Skip to content

Commit 2f0035c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-work
2 parents 85aa48a + 999fb76 commit 2f0035c

File tree

97 files changed

+1542
-1216
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+1542
-1216
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5938,6 +5938,11 @@
59385938
"redirect_url": "/azure/azure-app-configuration/policy-reference",
59395939
"redirect_document_id": false
59405940
},
5941+
{
5942+
"source_path_from_root": "/articles/azure-functions/functions-test-a-function.md",
5943+
"redirect_url": "/azure/azure-functions/supported-languages",
5944+
"redirect_document_id": false
5945+
},
59415946
{
59425947
"source_path_from_root": "/articles/azure-app-configuration/quickstart-azure-function-csharp.md",
59435948
"redirect_url": "/azure/azure-app-configuration/quickstart-azure-functions-csharp",

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Let's cover each step:
4949

5050
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
5151

52-
1. After the user clicks the link, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](/azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us). For the correct endpoint for other environments, see the specific Microsoft cloud docs.
52+
1. After the user clicks the link, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](/azure/azure-government/compare-azure-government-global-azure#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us). For the correct endpoint for other environments, see the specific Microsoft cloud docs.
5353

5454
The endpoint performs mutual authentication and requests the client certificate as part of the TLS handshake. You will see an entry for this request in the Sign-in logs. There is a [known issue](#known-issues) where User ID is displayed instead of Username.
5555

@@ -236,4 +236,3 @@ For the next test scenario, configure the authentication policy where the Issuer
236236
- [How to configure Azure AD CBA](how-to-certificate-based-authentication.md)
237237
- [FAQ](certificate-based-authentication-faq.yml)
238238
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
239-

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable passwordless security key sign-in to on-premises resources by using Azure AD
1919

20-
This document discusses how to enable passwordless authentication to on-premises resources for environments with both *Azure Active Directory (Azure AD)-joined* and *hybrid Azure AD-joined* Windows 10 devices. This passwordless authentication functionality provides seamless single sign-on (SSO) to on-premises resources when you use Microsoft-compatible security keys, or with [Windows Hello for Business Cloud trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-trust.md)
20+
This document discusses how to enable passwordless authentication to on-premises resources for environments with both *Azure Active Directory (Azure AD)-joined* and *hybrid Azure AD-joined* Windows 10 devices. This passwordless authentication functionality provides seamless single sign-on (SSO) to on-premises resources when you use Microsoft-compatible security keys, or with [Windows Hello for Business Cloud trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-trust)
2121

2222
## Use SSO to sign in to on-premises resources by using FIDO2 keys
2323

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-howto-view-role-policy.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
3232
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Role/Policies** subtab.
3333

3434
The **Role/Policies list** displays a list of existing roles/policies and the following information about each role/policy
35-
- **Role/Policy name**: The name of the roles/policies available to you.
36-
- **Role/Policy type**: **Custom**, **System**, or **CloudKnox only**
35+
- **Role/Policy Name**: The name of the roles/policies available to you.
36+
- **Role/Policy Type**: **Custom**, **System**, or **CloudKnox Only**
3737
- **Actions**: The type of action you can perform on the role/policy, **Clone**, **Modify**, or **Delete**
3838

3939

@@ -42,24 +42,24 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
4242
The **Tasks** list appears, displaying:
4343
- A list of **Tasks**.
4444
- **For AWS:**
45-
- The **Users**, **Groups**, and **Roles** the task is **Directly assigned to**.
46-
- The **Group members** and **Role identities** the task is **Indirectly assessable by**.
45+
- The **Users**, **Groups**, and **Roles** the task is **Directly Assigned To**.
46+
- The **Group Members** and **Role Identities** the task is **Indirectly Accessible By**.
4747

4848
- **For Azure:**
49-
- The **Users**, **Groups**, **Enterprise applications** and **Managed identities** the task is **Directly assigned to**.
50-
- The **Group members** the task is **Indirectly assessable by**.
49+
- The **Users**, **Groups**, **Enterprise Applications** and **Managed Identities** the task is **Directly Assigned To**.
50+
- The **Group Members** the task is **Indirectly Accessible By**.
5151

