Skip to content

Commit 39bb182

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into pauljewell-azurite-update
2 parents 8fd041e + 845593f commit 39bb182

File tree

1,325 files changed

+14401
-12133
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,325 files changed

+14401
-12133
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -994,6 +994,7 @@
994994
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
995995
"articles/postgresql/.openpublishing.redirection.postgresql.json",
996996
"articles/purview/.openpublishing.redirection.purview.json",
997+
"articles/sap/.openpublishing.redirection.sap.json",
997998
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
998999
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
9991000
"articles/spring-apps/.openpublishing.redirection.spring-apps.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5703,13 +5703,18 @@
57035703
"redirect_document_id": false
57045704
},
57055705
{
5706+
"source_path_from_root": "/articles/azure-monitor/alerts/proactive-performance-diagnostics.md",
5707+
"redirect_url": "https://azure.microsoft.com/updates/public-preview-alerts-based-smart-detection-for-application-insights/",
5708+
"redirect_document_id": false
5709+
},
5710+
{
57065711
"source_path_from_root": "/articles/azure-monitor/autoscale/autoscale-resource-log-schema.md",
57075712
"redirect_url": "/azure/azure-monitor/autoscale/autoscale-diagnostics",
57085713
"redirect_document_id": false
57095714
},
5710-
{
5711-
"source_path_from_root": "/articles/azure-monitor/alerts/proactive-performance-diagnostics.md",
5712-
"redirect_url": "https://azure.microsoft.com/updates/public-preview-alerts-based-smart-detection-for-application-insights/",
5715+
{
5716+
"source_path_from_root": "/articles/azure-monitor/app/java-in-process-agent.md",
5717+
"redirect_url": "/azure/azure-monitor/app/opentelemetry-enable",
57135718
"redirect_document_id": false
57145719
}
57155720
]

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22695,6 +22695,11 @@
2269522695
"source_path": "articles/application-gateway/tutorial-protect-application-gateway.md",
2269622696
"redirect_URL": "/azure/application-gateway/tutorial-protect-application-gateway-ddos",
2269722697
"redirect_document_id": false
22698+
},
22699+
{
22700+
"source_path": "articles/virtual-machines/workloads/sap/index.md",
22701+
"redirect_URL": "/azure/sap/workloads/get-started",
22702+
"redirect_document_id": false
2269822703
}
2269922704
]
2270022705
}

articles/active-directory-b2c/faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ metadata:
33
title: 'Frequently asked questions (FAQ) for Azure Active Directory B2C'
44
description: Answers to frequently asked questions about Azure Active Directory B2C.
55
services: active-directory-b2c
6-
author: kengaderdus
6+
author: garrodonnell
77
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: faq
12-
ms.date: 01/03/2022
13-
ms.author: kengaderdus
12+
ms.date: 02/09/2023
13+
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: "b2c-support"
1616
title: 'Azure AD B2C: Frequently asked questions (FAQ)'

articles/active-directory-b2c/identity-provider-generic-saml.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,10 +139,10 @@ The **OutputClaims** element contains a list of claims returned by the SAML iden
139139

140140
In the example above, *Contoso-SAML2* includes the claims returned by a SAML identity provider:
141141

142-
* The **issuerUserId** claim is mapped to the **assertionSubjectName** claim.
142+
* The **assertionSubjectName** claim is mapped to the **issuerUserId** claim.
143143
* The **first_name** claim is mapped to the **givenName** claim.
144144
* The **last_name** claim is mapped to the **surname** claim.
145-
* The **displayName** claim is mapped to the `http://schemas.microsoft.com/identity/claims/displayname` claim.
145+
* The `http://schemas.microsoft.com/identity/claims/displayname` claim is mapped to the **displayName** claim.
146146
* The **email** claim without name mapping.
147147

148148
The technical profile also returns claims that aren't returned by the identity provider:
@@ -237,4 +237,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
237237

238238
- [Configure SAML identity provider options with Azure Active Directory B2C](identity-provider-generic-saml-options.md)
239239

240-
::: zone-end
240+
::: zone-end

articles/active-directory/authentication/concept-certificate-based-authentication-smartcard.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,11 @@ The Windows smart card sign-in works with the latest preview build of Windows 11
7373
|✅ | ✅ | ✅ |✅ |
7474

