Skip to content

Commit 37dd033

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into playbooks-watchlists
2 parents 32f0c16 + f690623 commit 37dd033

File tree

533 files changed

+15861
-3953
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

533 files changed

+15861
-3953
lines changed

.openpublishing.redirection.json

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9843,7 +9843,7 @@
98439843
},
98449844
{
98459845
"source_path_from_root": "/articles/azure-supportability/low-priority-quota.md",
9846-
"redirect_url": "/azure/azure-portal/supportability/low-priority-quota",
9846+
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
98479847
"redirect_document_id": true
98489848
},
98499849
{
@@ -9876,6 +9876,11 @@
98769876
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
98779877
"redirect_document_id": true
98789878
},
9879+
{
9880+
"source_path_from_root": "/articles/azure-portal/supportability/low-priority-quota.md",
9881+
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
9882+
"redirect_document_id": false
9883+
},
98799884
{
98809885
"source_path_from_root": "/articles/managed-applications/concepts-custom-providers-built-in-policy.md",
98819886
"redirect_url": "/azure/azure-resource-manager/custom-providers/concepts-built-in-policy",
@@ -46326,6 +46331,26 @@
4632646331
"redirect_url": "/azure/sentinel/monitor-your-data",
4632746332
"redirect_document_id": false
4632846333
},
46334+
{
46335+
"source_path": "articles/sentinel/connect-azure-security-center.md",
46336+
"redirect_url": "/azure/sentinel/connect-defender-for-cloud",
46337+
"redirect_document_id": false
46338+
},
46339+
{
46340+
"source_path": "articles/sentinel/entities-in-azure-sentinel.md",
46341+
"redirect_url": "/azure/sentinel/entities",
46342+
"redirect_document_id": false
46343+
},
46344+
{
46345+
"source_path": "articles/sentinel/azure-sentinel-billing.md",
46346+
"redirect_url": "/azure/sentinel/billing",
46347+
"redirect_document_id": false
46348+
},
46349+
{
46350+
"source_path": "articles/sentinel/automation-in-azure-sentinel.md",
46351+
"redirect_url": "/azure/sentinel/automation",
46352+
"redirect_document_id": false
46353+
},
4632946354
{
4633046355
"source_path": "articles/virtual-desktop/connect-android.md",
4633146356
"redirect_url": "/azure/virtual-desktop/user-documentation/connect-android",
@@ -47288,7 +47313,12 @@
4728847313
},
4728947314
{
4729047315
"source_path_from_root": "/articles/aks/open-service-mesh-disable-add-on.md",
47291-
"redirect_url": "/azure/aks/open-service-mesh-deploy-addon-az-cli",
47316+
"redirect_url": "/azure/aks/oopen-service-mesh-uninstall-add-on",
47317+
"redirect_document_id": false
47318+
},
47319+
{
47320+
"source_path_from_root": "/articles/aks/open-service-mesh-open-source-observability.md",
47321+
"redirect_url": "/azure/aks/open-service-mesh-azure-monitor",
4729247322
"redirect_document_id": false
4729347323
},
4729447324
{

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -639,7 +639,7 @@
639639
- name: Getting help
640640
href: ../active-directory/develop/developer-support-help-options.md
641641
- name: Pricing
642-
href: https://azure.microsoft.com/pricing/details/active-directory-b2c/
642+
href: https://azure.microsoft.com/pricing/details/active-directory/external-identities/
643643
- name: Pricing calculator
644644
href: https://azure.microsoft.com/pricing/calculator/
645645
- name: Service updates

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
- name: Customize attribute mappings
1818
href: customize-application-attributes.md
1919
- name: App specific provisioning tutorials
20-
href: /azure/active-directory/saas-apps
20+
href: /azure/active-directory/saas-apps/tutorial-list
2121
- name: Provisioning to SQL based apps
2222
href: tutorial-ecma-sql-connector.md
2323
- name: Concepts
@@ -129,7 +129,7 @@
129129
- name: Microsoft Q&A question page
130130
href: /answers/topics/azure-active-directory.html
131131
- name: Pricing
132-
href: https://azure.microsoft.com/pricing/details/active-directory
132+
href: https://azure.microsoft.com/pricing/details/active-directory/
133133
- name: Service updates
134134
href: https://azure.microsoft.com/updates/?product=active-directory
135135
- name: Stack Overflow

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
206206

207207
##### /Users:
208208
* The entitlements attribute is not supported.
209-
* Any attributes that are considered for user uniqueness must be usable as part of a filtered query. (e.g. if user uniqueness is evaluated for both userName and emails[type eq "work"], a GET to /Users with a filter must allow for both _userName eq "[email protected]"_ and _emails[type eq "work"] eq "[email protected]"_ queries.
209+
* Any attributes that are considered for user uniqueness must be usable as part of a filtered query. (e.g. if user uniqueness is evaluated for both userName and emails[type eq "work"], a GET to /Users with a filter must allow for both _userName eq "[email protected]"_ and _emails[type eq "work"].value eq "[email protected]"_ queries.
210210

211211
##### /Groups:
212212
* Groups are optional, but only supported if the SCIM implementation supports **PATCH** requests.

