Skip to content

Commit 354d205

Browse files
committed
Merge branch 'acs-hub-update' of https://github.com/sroons/azure-docs-pr-sroons-fork into acs-hub-update
2 parents 54b37da + 9d94278 commit 354d205

File tree

298 files changed

+4758
-2902
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

298 files changed

+4758
-2902
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,16 @@
55
"redirect_url": "/azure/azure-monitor/getting-started",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path_from_root": "/articles/azure-monitor/monitor-reference.md",
10+
"redirect_url": "/azure/azure-monitor/data-sources",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/observability-data.md",
15+
"redirect_url": "/azure/azure-monitor/overview",
16+
"redirect_document_id": false
17+
},
818
{
919
"source_path_from_root": "/articles/azure-monitor/change/change-analysis-query.md",
1020
"redirect_url": "/azure/azure-monitor/change/change-analysis-visualizations",
@@ -25,6 +35,26 @@
2535
"redirect_url": "/azure/azure-monitor/change/change-analysis",
2636
"redirect_document_id": false
2737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/javascript-react-plugin.md",
40+
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/javascript-react-native-plugin.md",
45+
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/azure-monitor/app/javascript-angular-plugin.md",
50+
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/azure-monitor/app/javascript-click-analytics-plugin.md",
55+
"redirect_url": "/azure/azure-monitor/app/javascript-feature-extensions",
56+
"redirect_document_id": false
57+
},
2858
{
2959
"source_path_from_root": "/articles/azure-monitor/app/java-in-process-agent-redirect.md",
3060
"redirect_url": "/azure/azure-monitor/app/opentelemetry-enable",

articles/active-directory-b2c/enable-authentication-react-spa-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The sample code is made up of the following components. Add these components fro
8080
- [src/pages/Hello.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/6-AdvancedScenarios/1-call-api-obo/SPA/src/pages/Hello.jsx) - Demonstrate how to call a protected resource with OAuth2 bearer token.
8181
- It uses the [useMsal](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-react/docs/hooks.md) hook that returns the PublicClientApplication instance.
8282
- With PublicClientApplication instance, it acquires an access token to call the REST API.
83-
- Invokes the [callApiWithToken](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/fetch.js) function to fetch the data from the REST API and renders the result using the **DataDisplay** component.
83+
- Invokes the [callApiWithToken](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/4-Deployment/2-deploy-static/App/src/fetch.js) function to fetch the data from the REST API and renders the result using the **DataDisplay** component.
8484

8585
- [src/components/NavigationBar.jsx](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/components/NavigationBar.jsx) - The app top navigation bar with the sign-in, sign-out, edit profile and call REST API reset buttons.
8686
- It uses the [AuthenticatedTemplate](https://github.com/AzureAD/microsoft-authentication-library-for-js/blob/dev/lib/msal-react/docs/getting-started.md#authenticatedtemplate-and-unauthenticatedtemplate) and UnauthenticatedTemplate, which only render their children if a user is authenticated or unauthenticated, respectively.
@@ -94,7 +94,7 @@ The sample code is made up of the following components. Add these components fro
9494

9595
- [src/styles/App.css](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/styles/App.css) and [src/styles/index.css](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/styles/index.css) - CSS styling files for the app.
9696

97-
- [src/fetch.js](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/3-Authorization-II/2-call-api-b2c/SPA/src/fetch.js) - Fetches HTTP requests to the REST API.
97+
- [src/fetch.js](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/blob/main/4-Deployment/2-deploy-static/App/src/fetch.js) - Fetches HTTP requests to the REST API.
9898

9999
## Step 4: Configure your React app
100100

articles/active-directory-b2c/json-transformations.md

Lines changed: 99 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/07/2022
12+
ms.date: 02/14/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -409,6 +409,104 @@ In the following example, the claims transformation extracts the following claim
409409
- **active**: true
410410
- **birthDate**: 2005-09-23T00:00:00Z
411411