7575
>[!NOTE]
76-
>Azure AD CBA supports both certificates on-device as well as external storage like security keys on Windows.
76+
>Azure AD CBA supports both certificates on-device as well as external storage like security keys on Windows.
77+
78+
## Windows Out of the box experience (OOBE)
79+
80+
Windows OOBE should allow the user to login using an external smart card reader and authenticate against Azure AD CBA. Windows OOBE by default should have the necessary smart card drivers or the smart card drivers previously added to the Windows image before OOBE setup.
7781

7882
## Restrictions and caveats
7983

Loading
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/usage-analytics-active-tasks.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 02/08/2023
1212
ms.author: jfields
1313
---
1414

@@ -48,11 +48,10 @@ When you select **Active Tasks**, the **Analytics** dashboard provides a high-le
4848
The **Active Tasks** table displays the results of your query.
4949

5050
- **Task Name**: Provides the name of the task.
51-
- To view details about the task, select the down arrow in the table.
51+
- To view details about the task, select the down arrow next to the task in the table.
5252

53-
- A **Normal Task** icon displays to the left of the task name if the task is normal (that is, not risky).
54-
- A **Deleted Task** icon displays to the left of the task name if the task involved deleting data.
55-
- A **High-Risk Task** icon displays to the left of the task name if the task is high-risk.
53+
- An icon (![Image of task icon](media/usage-analytics-active-tasks/normal-task.png)) displays to the left of the task name if the task is a **Normal Task** (that is, not risky).
54+
- A highlighted icon (![Image of highlighted task icon](media/usage-analytics-active-tasks/high-risk-deleted-task.png)) displays to the left of the task name if the task involved deleting data — a **High-Delete Task** — or if the task is a **High-Risk Task**.
5655

5756
- **Performed on (resources)**: The number of resources on which the task was used.
5857

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ When Conditional Access policy or group membership changes need to be applied to
179179
Modern networks often optimize connectivity and network paths for applications differently. This optimization frequently causes variations of the routing and source IP addresses of connections, as seen by your identity provider and resource providers. You may observe this split path or IP address variation in multiple network topologies, including, but not limited to:
180180

181181
- On-premises and cloud-based proxies.
182-
- Virtual private network (VPN) implementations, like split tunneling.
182+
- Virtual private network (VPN) implementations, like [split tunneling](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel).
183183
- Software defined wide area network (SD-WAN) deployments.
184184
- Load balanced or redundant network egress network topologies, like those using [SNAT](https://wikipedia.org/wiki/Network_address_translation#SNAT).
185185
- Branch office deployments that allow direct internet connectivity for specific applications.
@@ -189,9 +189,10 @@ Modern networks often optimize connectivity and network paths for applications d
189189
In addition to IP variations, customers also may employ network solutions and services that:
190190

191191
- Use IP addresses that may be shared with other customers. For example, cloud-based proxy services where egress IP addresses are shared between customers.
192-
- Use easily varied or undefinable IP addresses. For example, topologies where there are large, dynamic sets of egress IP addresses used, like large enterprise scenarios or split VPN and local egress network traffic.
192+
- Use easily varied or undefinable IP addresses. For example, topologies where there are large, dynamic sets of egress IP addresses used, like large enterprise scenarios or [split VPN](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel) and local egress network traffic.
193+
194+
Networks where egress IP addresses may change frequently or are shared may affect Azure AD Conditional Access and Continues Access Evaluation (CAE). This variability can affect how these features work and their recommended configurations. Split Tunneling may also cause unexpected blocks when an environment is configured using [Split Tunneling VPN Best Practices](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel). Routing [Optimized IPs](/microsoft-365/enterprise/microsoft-365-vpn-implement-split-tunnel#optimize-ip-address-ranges) through a Trusted IP/VPN may be required to prevent blocks related to "insufficient_claims" or "Instant IP Enforcement check failed".
193195

194-
Networks where egress IP addresses may change frequently or are shared may affect Azure AD Conditional Access and Continues Access Evaluation (CAE). This variability can affect how these features work, and their recommended configurations.
195196

196197
The following table summarizes Conditional Access and CAE feature behaviors and recommendations for different types of network deployments:
197198

0 commit comments

Comments
 (0)