Skip to content

Commit 36712e5

Browse files
authored
Merge branch 'main' into patch-23
2 parents 9f2cda2 + 55a3eba commit 36712e5

File tree

196 files changed

+1922
-1536
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

196 files changed

+1922
-1536
lines changed

.openpublishing.redirection.json

Lines changed: 4 additions & 129 deletions
Original file line numberDiff line numberDiff line change
@@ -14442,121 +14442,6 @@
1444214442
"redirect_url": "/azure/networking/fundamentals/networking-overview",
1444314443
"redirect_document_id": false
1444414444
},
14445-
{
14446-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview-create-using-portal.md",
14447-
"redirect_url": "/azure/network-watcher/connection-monitor-create-using-portal",
14448-
"redirect_document_id": false
14449-
},
14450-
{
14451-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview-create-using-arm-client.md",
14452-
"redirect_url": "/azure/network-watcher/connection-monitor-create-using-template",
14453-
"redirect_document_id": false
14454-
},
14455-
{
14456-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview.md",
14457-
"redirect_url": "/azure/network-watcher/connection-monitor-overview",
14458-
"redirect_document_id": false
14459-
},
14460-
{
14461-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-portal.md",
14462-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem",
14463-
"redirect_document_id": true
14464-
},
14465-
{
14466-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-cli.md",
14467-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-cli",
14468-
"redirect_document_id": true
14469-
},
14470-
{
14471-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-cli-nodejs.md",
14472-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-cli",
14473-
"redirect_document_id": false
14474-
},
14475-
{
14476-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-powershell.md",
14477-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-powershell",
14478-
"redirect_document_id": true
14479-
},
14480-
{
14481-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-portal.md",
14482-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem",
14483-
"redirect_document_id": true
14484-
},
14485-
{
14486-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-cli.md",
14487-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli",
14488-
"redirect_document_id": false
14489-
},
14490-
{
14491-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-cli-nodejs.md",
14492-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli",
14493-
"redirect_document_id": true
14494-
},
14495-
{
14496-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-powershell.md",
14497-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-powershell",
14498-
"redirect_document_id": true
14499-
},
14500-
{
14501-
"source_path_from_root": "/articles/network-watcher/migrate-to-connection-monitor-preview-from-connection-monitor.md",
14502-
"redirect_url": "/azure/network-watcher/migrate-to-connection-monitor-from-connection-monitor-classic",
14503-
"redirect_document_id": false
14504-
},
14505-
{
14506-
"source_path_from_root": "/articles/network-watcher/migrate-to-connection-monitor-preview-from-network-performance-monitor.md",
14507-
"redirect_url": "/azure/network-watcher/migrate-to-connection-monitor-from-network-performance-monitor",
14508-
"redirect_document_id": false
14509-
},
14510-
{
14511-
"source_path_from_root": "/articles/network-watcher/network-watcher-nsg-flow-logging-cli-nodejs.md",
14512-
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-cli",
14513-
"redirect_document_id": true
14514-
},
14515-
{
14516-
"source_path_from_root": "/articles/network-watcher/prepare-flow-log.md",
14517-
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-overview",
14518-
"redirect_document_id": true
14519-
},
14520-
{
14521-
"source_path_from_root": "/articles/network-watcher/network-watcher-packet-capture-manage-cli-nodejs.md",
14522-
"redirect_url": "/azure/network-watcher/network-watcher-packet-capture-manage-cli",
14523-
"redirect_document_id": true
14524-
},
14525-
{
14526-
"source_path_from_root": "/articles/network-watcher/network-watcher-security-group-view-cli-nodejs.md",
14527-
"redirect_url": "/azure/network-watcher/network-watcher-security-group-view-cli",
14528-
"redirect_document_id": true
14529-
},
14530-
{
14531-
"source_path_from_root": "/articles/network-watcher/network-watcher-troubleshoot-manage-cli-nodejs.md",
14532-
"redirect_url": "/azure/network-watcher/network-watcher-troubleshoot-manage-cli",
14533-
"redirect_document_id": true
14534-
},
14535-
{
14536-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-cli.md",
14537-
"redirect_url": "/azure/network-watcher/view-network-topology",
14538-
"redirect_document_id": false
14539-
},
14540-
{
14541-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-cli-nodejs.md",
14542-
"redirect_url": "/azure/network-watcher/view-network-topology",
14543-
"redirect_document_id": false
14544-
},
14545-
{
14546-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-overview.md",
14547-
"redirect_url": "/azure/network-watcher/view-network-topology",
14548-
"redirect_document_id": true
14549-
},
14550-
{
14551-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-powershell.md",
14552-
"redirect_url": "/azure/network-watcher/view-network-topology",
14553-
"redirect_document_id": false
14554-
},
14555-
{
14556-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-rest.md",
14557-
"redirect_url": "/azure/network-watcher/view-network-topology",
14558-
"redirect_document_id": false
14559-
},
1456014445
{
1456114446
"source_path_from_root": "/articles/notebooks/index.yml",
1456214447
"redirect_url": "https://notebooks.azure.com",
@@ -20357,16 +20242,6 @@
2035720242
"redirect_url": "/rest/api/load-balancer/loadbalancers/createorupdate",
2035820243
"redirect_document_id": false
2035920244
},
20360-
{
20361-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-rest.md",
20362-
"redirect_url": "/rest/api/network-watcher/networkwatchers/getnexthop",
20363-
"redirect_document_id": false
20364-
},
20365-
{
20366-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-rest.md",
20367-
"redirect_url": "/rest/api/network-watcher/networkwatchers/verifyipflow",
20368-
"redirect_document_id": false
20369-
},
2037020245
{
2037120246
"source_path_from_root": "/articles/resource-group-link-resources.md",
2037220247
"redirect_url": "/rest/api/resources/resourcelinks",
@@ -24543,22 +24418,22 @@
2454324418
},
2454424419
{
2454524420
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-01-register-app.md",
24546-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app.md",
24421+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app",
2454724422
"redirect_document_id": false
2454824423
},
2454924424
{
2455024425
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-02-prepare-spa.md",
24551-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa.md",
24426+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa",
2455224427
"redirect_document_id": false
2455324428
},
2455424429
{
2455524430
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md",
24556-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users.md",
24431+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users",
2455724432
"redirect_document_id": false
2455824433
},
2455924434
{
2456024435
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-04-call-api.md",
24561-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api.md",
24436+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api",
2456224437
"redirect_document_id": false
2456324438
}
2456424439
]

