You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/configure-user-consent.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ To control what cases users can consent to applications, choose the consent poli
27
27
28
28
***Disable user consent** - Users cannot grant permissions to applications. Users can continue to sign in to apps they had previously consented to or which are consented to by administrators on their behalf, but they will not be allowed to consent to new permissions or to new apps on their own. Only users who have been granted a directory role that includes the permission to grant consent will be able to consent to new permissions or new apps.
29
29
30
-
***Users can consent to apps from verified publishers, but only for permissions you select (preview)** - All users can only consent to apps that were published by a [verified publisher](../develop/publisher-verification-overview.md) and apps that are registered in your tenant. Users can only consent to the permissions you have classified as "Low impact".
30
+
***Users can consent to apps from verified publishers, but only for permissions you select (preview)** - All users can only consent to apps that were published by a [verified publisher](../develop/publisher-verification-overview.md) and apps that are registered in your tenant. Users can only consent to the permissions you have classified as "low impact", also referred to as "low risk". What is considered low risk for one organization, such as an app viewing a users email address, might be considered high risk for another organization. For this reason, the "low risk" permissions are set by the administrator for the tenant.
31
31
32
32
Make sure to [classify permissions](#configure-permission-classifications-preview) to select which permissions users are allowed to consent to.
33
33
@@ -51,7 +51,7 @@ To configure user consent settings through the Azure portal:
51
51
52
52
### Configure user consent settings using PowerShell
53
53
54
-
You can use the latest Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0-preview), to choose which consent policy governs user consent for applications.
54
+
You can use the latest Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0-preview&preserve-view=true), to choose which consent policy governs user consent for applications.
55
55
56
56
***Disable user consent** - To disable user consent, set the consent policies which govern user consent to be empty:
57
57
@@ -104,7 +104,7 @@ In this example, we've classified the minimum set of permission required for sin
104
104
105
105
### Classify permissions using PowerShell
106
106
107
-
You can use the latest Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
107
+
You can use the latest Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview&preserve-view=true), to classify permissions. Permission classifications are configured on the **ServicePrincipal** object of the API that publishes the permissions.
108
108
109
109
#### To read the current permission classifications for an API:
110
110
@@ -191,9 +191,9 @@ In this example, all group owners are allowed to consent to apps accessing their
191
191
192
192
### Configure group owner consent using PowerShell
193
193
194
-
You can use the Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview), to enable or disable group owners' ability to consent to applications accessing your organization's data for the groups they own.
194
+
You can use the Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview&preserve-view=true), to enable or disable group owners' ability to consent to applications accessing your organization's data for the groups they own.
195
195
196
-
1. Make sure you're using the [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview) module. This step is important if you have installed both the [AzureAD](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0) module and the [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview) module).
196
+
1. Make sure you're using the [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview&preserve-view=true) module. This step is important if you have installed both the [AzureAD](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0&preserve-view=true) module and the [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview&preserve-view=true) module).
197
197
198
198
```powershell
199
199
Remove-Module AzureAD
@@ -275,7 +275,7 @@ In this case, an audit event will also be logged with a Category of "Application
275
275
276
276
### Disable or re-enable risk-based step-up consent using PowerShell
277
277
278
-
You can use the Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview), to disable the step-up to admin consent required in cases where Microsoft detects risk or to re-enable it if it was previously disabled.
278
+
You can use the Azure AD PowerShell Preview module, [AzureADPreview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview&preserve-view=true), to disable the step-up to admin consent required in cases where Microsoft detects risk or to re-enable it if it was previously disabled.
279
279
280
280
You can do this using the same steps as shown above for [configuring group owner consent using PowerShell](#configure-group-owner-consent-using-powershell), but substituting a different settings value. There are three differences in steps:
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/ways-users-get-assigned-to-applications.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ For a user to access an application, they must first be assigned to it in some w
26
26
* An Office 365 group created in the cloud
27
27
* The [All Users](https://docs.microsoft.com/azure/active-directory/active-directory-accessmanagement-dedicated-groups) group
28
28
* An administrator enables [Self-service Application Access](https://docs.microsoft.com/azure/active-directory/active-directory-self-service-application-access) to allow a user to add an application using [My Apps](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction)**Add App** feature **without business approval**
29
-
* An administrator enables [Self-service Application Access](https://docs.microsoft.com/azure/active-directory/active-directory-self-service-application-access) to allow a user to add an application using [My Apps](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction)**Add App** feature, but only w**ith prior approval from a selected set of business approvers**
29
+
* An administrator enables [Self-service Application Access](https://docs.microsoft.com/azure/active-directory/active-directory-self-service-application-access) to allow a user to add an application using [My Apps](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction)**Add App** feature, but only **with prior approval from a selected set of business approvers**
30
30
* An administrator enables [Self-service Group Management](https://docs.microsoft.com/azure/active-directory/active-directory-accessmanagement-self-service-group-management) to allow a user to join a group that an application is assigned to **without business approval**
31
31
* An administrator enables [Self-service Group Management](https://docs.microsoft.com/azure/active-directory/active-directory-accessmanagement-self-service-group-management) to allow a user to join a group that an application is assigned to, but only **with prior approval from a selected set of business approvers**
32
32
* An administrator assigns a license to a user directly for a first party application, like [Microsoft Office 365](https://products.office.com/)
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-rest.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,8 +34,6 @@ In this article, you learn how to create, list, and delete a user-assigned manag
34
34
- If you are using Azure CLI local console, sign in to Azure using `az login` with an account that is associated with the Azure subscription you would like to deploy or retrieve user-assigned managed identity information.