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: overview
1010
ms.workload: identity
11-
ms.date: 05/28/2021
11+
ms.date: 11/15/2021
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -19,11 +19,9 @@ In Azure Active Directory (Azure AD), the term *app provisioning* refers to auto
1919

2020
![Diagram that shows provisioning scenarios.](../governance/media/what-is-provisioning/provisioning.png)
2121

22-
Azure AD to software as a service (SaaS) application provisioning refers to automatically creating user identities and roles in the cloud ([SaaS](https://azure.microsoft.com/overview/what-is-saas/)) applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and more.
22+
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and more.
2323

24-
Azure AD supports provisioning users into SaaS applications and applications hosted on-premises or an infrastructure as a service (IaaS) solution such as a virtual machine. You might have a legacy application that relies on an LDAP user store or a SQL database. By using the Azure AD provisioning service, you can create, update, and delete users into on-premises applications without having to open up firewalls or deal with TCP ports.
25-
26-
Using lightweight agents, you can provision users into on-premises applications and govern access. When Azure AD is used with the application proxy, you can manage access to your on-premises application and provide automatic user provisioning (with the provisioning service) and single sign-on (with app proxy).
24+
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://aka.ms/scimoverview), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-scim-provisioning) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-ldap-connector-configure) user store or a [SQL](https://docs.microsoft.com/azure/active-directory/app-provisioning/tutorial-ecma-sql-connector) database, Azure AD can support those as well.
2725

2826
App provisioning lets you:
2927

articles/active-directory/app-proxy/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
expanded: true
1212
items:
1313
- name: List of app integration tutorials
14-
href: /azure/active-directory/saas-apps/
14+
href: /azure/active-directory/saas-apps/tutorial-list
1515
- name: Add an on-premises app with Application Proxy
1616
href: application-proxy-add-on-premises-application.md
1717
- name: Samples
@@ -170,7 +170,7 @@
170170
- name: Microsoft Q&A question page
171171
href: /answers/topics/azure-active-directory.html
172172
- name: Pricing
173-
href: https://azure.microsoft.com/pricing/details/active-directory
173+
href: https://azure.microsoft.com/pricing/details/active-directory/
174174
- name: Service updates
175175
href: https://azure.microsoft.com/updates/?product=active-directory
176176
- name: Stack Overflow

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@
5757
- name: Licenses
5858
href: concept-mfa-licensing.md
5959
- name: MFA for Office 365
60-
href: /office365/admin/security-and-compliance/set-up-multi-factor-authentication
60+
href: /microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication
6161
- name: FAQ
6262
href: multi-factor-authentication-faq.yml
6363
- name: Operator assistance
@@ -268,7 +268,7 @@
268268
- name: MFA user guide
269269
href: https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc
270270
- name: Code samples
271-
href: https://azure.microsoft.com/resources/samples/?service=active-directory
271+
href: /samples/browse/?products=azure
272272
- name: Azure PowerShell cmdlets
273273
href: /powershell/azure/
274274
- name: Microsoft Graph REST API beta

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/12/2021
9+
ms.date: 11/17/2021
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -21,11 +21,12 @@ ms.collection: M365-identity-device-management
2121
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
2222

2323
>[!NOTE]
24-
>Number matching is a key security upgrade to traditional second factor notifications in the Microsoft Authenticator app that will be enabled by default for all tenants at some point after general availability (GA). We highly recommend enabling number matching in the near-term for improved sign-in security.
24+
>Number matching is a key security upgrade to traditional second factor notifications in the Microsoft Authenticator app that will be enabled by default for all tenants a few months after general availability (GA).<br>
25+
>We highly recommend enabling number matching in the near-term for improved sign-in security.
2526
2627
## Prerequisites
2728

28-
Your organization will need to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups using the new Authentication Methods Policy API. For a consistent experience, upgrade to the latest versions of the AD FS adapter and NPS extension.
29+
Your organization will need to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups using the new Authentication Methods Policy API. If your organization is using ADFS adapter or NPS extensions, please upgrade to the latest versions for a consistent experience.
2930

3031
## Number matching
3132

@@ -52,7 +53,7 @@ When a user responds to an MFA push notification using Microsoft Authenticator,
5253
During self-service password reset, Microsoft Authenticator notification will show a number that the user will need to type in their Authenticator app notification. This number will only be seen to users who have been enabled for number matching.
5354

5455
>[!NOTE]
55-
>Number matching for admin roles during SSPR is initially pending and unavailable for a couple days.
56+
>Number matching for admin roles during SSPR is pending and unavailable for a couple days.
5657
5758
### Combined registration
5859

@@ -246,7 +247,7 @@ To enable number matching in the Azure AD portal, complete the following steps:
246247

247248
## Known issues
248249

249-
- Number matching for admin roles during SSPR is initially pending and unavailable for a couple days.
250+
- Number matching for admin roles during SSPR is pending and unavailable for a couple days.
250251

251252
## Next steps
252253

19.6 KB
Loading

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@
148148
- name: Publish to App Source
149149
href: howto-get-appsource-certified.md
150150
- name: Publish to the Office 365 Seller Dashboard
151-
href: /office/dev/store/use-the-seller-dashboard-to-submit-to-the-office-store
151+
href: /office/dev/store/add-in-submission-guide
152152
- name: Azure Access Control Service
153153
displayName: ACS
154154
items:
@@ -184,11 +184,11 @@
184184
- name: Azure AD blog
185185
href: https://cloudblogs.microsoft.com/enterprisemobility/?product=azure-active-directory
186186
- name: Microsoft identity platform developer blog
187-
href: https://developer.microsoft.com/identity/blogs/
187+
href: https://devblogs.microsoft.com/microsoft365dev/category/microsoft-identity-platform/
188188
- name: Try Sign in with Microsoft
189-
href: https://azure.microsoft.com/develop/identity/signin/
189+
href: https://developer.microsoft.com/identity/add-sign-in-with-microsoft
190190
- name: Getting help
191191
displayName: support, help options
192192
href: ../develop/developer-support-help-options.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
193193
- name: Managed identities for Azure resources
194-
href: ../managed-identities-azure-resources/overview.md
194+
href: ../managed-identities-azure-resources/overview.md

0 commit comments

Comments
 (0)