Skip to content

Commit 344a2cf

Browse files
authored
Merge pull request #98774 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents 7a51b46 + 38ed9c9 commit 344a2cf

File tree

280 files changed

+2155
-1828
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

280 files changed

+2155
-1828
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39798,6 +39798,11 @@
3979839798
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
3979939799
"redirect_document_id": false
3980039800
},
39801+
{
39802+
"source_path": "articles/cognitive-services/Custom-Vision-Service/move-your-project-to-azure.md",
39803+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
39804+
"redirect_document_id": false
39805+
},
3980139806
{
3980239807
"source_path": "articles/data-catalog/data-catalog-prerequisites.md",
3980339808
"redirect_url": "/azure/data-catalog/data-catalog-get-started",

articles/active-directory/conditional-access/controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ For more information, see [how to require managed devices for cloud app access w
7474

7575
### Hybrid Azure AD joined device
7676

77-
Requiring a Hybrid Azure AD joined device is another option you have to configure device-based Conditional Access policies. This requirement refers to Windows desktops, laptops, and enterprise tablets that are joined to an on-premises Active Directory. If this option is selected, your Conditional Access policy grants access to access attempts made with devices that are joined to your on-premises Active Directory and your Azure Active Directory.
77+
Requiring a hybrid Azure AD joined device is another option you have to configure device-based Conditional Access policies. This requirement refers to Windows desktops, laptops, and enterprise tablets that are joined to an on-premises Active Directory. If this option is selected, your Conditional Access policy grants access to access attempts made with devices that are joined to your on-premises Active Directory and your Azure Active Directory. Mac devices do not support hybrid Azure AD join.
7878

7979
For more information, see [set up Azure Active Directory device-based Conditional Access policies](require-managed-devices.md).
8080

articles/active-directory/devices/overview.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,10 @@ Devices in Azure AD can be managed using Mobile Device Management (MDM) tools li
5757

5858
## Resource access
5959

60-
Registering and joining give your users Seamless Sign-on (SSO) to cloud resources and administrators the ability to apply Conditional Access policies to those resources.
60+
Registering and joining devices to Azure AD gives your users Seamless Sign-on (SSO) to cloud resources. This process also allows administrators the ability to apply Conditional Access policies to resources based on the device they are accessed from.
61+
62+
> [!NOTE]
63+
> Device-based Conditional Access policies require either hybrid Azure AD joined devices or compliant Azure AD joined or Azure AD registered devices.
6164
6265
Devices that are Azure AD joined or hybrid Azure AD joined benefit from SSO to your organization's on-premises resources as well as cloud resources. More information can be found in the article, [How SSO to on-premises resources works on Azure AD joined devices](azuread-join-sso.md).
6366

articles/active-directory/manage-apps/application-provisioning-config-how-to.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ ms.author: mimart
1818
ms.reviewer: asteen
1919

2020
ms.collection: M365-identity-device-management
21+
ROBOTS: NOINDEX
2122
---
2223

2324
# How to configure user provisioning to an Azure AD Gallery application

articles/active-directory/manage-apps/check-status-user-account-provisioning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,8 +50,8 @@ From here, you can access both the provisioning progress bar and the provisionin
5050
The [provisioning progress bar](application-provisioning-when-will-provisioning-finish-specific-user.md#view-the-provisioning-progress-bar) is visible in the **Provisioning** tab for given application. It is located in the **Current Status** section underneath **Settings**, and shows the status of the current initial or incremental cycle. This section also shows:
5151

5252
* The total number of users and/groups that have been synchronized and are currently in scope for provisioning between the source system and the target system.
53-
* The last time the synchronization was run. Synchronizations typically occur every 20-40 minutes, after an [initial cycle](user-provisioning.md#what-happens-during-provisioning) has completed.
54-
* Whether or not an [initial cycle](user-provisioning.md#what-happens-during-provisioning) has been completed.
53+
* The last time the synchronization was run. Synchronizations typically occur every 20-40 minutes, after an [initial cycle](how-provisioning-works.md#provisioning-cycles-initial-and-incremental) has completed.
54+
* Whether or not an [initial cycle](how-provisioning-works.md#provisioning-cycles-initial-and-incremental) has been completed.
5555
* Whether or not the provisioning process has been placed in quarantine, and what the reason for the quarantine status is (for example, failure to communicate with target system due to invalid admin credentials).
5656

5757
The **Current Status** should be the first place admins look to check on the operational health of the provisioning job.

articles/active-directory/manage-apps/configure-automatic-user-provisioning-portal.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,18 @@ ms.devlang: na
1212
ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
15-
ms.date: 04/01/2019
15+
ms.date: 11/25/2019
1616
ms.author: mimart
1717
ms.reviewer: arvinh
1818

1919
ms.collection: M365-identity-device-management
2020
---
2121
# Managing user account provisioning for enterprise apps in the Azure portal
2222

23-
This article describes how to use the [Azure portal](https://portal.azure.com) to manage automatic user account provisioning and de-provisioning for applications that support it. To learn more about automatic user account provisioning and how it works, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](user-provisioning.md).
23+
This article describes the general steps for managing automatic user account provisioning and de-provisioning for applications that support it. *User account provisioning* is the act of creating, updating, and/or disabling user account records in an application’s local user profile store. Most cloud and SaaS applications store the users role and permissions in the user's own local user profile store, and presence of such a user record in the user's local store is *required* for single sign-on and access to work. To learn more about automatic user account provisioning, see [Automate User Provisioning and Deprovisioning to SaaS Applications with Azure Active Directory](user-provisioning.md).
24+
25+
> [!IMPORTANT]
26+
> Azure Active Directory (Azure AD) has a gallery that contains thousands of pre-integrated applications that are enabled for automatic provisioning with Azure AD. You should start by finding the provisioning setup tutorial specific to your application in the [List of tutorials on how to integrate SaaS apps with Azure Active Directory](https://azure.microsoft.com/documentation/articles/active-directory-saas-tutorial-list/). You'll likely find step-by-step guidance for configuring both the app and Azure AD to create the provisioning connection.
2427
2528
## Finding your apps in the portal
2629

0 commit comments

Comments
 (0)