Skip to content

Commit 2f87082

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into virtual-networks-overview-and-faq
2 parents 018d30e + 6da5213 commit 2f87082

File tree

341 files changed

+4763
-2400
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

341 files changed

+4763
-2400
lines changed

.openpublishing.redirection.sentinel.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,36 @@
179179
"source_path": "articles/sentinel/store-logs-in-azure-data-explorer.md",
180180
"redirect_url": "/azure/azure-monitor/logs/data-retention-archive",
181181
"redirect_document_id": true
182+
},
183+
{
184+
"source_path": "articles/sentinel/data-connectors/box-using-azure-function.md",
185+
"redirect_url": "/azure/sentinel/data-connectors/box-using-azure-functions",
186+
"redirect_document_id": true
187+
},
188+
{
189+
"source_path": "articles/sentinel/data-connectors/office-365.md",
190+
"redirect_url": "/azure/sentinel/data-connectors/microsoft-365",
191+
"redirect_document_id": true
192+
},
193+
{
194+
"source_path": "articles/sentinel/data-connectors/sophos-endpoint-protection-using-azure-function.md",
195+
"redirect_url": "/azure/sentinel/data-connectors/sophos-endpoint-protection-using-azure-functions",
196+
"redirect_document_id": true
197+
},
198+
{
199+
"source_path": "articles/sentinel/data-connectors/palo-alto-prisma-cloud-cspm-using-azure-function.md",
200+
"redirect_url": "/azure/sentinel/data-connectors/palo-alto-prisma-cloud-cspm-using-azure-functions",
201+
"redirect_document_id": true
202+
},
203+
{
204+
"source_path": "articles/sentinel/data-connectors/proofpoint-tap-using-azure-function.md",
205+
"redirect_url": "/azure/sentinel/data-connectors/proofpoint-tap-using-azure-functions",
206+
"redirect_document_id": true
207+
},
208+
{
209+
"source_path": "articles/sentinel/data-connectors/rubrik-security-cloud-data-connector-using-azure-function.md",
210+
"redirect_url": "/azure/sentinel/data-connectors/rubrik-security-cloud-data-connector-using-azure-functions",
211+
"redirect_document_id": true
182212
}
183213
]
184214
}

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,7 @@ The following providers offer FIDO2 security keys of different form factors that
122122
| [Feitian](https://shop.ftsafe.us/pages/microsoft) | ![y] | ![y]| ![y]| ![y]| ![y] |
123123
| [Fortinet](https://www.fortinet.com/) | ![n] | ![y]| ![n]| ![n]| ![n] |
124124
| [Giesecke + Devrient (G+D)](https://www.gi-de.com/en/identities/enterprise-security/hardware-based-authentication) | ![y] | ![y]| ![y]| ![y]| ![n] |
125+
| [Google](https://store.google.com/us/product/titan_security_key) | ![n] | ![y]| ![y]| ![n]| ![n] |
125126
| [GoTrustID Inc.](https://www.gotrustid.com/idem-key) | ![n] | ![y]| ![y]| ![y]| ![n] |
126127
| [HID](https://www.hidglobal.com/products/crescendo-key) | ![n] | ![y]| ![y]| ![n]| ![n] |
127128
| [HIDEEZ](https://hideez.com/products/hideez-key-4) | ![n] | ![y]| ![y]| ![y]| ![n] |
@@ -135,6 +136,7 @@ The following providers offer FIDO2 security keys of different form factors that
135136
| [Nymi](https://www.nymi.com/nymi-band) | ![y] | ![n]| ![y]| ![n]| ![n] |
136137
| [Octatco](https://octatco.com/) | ![y] | ![y]| ![n]| ![n]| ![n] |
137138
| [OneSpan Inc.](https://www.onespan.com/products/fido) | ![n] | ![y]| ![n]| ![y]| ![n] |
139+
| [PONE Biometrics](https://ponebiometrics.com/) | ![n] | ![n]| ![n]| ![y]| ![n] |
138140
| [Precision Biometric](https://www.innait.com/product/fido/) | ![n] | ![y]| ![n]| ![n]| ![n] |
139141
| [RSA](https://www.rsa.com/products/securid/) | ![n] | ![y]| ![n]| ![n]| ![n] |
140142
| [Sentry](https://sentryenterprises.com/) | ![n] | ![n]| ![y]| ![n]| ![n] |