412+
413+
## GetClaimsFromJsonArrayV2
414+
415+
Get a list of specified elements from a string collection JSON elements. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json#getclaimsfromjsonarrayv2) of this claims transformation.
416+
417+
| Element | TransformationClaimType | Data Type | Notes |
418+
| ---- | ----------------------- | --------- | ----- |
419+
| InputClaim | jsonSourceClaim | stringCollection | The string collection claim with the JSON payloads. This claim is used by the claims transformation to get the claims. |
420+
| InputParameter | errorOnMissingClaims | boolean | Specifies whether to throw an error if one of the claims is missing. |
421+
| InputParameter | includeEmptyClaims | string | Specify whether to include empty claims. |
422+
| InputParameter | jsonSourceKeyName | string | Element key name |
423+
| InputParameter | jsonSourceValueName | string | Element value name |
424+
| OutputClaim | Collection | string, int, boolean, and datetime |List of claims to extract. The name of the claim should be equal to the one specified in _jsonSourceClaim_ input claim. |
425+
426+
### Example of GetClaimsFromJsonArrayV2
427+
428+
In the following example, the claims transformation extracts the following claims: email (string), displayName (string), membershipNum (int), active (boolean) and birthDate (datetime) from the JSON data.
429+
430+
```xml
431+
<ClaimsTransformation Id="GetClaimsFromJson" TransformationMethod="GetClaimsFromJsonArrayV2">
432+
<InputClaims>
433+
<InputClaim ClaimTypeReferenceId="jsonSourceClaim" TransformationClaimType="jsonSource" />
434+
</InputClaims>
435+
<InputParameters>
436+
<InputParameter Id="errorOnMissingClaims" DataType="boolean" Value="false" />
437+
<InputParameter Id="includeEmptyClaims" DataType="boolean" Value="false" />
438+
<InputParameter Id="jsonSourceKeyName" DataType="string" Value="key" />
439+
<InputParameter Id="jsonSourceValueName" DataType="string" Value="value" />
440+
</InputParameters>
441+
<OutputClaims>
442+
<OutputClaim ClaimTypeReferenceId="email" />
443+
<OutputClaim ClaimTypeReferenceId="displayName" />
444+
<OutputClaim ClaimTypeReferenceId="membershipID" />
445+
<OutputClaim ClaimTypeReferenceId="active" />
446+
<OutputClaim ClaimTypeReferenceId="birthDate" />
447+
</OutputClaims>
448+
</ClaimsTransformation>
449+
```
450+
451+
- Input claims:
452+
- **jsonSourceClaim[0]** (string collection first element):
453+
454+
```json
455+
{
456+
"key": "email",
457+
"value": "[email protected]"
458+
}
459+
```
460+
461+
- **jsonSourceClaim[1]** (string collection second element):
462+
463+
```json
464+
{
465+
"key": "displayName",
466+
"value": "Someone"
467+
}
468+
```
469+
470+
- **jsonSourceClaim[2]** (string collection third element):
471+
472+
```json
473+
{
474+
"key": "membershipID",
475+
"value": 6353399
476+
}
477+
```
478+
479+
- **jsonSourceClaim[3]** (string collection fourth element):
480+
481+
```json
482+
{
483+
"key": "active",
484+
"value": true
485+
}
486+
```
487+
488+
- **jsonSourceClaim[4]** (string collection fifth element):
489+
490+
```json
491+
{
492+
"key": "birthDate",
493+
"value": "2005-09-23T00:00:00Z"
494+
}
495+
```
496+
497+
- Input parameters:
498+
- **errorOnMissingClaims**: false
499+
- **includeEmptyClaims**: false
500+
- **jsonSourceKeyName**: key
501+
- **jsonSourceValueName**: value
502+
- Output claims:
503+
- **email**: "[email protected]"
504+
- **displayName**: "Someone"
505+
- **membershipID**: 6353399
506+
- **active**: true
507+
- **birthDate**: 2005-09-23T00:00:00Z
508+
509+
412510
## GetNumericClaimFromJson
413511

414512
Gets a specified numeric (long) element from a JSON data. Check out the [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims-transformation/json#getnumericclaimfromjson) of this claims transformation.

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/18/2023
9+
ms.date: 02/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -32,6 +32,9 @@ Some OATH TOTP hardware tokens are programmable, meaning they don't come with a
3232

3333
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice. Hardware OATH tokens are available for users with an Azure AD Premium P1 or P2 license.
3434

35+
>[!IMPORTANT]
36+
>The preview is only supported in Azure Global and Azure Government clouds.
37+
3538
OATH TOTP hardware tokens typically come with a secret key, or seed, pre-programmed in the token. These keys must be input into Azure AD as described in the following steps. Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret key can only contain the characters *a-z* or *A-Z* and digits *2-7*, and must be encoded in *Base32*.
3639

3740
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
@@ -50,16 +53,17 @@ [email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
5053
> [!NOTE]
5154
> Make sure you include the header row in your CSV file.
5255
53-
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
56+
Once properly formatted as a CSV file, a global administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **Multifactor authentication** > **OATH tokens**, and upload the resulting CSV file.
5457

5558
Depending on the size of the CSV file, it may take a few minutes to process. Select the **Refresh** button to get the current status. If there are any errors in the file, you can download a CSV file that lists any errors for you to resolve. The field names in the downloaded CSV file are different than the uploaded version.
5659

5760
Once any errors have been addressed, the administrator then can activate each key by selecting **Activate** for the token and entering the OTP displayed on the token. You can activate a maximum of 200 OATH tokens every 5 minutes.
5861