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 09/21/2023
11+
ms.date: 09/28/2023
1212
ms.reviewer: arvinh
1313
zone_pivot_groups: app-provisioning-cross-tenant-synchronization
1414
---
@@ -106,7 +106,7 @@ Attribute-mapping expressions can have a maximum of 10,000 characters.
106106

107107
#### Unsupported scoping filters
108108

109-
Directory extensions and the **appRoleAssignments**, **userType**, and **accountExpires** attributes aren't supported as scoping filters.
109+
The **appRoleAssignments**, **userType**, and **accountExpires** attributes aren't supported as scoping filters.
110110

111111
#### Multivalue directory extensions
112112

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.reviewer: chmutali
2424
This article explains how the integration works and how you can customize the provisioning behavior for different HR scenarios.
2525

2626
## Establishing connectivity
27-
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://apps.support.sap.com/sap/support/knowledge/en/2215682).
27+
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://help.sap.com/docs/SAP_SUCCESSFACTORS_PLATFORM/d599f15995d348a1b45ba5603e2aba9b/af2b8d5437494b12be88fe374eba75b6.html).
2828

2929
To further secure the connectivity between Microsoft Entra provisioning service and SuccessFactors, add the Microsoft Entra IP ranges in the SuccessFactors IP allowlist:
3030

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,10 @@ Copy the Response into a text file. It looks like the JSON text shown, with valu
5959
Here's the JSON block to add to the mapping.
6060

6161
```json
62-
{
63-
"key": "SkipOutOfScopeDeletions",
64-
"value": "True"
65-
}
62+
{
63+
"key": "SkipOutOfScopeDeletions",
64+
"value": "True"
65+
}
6666
```
6767

6868
## Step 4: Update the secrets endpoint with the SkipOutOfScopeDeletions flag

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: ignite-2022
99
ms.topic: conceptual
10-
ms.date: 09/27/2023
10+
ms.date: 09/28/2023
1111

1212
ms.author: justinha
1313
author: mjsantani
@@ -134,7 +134,7 @@ Here are a few sample JSONs you can use to get started!
134134

135135
- Include all users
136136

137-
If you want to include ALL users in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/All%20Users%20Enabled.json) and paste it in Graph Explorer and run `PATCH` on the endpoint.
137+
If you want to include ALL users in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste it in Graph Explorer and run `PATCH` on the endpoint.
138138