articles/active-directory/authentication/concept-fido2-hardware-vendor.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ The following table lists partners who are Microsoft-compatible FIDO2 security k
4343
| [Feitian](https://shop.ftsafe.us/pages/microsoft) | ![y] | ![y]| ![y]| ![y]| ![y] |
4444
| [Fortinet](https://www.fortinet.com/) | ![n] | ![y]| ![n]| ![n]| ![n] |
4545
| [Giesecke + Devrient (G+D)](https://www.gi-de.com/en/identities/enterprise-security/hardware-based-authentication) | ![y] | ![y]| ![y]| ![y]| ![n] |
46+
| [Google](https://store.google.com/us/product/titan_security_key) | ![n] | ![y]| ![y]| ![n]| ![n] |
4647
| [GoTrustID Inc.](https://www.gotrustid.com/idem-key) | ![n] | ![y]| ![y]| ![y]| ![n] |
4748
| [HID](https://www.hidglobal.com/products/crescendo-key) | ![n] | ![y]| ![y]| ![n]| ![n] |
4849
| [HIDEEZ](https://hideez.com/products/hideez-key-4) | ![n] | ![y]| ![y]| ![y]| ![n] |
@@ -56,6 +57,7 @@ The following table lists partners who are Microsoft-compatible FIDO2 security k
5657
| [Nymi](https://www.nymi.com/nymi-band) | ![y] | ![n]| ![y]| ![n]| ![n] |
5758
| [Octatco](https://octatco.com/) | ![y] | ![y]| ![n]| ![n]| ![n] |
5859
| [OneSpan Inc.](https://www.onespan.com/products/fido) | ![n] | ![y]| ![n]| ![y]| ![n] |
60+
| [PONE Biometrics](https://ponebiometrics.com/) | ![n] | ![n]| ![n]| ![y]| ![n] |
5961
| [Precision Biometric](https://www.innait.com/product/fido/) | ![n] | ![y]| ![n]| ![n]| ![n] |
6062
| [RSA](https://www.rsa.com/products/securid/) | ![n] | ![y]| ![n]| ![n]| ![n] |
6163
| [Sentry](https://sentryenterprises.com/) | ![n] | ![n]| ![y]| ![n]| ![n] |

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Create a risk-based Conditional Access policy that applies to service principals
7373
1. Set the **Configure** toggle to **Yes**.
7474
1. Select the levels of risk where you want this policy to trigger.
7575
1. Select **Done**.
76-
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
76+
1. Under **Grant**, **Block access** is the only available option. Access is blocked when the specified risk levels are seen.
7777
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
7878
1. Select **Create** to complete your policy.
7979

articles/active-directory/develop/howto-call-a-web-api-with-postman.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ zone_pivot_groups: web-api-howto-prereq
1818

1919
::: zone pivot="no-api"
2020

21-
This article shows you how to call a protected ASP.NET Core web API using [Postman](https://www.postman.com/). Postman is an application that lets you send HTTP requests to a web API to test its authorization and access control (authentication) policies. In this article, you'll register a web app and a web API in a tenant on the Azure portal. The web app is used to get an access token generated by the Microsoft identity platform. Next, you'll use the token to make an authorized call to the web API using Postman.
21+
This article shows you how to call a protected ASP.NET Core web API using [Postman](https://www.postman.com/). Postman is an application that lets you send HTTP requests to a web API to test its authorization and access control (authentication) policies. In this article, you'll register a web app and a web API in a tenant. The web app is used to get an access token generated by the Microsoft identity platform. Next, you'll use the token to make an authorized call to the web API using Postman.
2222

2323
::: zone-end
2424

@@ -69,10 +69,10 @@ The Microsoft identity platform requires your application to be registered befor
6969

7070
Follow these steps to create the web API registration:
7171

72-
1. Sign in to the [Azure portal](https://portal.azure.com).
72+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
7373
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
74-
1. Search for and select **Azure Active Directory**.
75-
1. Under **Manage**, select **App registrations > New registration**.
74+
1. Browse to **Identity** > **Applications** > **Application registrations**.
75+
1. Select **New registration**.
7676
1. Enter a **Name** for the application, such as _NewWebAPI1_.
7777
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select **Help me choose** option.
7878
1. Select **Register**.
@@ -116,8 +116,8 @@ Follow these steps to create the web app registration:
116116

