Skip to content

Commit 3445a19

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-js
2 parents fdc34ce + 042cf5b commit 3445a19

File tree

233 files changed

+4741
-1620
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

233 files changed

+4741
-1620
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13473,6 +13473,12 @@
1347313473
"source_path_from_root": "/articles/active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md",
1347413474
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/services-id-authentication-support",
1347513475
"redirect_document_id": false
13476+
},
13477+
{
13478+
"source_path_from_root": "/articles/active-directory/fundamentals/add-users-azure-active-directory.md",
13479+
"redirect_url": "/azure/active-directory/fundamentals/add-users",
13480+
"redirect_document_id": false
1347613481
}
13482+
1347713483
]
1347813484
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"redirections": [
2+
"redirections": [
33
{
44
"source_path_from_root": "/articles/defender-for-iot/organizations/best-practices/plan-network-monitoring.md",
55
"redirect_url": "/azure/defender-for-iot/organizations/best-practices/plan-prepare-deploy",
@@ -17,7 +17,7 @@
1717
},
1818
{
1919
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-deploy-certificates.md",
20-
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/activate-deploy-sensor#deploy-an-ssltls-certificate",
20+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-manage-individual-sensors#manage-ssltls-certificates",
2121
"redirect_document_id": false
2222
},
2323
{

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1855,6 +1855,11 @@
18551855
"redirect_url": "/azure/aks/managed-azure-ad",
18561856
"redirect_document_id": false
18571857
},
1858+
{
1859+
"source_path_from_root": "/articles/aks/monitor-apiserver.md",
1860+
"redirect_url": "/azure/aks/monitor-aks#resource-logs",
1861+
"redirect_document_id": false
1862+
},
18581863
{
18591864
"source_path": "articles/germany/germany-developer-guide.md",
18601865
"redirect_url": "/previous-versions/azure/germany/germany-developer-guide",

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,9 @@ Policy 2: All users with the directory role of Global Administrator, accessing t
8080
1. Confirm your settings and set **Enable policy** to **On**.
8181
1. Select **Create** to create to enable your policy.
8282

83+
> [!WARNING]
84+
> Policies that require compliant devices may prompt users on Mac, iOS, and Android to select a device certificate during policy evaluation, even though device compliance is not enforced. These prompts may repeat until the device is made compliant.
85+
8386
### Setting attribute values
8487

8588
Setting extension attributes is made possible through the Graph API. For more information about setting device attributes, see the article [Update device](/graph/api/device-update?tabs=http#example-2--write-extensionattributes-on-a-device).

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@ The initial implementation of continuous access evaluation focuses on Exchange,
2727

2828
To prepare your applications to use CAE, see [How to use Continuous Access Evaluation enabled APIs in your applications](../develop/app-resilience-continuous-access-evaluation.md).
2929

30-
Continuous access evaluation is available in Azure Government tenants (GCC High and DOD) for Exchange Online.
31-
3230
### Key benefits
3331

3432
- User termination or password change/reset: User session revocation is enforced in near real time.
@@ -88,6 +86,8 @@ This process enables the scenario where users lose access to organizational file
8886
> [!NOTE]
8987
> Teams is made up of multiple services and among these the calls and chat services don't adhere to IP-based Conditional Access policies.
9088
89+
Continuous access evaluation is also available in Azure Government tenants (GCC High and DOD) for Exchange Online.
90+
9191
## Client Capabilities
9292

9393
### Client-side claim challenge

articles/active-directory/develop/custom-claims-provider-overview.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,13 @@ ms.custom: aaddev
1919

2020
# Custom claims provider (preview)
2121

22-
This article provides an overview to the Azure Active Directory (Azure AD) custom claims provider.
23-
When a user authenticates to an application, a custom claims provider can be used to add claims into the token. A custom claims provider is made up of a custom extension that calls an external REST API, to fetch claims from external systems. A custom claims provider can be assigned to one or many applications in your directory.
22+
This article provides an overview to the Azure Active Directory (Azure AD) custom claims provider.
23+
When a user authenticates to an application, a custom claims provider can be used to add claims into the token. A custom claims provider is made up of a custom authentication extension that calls an external REST API, to fetch claims from external systems. A custom claims provider can be assigned to one or many applications in your directory.
2424

2525
Key data about a user is often stored in systems external to Azure AD. For example, secondary email, billing tier, or sensitive information. Some applications may rely on these attributes for the application to function as designed. For example, the application may block access to certain features based on a claim in the token.
2626

27-
The following short video provides an excellent overview of the Azure AD custom extensions and custom claims providers:
27+
The following short video provides an excellent overview of the Azure AD custom authentication extensions and custom claims providers:
28+
2829
> [!VIDEO https://www.youtube.com/embed/1tPA7B9ztz0]
2930
3031
Use a custom claims provider for the following scenarios:
@@ -34,7 +35,7 @@ Use a custom claims provider for the following scenarios:
3435

3536
## Token issuance start event listener
3637

37-
An event listener is a procedure that waits for an event to occur. The custom extension uses the **token issuance start** event listener. The event is triggered when a token is about to be issued to your application. When the event is triggered the custom extension REST API is called to fetch attributes from external systems.
38+
An event listener is a procedure that waits for an event to occur. The custom authentication extension uses the **token issuance start** event listener. The event is triggered when a token is about to be issued to your application. When the event is triggered the custom authentication extension REST API is called to fetch attributes from external systems.
3839

3940
For an example using a custom claims provider with the **token issuance start** event listener, check out the [get started with custom claims providers](custom-extension-get-started.md) article.
4041

@@ -43,3 +44,5 @@ For an example using a custom claims provider with the **token issuance start**
4344
- Learn how to [create and register a custom claims provider](custom-extension-get-started.md) with a sample Open ID Connect application.
4445
- If you already have a custom claims provider registered, you can configure a [SAML application](custom-extension-configure-saml-app.md) to receive tokens with claims sourced from an external store.
4546
- Learn more about custom claims providers with the [custom claims provider reference](custom-claims-provider-reference.md) article.
47+
48+

articles/active-directory/develop/custom-extension-configure-saml-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ This article describes how to configure a SAML application to receive tokens wit
2626
Before configuring a SAML application to receive tokens with external claims, first follow these sections:
2727

2828
- [Create a custom claims provider API](custom-extension-get-started.md#step-1-create-an-azure-function-app)
29-
- [Register a custom claims extension](custom-extension-get-started.md#step-2-register-a-custom-extension)
29+
- [Register a custom claims extension](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension)
3030

3131
## Configure a SAML application that receives enriched tokens
3232

@@ -70,7 +70,7 @@ Attributes that return by your custom claims provider API aren't automatically i
7070

7171
1. Select on **Configure** for **Custom claims provider**.
7272

73-
1. Select the custom extension you [registered previously](custom-extension-get-started.md#step-2-register-a-custom-extension) in the **Custom claims provider** dropdown. Select **Save**.
73+
1. Select the custom authentication extension you [registered previously](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension) in the **Custom claims provider** dropdown. Select **Save**.
7474

7575
1. Select **Add new claim** to add a new claim.
7676

0 commit comments

Comments
 (0)