5252
- **For GCP:**
53-
- The **Users**, **Groups**, and **Service accounts** the task is **Directly assigned to**.
54-
- The **Group members** the task is **Indirectly assessable by**.
53+
- The **Users**, **Groups**, and **Service Accounts** the task is **Directly Assigned To**.
54+
- The **Group Members** the task is **Indirectly Accessible By**.
5555

5656
1. To close the role/policy details, select the arrow to the left of the role/policy name.
5757

5858
## Export information about roles/policies
5959

6060
- **Export CSV**: Select this option to export the displayed list of roles/policies as a comma-separated values (CSV) file.
6161

62-
When the file is successfully exported, a message appears: **Exported successfully.**
62+
When the file is successfully exported, a message appears: **Exported Successfully.**
6363

6464
- Check your email for a message from the CloudKnox Customer Success Team. This email contains a link to:
6565
- The **Role Policy Details** report in CSV format.
@@ -73,20 +73,20 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
7373
1. On the CloudKnox home page, select the **Remediation** dashboard, and then select the **Role/Policies** tab.
7474
1. To filter the roles/policies, select from the following options:
7575

76-
- **Authorization system type**: Select **AWS**, **Azure**, or **GCP**.
77-
- **Authorization system**: Select the accounts you want.
78-
- **Role/Policy type**: Select from the following options:
76+
- **Authorization System Type**: Select **AWS**, **Azure**, or **GCP**.
77+
- **Authorization System**: Select the accounts you want.
78+
- **Role/Policy Type**: Select from the following options:
7979

8080
- **All**: All managed roles/policies.
8181
- **Custom**: A customer-managed role/policy.
8282
- **System**: A cloud service provider-managed role/policy.
83-
- **CloudKnox only**: A role/policy created by CloudKnox.
83+
- **CloudKnox Only**: A role/policy created by CloudKnox.
8484

85-
- **Role/Policy status**: Select **All**, **Assigned**, or **Unassigned**.
86-
- **Role/Policy usage**: Select **All** or **Unused**.
85+
- **Role/Policy Status**: Select **All**, **Assigned**, or **Unassigned**.
86+
- **Role/Policy Usage**: Select **All** or **Unused**.
8787
1. Select **Apply**.
8888

89-
To discard your changes, select **Reset filter**.
89+
To discard your changes, select **Reset Filter**.
9090

9191

9292
## Next steps

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-onboard-enable-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To view a video on how to enable CloudKnox in your Azure AD tenant, select
6666

6767
1. Copy the script on the **Welcome** screen:
6868

69-
`az ad ap create --id b46c3ac5-9da6-418f-a849-0a7a10b3c6c`
69+
`az ad sp create --id b46c3ac5-9da6-418f-a849-0a07a10b3c6c`
7070

7171
1. If you have an Azure subscription, return to the Azure AD portal and select **Cloud Shell** on the navigation bar.
7272
If you don't have an Azure subscription, open a command prompt on a Windows Server.
@@ -106,4 +106,4 @@ Use the **Data Collectors** dashboard in CloudKnox to configure data collection
106106

107107
- For an overview of CloudKnox, see [What's CloudKnox Permissions Management?](cloudknox-overview.md)
108108
- For a list of frequently asked questions (FAQs) about CloudKnox, see [FAQs](cloudknox-faqs.md).
109-
- For information on how to start viewing information about your authorization system in CloudKnox, see [View key statistics and data about your authorization system](cloudknox-ui-dashboard.md).
109+
- For information on how to start viewing information about your authorization system in CloudKnox, see [View key statistics and data about your authorization system](cloudknox-ui-dashboard.md).

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-product-data-sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ You can use the **Data Collectors** dashboard in CloudKnox Permissions Managemen
7676
1. Select the ellipses **(...)** at the end of the row in the table.
7777
1. Select **Delete Configuration**.
7878

79-
The **M-CIEM Onboarding - Summary** box displays.
79+
The **CloudKnox Onboarding - Summary** box displays.
8080
1. Select **Delete**.
8181
1. Check your email for a one time password (OTP) code, and enter it in **Enter OTP**.
8282

0 commit comments

Comments
 (0)