117117
::: zone pivot="no-api"
118118

119-
1. Select **Home** to return to the home page. Search for and select **Azure Active Directory**.
120-
1. Under **Manage**, select **App registrations** > **New registration**.
119+
Select **Home** to return to the home page. Browse to **Identity** > **Applications** > **Application registrations**.
120+
1. Select **New registration**.
121121
1. Enter a **Name** for the application, such as `web-app-calls-web-api`.
122122
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
123123
1. Under **Redirect URI (optional)**, select **Web**, and then enter `http://localhost` in the URL text box.
@@ -127,26 +127,26 @@ Follow these steps to create the web app registration:
127127

128128
::: zone pivot="api"
129129

130-
1. Sign in to the [Azure portal](https://portal.azure.com).
131-
1. If access to multiple tenants is available, use the Directories + subscriptions filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
132-
1. Search for and select **Azure Active Directory**.
133-
1. Under **Manage**, select **App registrations** > **New registration**.
130+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
131+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
132+
1. Browse to **Identity** > **Applications** > **Application registrations**.
133+
1. Select **New registration**.
134134
1. Enter a Name for the application, such as `web-app-calls-web-api`.
135135
1. For **Supported account types**, select **Accounts in this organizational directory only**. For information on different account types, select the **Help me choose** option.
136136
1. Under **Redirect URI (optional)**, select **Web**, and then enter `http://localhost` in the URL text box.
137137
1. Select **Register**.
138138

139139
::: zone-end
140140

141-
When registration is complete, the Azure portal displays the app registration's **Overview** pane. Record the **Directory (tenant) ID** and the **Application (client) ID** to be used in later steps.
141+
The application's **Overview** pane is displayed when registration is complete. Record the **Directory (tenant) ID** and the **Application (client) ID** to be used in later steps.
142142

143143
#### Add a client secret
144144

145145
A client secret is a string value your app can use to identity itself, and is sometimes referred to as an _application password_. The web app uses the client secret to prove its identity when it requests tokens.
146146

147147
Follow these steps to configure a client secret:
148148

149-
1. From the **Overview** pane in the Azure portal, under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
149+
1. From the **Overview** pane, under **Manage**, select **Certificates & secrets** > **Client secrets** > **New client secret**.
150150
1. Add a description for your client secret, for example _My client secret_.
151151
1. Select an expiration for the secret or specify a custom lifetime.
152152

@@ -162,14 +162,14 @@ By specifying a web API's scopes, the web app can obtain an access token contain
162162

163163
Follow these steps to configure client's permissions to the web API:
164164

165-
1. From the **Overview** pane of your application in the Azure portal, under **Manage**, select **API permissions** > **Add a permission** > **My APIs**.
165+
1. From the **Overview** pane of your application, under **Manage**, select **API permissions** > **Add a permission** > **My APIs**.
166166
1. Select **NewWebAPI1** or the API that you wish to add permissions to.
167167
1. Under **Select permissions**, check the box next to **Forecast.Read**. You may need to expand the **Permission** list. This selects the permissions the client app should have on behalf of the signed-in user.
168168
1. Select **Add permissions** to complete the process.
169169

170170
After adding these permissions to your API, you should see the selected permissions under **Configured permissions**.
171171

172-
You may also notice the **User.Read** permission for the Microsoft Graph API. This permission is added automatically when you register an app in the Azure portal.
172+
You may also notice the **User.Read** permission for the Microsoft Graph API. This permission is added automatically when you register an app.
173173

174174
::: zone pivot="no-api"
175175

@@ -183,8 +183,8 @@ You may also notice the **User.Read** permission for the Microsoft Graph API. Th
183183

184184
1. Navigate to `ms-identity-docs-code-dotnet/web-api` folder and open `appsettings.json`, replace the `{APPLICATION_CLIENT_ID}` and `{DIRECTORY_TENANT_ID}` with:
185185

186-
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane **App registrations** in the Azure portal.
187-
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane **App registrations** in the Azure portal.
186+
- `{APPLICATION_CLIENT_ID}` is the web API **Application (client) ID** on the app's **Overview** pane **App registrations**.
187+
- `{DIRECTORY_TENANT_ID}` is the web API **Directory (tenant) ID** on the app's **Overview** pane **App registrations**.
188188

