you must use the **SupportMultipleDomain** switch with any cmdlets. For more information, see [Support for Multiple Top Level Domains](how-to-connect-install-multiple-domains.md).
176176
>
177-
177+
> If your tenant is federated with more than one domain, the Update-MsolFederatedDomain needs to be run for all the domains, listed in the output from `Get-MsolDomain -Authentication Federated`. This will ensure that all of the federated domains are updated to the Token-Signing certificate.
178+
>You can achieve this by running:
179+
>`Get-MsolDomain -Authentication Federated | % { Update-MsolFederatedDomain -DomainName $_.Name -SupportMultipleDomain }`
178180
179181
## Repair Azure AD trust by using Azure AD Connect <a name="connectrenew"></a>
180182
If you configured your AD FS farm and Azure AD trust by using Azure AD Connect, you can use Azure AD Connect to detect if you need to take any action for your token signing certificates. If you need to renew the certificates, you can use Azure AD Connect to do so.
3.94 KB
Loading
42.9 KB
Loading

0 commit comments

Comments
 (0)