35
35
- Retrieve a Bearer access token using `az account get-access-token` to perform the following user-assigned managed identity operations.
To create a user-assigned managed identity, your account needs the [Managed Identity Contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) role assignment.
For information on how to assign a user-assigned managed identity to an Azure VM/VMSS using CURL see, [Configure managed identities for Azure resources on an Azure VM using REST API calls](qs-configure-rest-vm.md#user-assigned-managed-identity) and [Configure managed identities for Azure resources on a virtual machine scale set using REST API calls](qs-configure-rest-vmss.md#user-assigned-managed-identity).
106
+
For information on how to assign a user-assigned managed identity to an Azure VM/VMSS using CURL see, [Configure managed identities for Azure resources on an Azure VM using REST API calls](qs-configure-rest-vm.md#user-assigned-managed-identity) and [Configure managed identities for Azure resources on a virtual machine scale set using REST API calls](qs-configure-rest-vmss.md#user-assigned-managed-identity).
Copy file name to clipboardExpand all lines: articles/aks/kubernetes-walkthrough-portal.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ Open Cloud Shell using the `>_` button on the top of the Azure portal.
69
69
70
70
To configure `kubectl` to connect to your Kubernetes cluster, use the [az aks get-credentials][az-aks-get-credentials] command. This command downloads credentials and configures the Kubernetes CLI to use them. The following example gets credentials for the cluster name *myAKSCluster* in the resource group named *myResourceGroup*:
71
71
72
-
```azurecli-interactive
72
+
```azurecli
73
73
az aks get-credentials --resource-group myResourceGroup --name myAKSCluster
74
74
```
75
75
@@ -242,7 +242,7 @@ To see logs for the `azure-vote-front` pod, select the **View container logs** f
242
242
243
243
When the cluster is no longer needed, delete the cluster resource, which deletes all associated resources. This operation can be completed in the Azure portal by selecting the **Delete** button on the AKS cluster dashboard. Alternatively, the [az aks delete][az-aks-delete] command can be used in the Cloud Shell:
244
244
245
-
```azurecli-interactive
245
+
```azurecli
246
246
az aks delete --resource-group myResourceGroup --name myAKSCluster --no-wait
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/concept-point-time-snapshot.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,31 +18,29 @@ Azure App Configuration maintains a record of changes made to key-values. This r
18
18
19
19
You can use Azure portal or CLI to retrieve past key-values. In Azure CLI, use `az appconfig revision list`, adding appropriate parameters to retrieve the required values. Specify the Azure App Configuration instance by providing either the store name (`--name <app-config-store-name>`) or by using a connection string (`--connection-string <your-connection-string>`). Restrict the output by specifying a specific point in time (`--datetime`) and by specifying the maximum number of items to return (`--top`).
20
20
21
-
If you don't have Azure CLI installed locally, you can optionally use Azure Cloud Shell.
To enable the move option, select the resources you want to move. To select all of the resources, select the checkbox at the top of list. Or, select resources individually.
170
+
To enable the move option, select the resources you want to move. To select all of the resources, select the checkbox at the top of list. Or, select resources individually. After selecting resources, the move option is enabled.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/templates/deployment-history-deletions.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,15 @@
2
2
title: Deployment history deletions
3
3
description: Describes how Azure Resource Manager automatically deletes deployments from the deployment history. Deployments are deleted when the history is close to exceeding the limit of 800.
4
4
ms.topic: conceptual
5
-
ms.date: 08/07/2020
5
+
ms.date: 09/15/2020
6
6
---
7
7
# Automatic deletions from deployment history
8
8
9
9
Every time you deploy a template, information about the deployment is written to the deployment history. Each resource group is limited to 800 deployments in its deployment history.
10
10
11
-
Azure Resource Manager automatically deletes deployments from your history as you near the limit. Automatic deletion is a change from past behavior. Previously, you had to manually delete deployments from the deployment history to avoid getting an error. **This change was implemented on August 6, 2020.**
11
+
Azure Resource Manager automatically deletes deployments from your history as you near the limit. Automatic deletion is a change from past behavior. Previously, you had to manually delete deployments from the deployment history to avoid getting an error. This change was implemented on August 6, 2020.
12
+
13
+
**Automatic deletions are supported for resource group deployments. Currently, deployments in the deployment history for [subscription](deploy-to-subscription.md), [management group](deploy-to-management-group.md), and [tenant](deploy-to-tenant.md) deployments aren't deleted.**
12
14
13
15
> [!NOTE]
14
16
> Deleting a deployment from the history doesn't affect any of the resources that were deployed.
0 commit comments