189189
1. Execute the following command to start the app:
190190

articles/active-directory/develop/howto-configure-app-instance-property-locks.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,19 +34,19 @@ The following property usage scenarios are considered as sensitive:
3434

3535
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3636

37-
To configure an app instance lock using the Azure portal:
37+
To configure an app instance lock:
3838

39-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
40-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration you want to configure.
41-
1. Search for and select **Azure Active Directory**.
42-
1. Under **Manage**, select **App registrations**, and then select the application you want to configure.
39+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
40+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
41+
1. Browse to **Identity** > **Applications** > **Application registrations**.
42+
1. Select the application you want to configure.
4343
1. Select **Authentication**, and then select **Configure** under the *App instance property lock* section.
4444

45-
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-overview.png" alt-text="Screenshot of an app registration's app instance lock in the Azure portal.":::
45+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-overview.png" alt-text="Screenshot of an app registration's app instance lock.":::
4646

4747
2. In the **App instance property lock** pane, enter the settings for the lock. The table following the image describes each setting and their parameters.
4848

49-
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-properties.png" alt-text="Screenshot of an app registration's app instance property lock context pane in the Azure portal.":::
49+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-properties.png" alt-text="Screenshot of an app registration's app instance property lock context pane.":::
5050

5151
| Field | Description |
5252
| ---------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |

articles/active-directory/develop/msal-android-single-sign-on.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ In this how-to, you'll learn how to configure the SDKs used by your application
2727

2828
This how-to assumes you know how to:
2929

30-
- Provision your app using the Azure portal. For more information, see the instructions for creating an app in [the Android tutorial](./tutorial-v2-android.md#create-a-project)
30+
- Provision your app. For more information, see the instructions for creating an app in [the Android tutorial](./tutorial-v2-android.md#create-a-project)
3131
- Integrate your application with the [MSAL for Android](https://github.com/AzureAD/microsoft-authentication-library-for-android)
3232

3333
## Methods for SSO
@@ -98,7 +98,7 @@ You must register a redirect URI that is compatible with the broker. The redirec
9898

9999
The format of the redirect URI is: `msauth://<yourpackagename>/<base64urlencodedsignature>`
100100

101-
You can use [keytool](https://manpages.debian.org/buster/openjdk-11-jre-headless/keytool.1.en.html) to generate a Base64-encoded signature hash using your app's signing keys, and then use the Azure portal to generate your redirect URI using that hash.
101+
You can use [keytool](https://manpages.debian.org/buster/openjdk-11-jre-headless/keytool.1.en.html) to generate a Base64-encoded signature hash using your app's signing keys, and then generate your redirect URI using that hash.
102102

103103
Linux and macOS:
104104

@@ -114,16 +114,14 @@ keytool -exportcert -alias androiddebugkey -keystore %HOMEPATH%\.android\debug.k
114114

115115
Once you've generated a signature hash with _keytool_, use the Azure portal to generate the redirect URI:
116116

117-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
118-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="/azure/active-directory/develop/media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you registered your application.
119-
1. Search for and select **Azure Active Directory**.
120-
1. Under **Manage**, select **App registrations**.
121-
1. Under **Manage**, select **App registrations**, then select your application.
122-
1. Under **Manage**, select **Authentication** > **Add a platform** > **Android**.
117+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
118+
1. If access to multiple tenants is available, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which you want to register the application.
119+
1. Browse to **Identity** > **Applications** > **Application registrations**.
120+
1. Select your application, and then select **Authentication** > **Add a platform** > **Android**.
123121
1. In the **Configure your Android app** pane that opens, enter the **Signature hash** that you generated earlier and a **Package name**.
124122
1. Select the **Configure** button.
125123

126-
The Azure portal generates the redirect URI for you and displays it in the **Android configuration** pane's **Redirect URI** field.
124+
The redirect URI is generated for you and is displayed in the **Android configuration** pane's **Redirect URI** field.
127125

128126
For more information about signing your app, see [Sign your app](https://developer.android.com/studio/publish/app-signing) in the Android Studio User Guide.
129127

0 commit comments

Comments
 (0)