139139
```json
140140
{
@@ -158,7 +158,7 @@ Here are a few sample JSONs you can use to get started!
158158

159159
- Include specific users or groups of users
160160

161-
If you want to include certain users or groups in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/Multiple%20Includes.json) and update it with the relevant GUIDs of your users and groups. Then paste the JSON in Graph Explorer and run `PATCH` on the endpoint.
161+
If you want to include certain users or groups in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste the JSON in Graph Explorer and run `PATCH` on the endpoint.
162162

163163
```json
164164
{
@@ -182,11 +182,12 @@ Here are a few sample JSONs you can use to get started!
182182
]
183183
}
184184
}
185+
}
185186
```
186187

187-
- Include and exclude specific users/groups of users
188+
- Include and exclude specific users or groups
188189

189-
If you want to include AND exclude certain users/groups of users in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/Multiple%20Includes%20and%20Excludes.json) and paste it in Graph Explorer and run `PATCH` on the endpoint. Enter the correct GUIDs for your users and groups.
190+
If you want to include AND exclude certain users or groups in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste it in Graph Explorer and run `PATCH` on the endpoint.
190191

191192
```json
192193
{
@@ -286,13 +287,13 @@ No. The snooze duration for the prompt is a tenant-wide setting and applies to a
286287

287288
The feature aims to empower admins to get users set up with MFA using the Authenticator app and not passwordless phone sign-in.
288289

289-
**Will a user who has a 3rd party authenticator app setup see the nudge?**
290+
**Will a user who signs in with a 3rd party authenticator app see the nudge?**
290291

291-
If this user doesnt have the Authenticator app set up for push notifications and is enabled for it by policy, yes, the user will see the nudge.
292+
Yes. If a user is enabled for the registration campaign and doesn't have Microsoft Authenticator set up for push notifications, the user is nudged to set up Authenticator.
292293

293-
**Will a user who has the Authenticator app setup only for TOTP codes see the nudge?** 
294+
**Will a user who has Authenticator set up only for TOTP codes see the nudge?**
294295

295-
Yes. If the Authenticator app is not set up for push notifications and the user is enabled for it by policy, yes, the user will see the nudge.
296+
Yes. If a user is enabled for the registration campaign and Authenticator app isn't set up for push notifications, the user is nudged to set up push notification with Authenticator.
296297

297298
**If a user just went through MFA registration, are they nudged in the same sign-in session?**
298299

@@ -316,9 +317,9 @@ Yes. If they have been scoped for the nudge using the policy.
316317

317318
**What if the user closes the browser?**
318319

319-
It's the same as snoozing. If setup is required for a user after they snoozed three times, the user will get prompted the next time they sign in.
320+
It's the same as snoozing. If setup is required for a user after they snoozed three times, the user is prompted the next time they sign in.
320321

321-
**Why dont some users see a nudge when there is a Conditional Access policy for "Register security information"?**
322+
**Why don't some users see a nudge when there is a Conditional Access policy for "Register security information"?**
322323

323324
A nudge won't appear if a user is in scope for a Conditional Access policy that blocks access to the **Register security information** page.
324325

articles/active-directory/external-identities/customers/how-to-customize-branding-customers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following image displays the neutral default branding of the customer tenant
5757

5858
Before you customize any settings, the neutral default branding will appear in your sign-in and sign-up pages. You can customize this default experience with a custom background image or color, favicon, layout, header, and footer. You can also upload a [custom CSS](/azure/active-directory/fundamentals/reference-company-branding-css-template).
5959

60-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
60+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
6161
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
6262
1. Browse to **Company Branding** > **Default sign-in** > **Edit**.
6363

@@ -174,7 +174,7 @@ Your customer tenant name replaces the Microsoft banner logo in the neutral defa
174174

175175
:::image type="content" source="media/how-to-customize-branding-customers/tenant-name.png" alt-text="Screenshot of the tenant name." lightbox="media/how-to-customize-branding-customers/tenant-name.png":::
176176

177-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/).
177+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
178178
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
179179
1. In the search bar, type and select **Properties**.
180180
1. Edit the **Name** field.
@@ -187,7 +187,7 @@ Your customer tenant name replaces the Microsoft banner logo in the neutral defa
187187

188188
When no longer needed, you can remove the sign-in customization from your customer tenant via the Azure portal.
189189

190-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
190+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
191191
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
192192
1. Browse to **Company branding** > **Default sign-in experience** > **Edit**.
193193
1. Remove the elements you no longer need.

0 commit comments

Comments
 (0)