59-
Users may have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time. Hardware OATH tokens cannot be assigned to guest users in the resource tenant.
62+
Users may have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time. Hardware OATH tokens cannot be assigned to guest users in the resource tenant.
6063

61-
>[!IMPORTANT]
62-
>The preview is only supported in Azure Global and Azure Government clouds.
64+
.[!IMPORTANT]
65+
>Make sure to only assign each token to a single user.
66+
>In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
6367
6468

6569
## Determine OATH token registration type in mysecurityinfo

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ Keep these limitations in mind:
206206
- Users in scope for Self Service Password Reset (SSPR) registration policy *or* [Identity Protection Multi-factor authentication registration policy](../identity-protection/howto-identity-protection-configure-mfa-policy.md) will be required to register authentication methods after they've signed in with a Temporary Access Pass.
207207
Users in scope for these policies will get redirected to the [Interrupt mode of the combined registration](concept-registration-mfa-sspr-combined.md#combined-registration-modes). This experience doesn't currently support FIDO2 and Phone Sign-in registration.
208208
- A Temporary Access Pass can't be used with the Network Policy Server (NPS) extension and Active Directory Federation Services (AD FS) adapter.
209-
- After a Temporary Access Pass is added to an account or expires, it can take a few minutes for the changes to replicate. Users may still see a prompt for Temporary Access Pass during this time.
209+
- It can take a few minutes for changes to replicate. Because of this, after a Temporary Access Pass is added to an account it can take a while for the prompt to appear. For the same reason, after a Temporary Access Pass expires, users may still see a prompt for Temporary Access Pass.
210210

211211
## Troubleshooting
212212

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 02/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -144,7 +144,11 @@ Depending on the size of the CSV file, it might take a few minutes to process. S
144144

145145
After any errors are addressed, the administrator can activate each key by selecting **Activate** for the token and entering the OTP displayed in the token.
146146

147-
Users can have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time.
147+
Users can have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time.
148+
149+
>[!IMPORTANT]
150+
>Make sure to only assign each token to a single user.
151+
>In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
148152
149153
## Phone call settings
150154

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 02/13/2023
1212
ms.author: jfields
1313
---
1414

@@ -49,8 +49,11 @@ This article also describes how to enable the controller in Amazon Web Services
4949

5050
## Enable or disable the controller in Azure
5151

52+
You can enable or disable the controller in Azure at the Subscription level of you Management Group(s).
5253

53-
1. In Azure, open the **Access control (IAM)** page.
54+
1. From the Azure **Home** page, select **Management groups**.
55+
1. Locate the group for which you want to enable or disable the controller, then select the arrow to expand the group menu and view your subscriptions. Alternatively, you can select the **Total Subscriptions** number listed for your group.
56+
1. Select the subscription for which you want to enable or disable the controller, then click **Access control (IAM)** in the navigation menu.
5457
1. In the **Check access** section, in the **Find** box, enter **Cloud Infrastructure Entitlement Management**.
5558

5659
The **Cloud Infrastructure Entitlement Management assignments** page appears, displaying the roles assigned to you.

articles/active-directory/cloud-infrastructure-entitlement-management/ui-remediation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ The **Remediation** dashboard in Permissions Management provides an overview of
1919
This article provides an overview of the components of the **Remediation** dashboard.
2020

2121
> [!NOTE]
22-
> To view the **Remediation** dashboard, your must have **Viewer**, **Controller**, or **Administrator** permissions. To make changes on this dashboard, you must have **Controller** or **Administrator** permissions. If you don't have these permissions, contact your system administrator.
22+
> To view the **Remediation** dashboard, you must have **Viewer**, **Controller**, or **Approver** permissions. To make changes on this dashboard, you must have **Controller** or **Approver** permissions. If you don't have these permissions, contact your system administrator.
2323
2424
> [!NOTE]
2525
> Microsoft Azure uses the term *role* for what other cloud providers call *policy*. Permissions Management automatically makes this terminology change when you select the authorization system type. In the user documentation, we use *role/policy* to refer to both.

articles/active-directory/conditional-access/overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 11/07/2022
9+
ms.date: 02/13/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
1414
ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
17-
ms.custom: contperf-fy20q4, azuread-video-2020
17+
ms.custom: zt-include
1818
---
1919
# What is Conditional Access?
2020

@@ -97,6 +97,8 @@ When licenses required for Conditional Access expire, policies aren't automatica
9797

9898
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) help protect against identity-related attacks and are available for all customers.
9999

100+
[!INCLUDE [active-directory-zero-trust](../../../includes/active-directory-zero-trust.md)]
101+
100102
## Next steps
101103

102104
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)

0 commit comments

Comments
 (0)