Skip to content

Commit 3f57974

Browse files
authored
Merge branch 'main' into jun1-editing-fixes
2 parents be12e95 + ec76f98 commit 3f57974

File tree

228 files changed

+878
-924
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

228 files changed

+878
-924
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 78 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,65 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-monitor/app/profiler.md",
5+
"redirect_url": "/azure/azure-monitor/profiler/profiler",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-monitor/app/profiler-aspnetcore-linux.md",
10+
"redirect_url": "/azure/azure-monitor/profiler/profiler-aspnetcore-linux",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-monitor/app/profiler-azure-functions.md",
15+
"redirect_url": "/azure/azure-monitor/profiler/profiler-azure-functions",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/azure-monitor/app/profiler-bring-your-own-storage.md",
20+
"redirect_url": "/azure/azure-monitor/profiler/profiler-bring-your-own-storage",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/azure-monitor/app/profiler-cloudservice.md",
25+
"redirect_url": "/azure/azure-monitor/profiler/profiler-cloudservice",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/azure-monitor/app/profiler-containers.md",
30+
"redirect_url": "/azure/azure-monitor/profiler/profiler-containers",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path_from_root": "/articles/azure-monitor/app/profiler-overview.md",
35+
"redirect_url": "/azure/azure-monitor/profiler/profiler-overview",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/profiler-servicefabric.md",
40+
"redirect_url": "/azure/azure-monitor/profiler/profiler-servicefabric",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/profiler-settings.md",
45+
"redirect_url": "/azure/azure-monitor/profiler/profiler-settings",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/azure-monitor/app/profiler-trackrequests.md",
50+
"redirect_url": "/azure/azure-monitor/profiler/profiler-trackrequests",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/azure-monitor/app/profiler-troubleshooting.md",
55+
"redirect_url": "/azure/azure-monitor/profiler/profiler-troubleshooting",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/articles/azure-monitor/app/profiler-vm.md",
60+
"redirect_url": "/azure/azure-monitor/profiler/profiler-vm",
61+
"redirect_document_id": false
62+
},
363
{
464
"source_path_from_root": "/articles/azure-monitor/app/app-insights-dashboards.md",
565
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
@@ -102,22 +162,37 @@
102162
},
103163
{
104164
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric-overview.md" ,
105-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
165+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
106166
"redirect_document_id": false
107167
},
108168
{
109169
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-instances.md" ,
110170
"redirect_url": "/azure/azure-monitor/alerts/alerts-page.md",
111171
"redirect_document_id": false
112172
},
173+
{
174+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-alert-states.md" ,
175+
"redirect_url": "/azure/azure-monitor/alerts/alerts-page",
176+
"redirect_document_id": false
177+
},
113178
{
114179
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-unified-log.md" ,
115-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
180+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
116181
"redirect_document_id": false
117182
},
118183
{
119184
"source_path_from_root": "/articles/azure-monitor/alerts/activity-log-alerts.md" ,
120-
"redirect_url": "/azure/azure-monitor/alerts/alert-types.md",
185+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-smartgroups-overview.md" ,
190+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-managing-smart-groups.md" ,
195+
"redirect_url": "/azure/azure-monitor/alerts/alerts-types",
121196
"redirect_document_id": false
122197
},
123198
{

articles/active-directory-b2c/partner-asignio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Follow the steps mentioned in [this tutorial](tutorial-register-applications.md?
114114
| Property | Value |
115115
|:--------|:-------------|
116116
|Name | Login with Asignio *(or a name of your choice)*
117-
|Metadata URL | https://authorization.asignio.com/.well-known/openid-configuration|
117+
|Metadata URL | `https://authorization.asignio.com/.well-known/openid-configuration`|
118118
| Client ID | enter the client ID that you previously generated in [step 1](#step-1-configure-an-application-with-asignio)|
119119
|Client Secret | enter the Client secret that you previously generated in [step 1](#step-1-configure-an-application-with-asignio)|
120120
| Scope | openid email profile |

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/17/2021
9+
ms.date: 06/01/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -35,7 +35,7 @@ The following options are available to include when creating a Conditional Acces
3535
- All guest and external users
3636
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
3737
- Directory roles
38-
- Allows administrators to select specific built-in Azure AD directory roles used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types are not supported, including administrative unit-scoped roles and custom roles.
38+
- Allows administrators to select specific built-in Azure AD directory roles used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
3939
- Users and groups
4040
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of user group in Azure AD, including dynamic or assigned security and distribution groups. Policy will be applied to nested users and groups.
4141

@@ -50,7 +50,7 @@ The following options are available to include when creating a Conditional Acces
5050
5151
## Exclude users
5252

53-
When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they are important can be found in the following articles:
53+
When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they're important can be found in the following articles:
5454

5555
* [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md)
5656
* [Create a resilient access control management strategy with Azure Active Directory](../authentication/concept-resilient-controls.md)
@@ -66,15 +66,19 @@ The following options are available to exclude when creating a Conditional Acces
6666

6767
### Preventing administrator lockout
6868

69-
To prevent an administrator from locking themselves out of their directory when creating a policy applied to **All users** and **All apps**, they will see the following warning.
69+
To prevent an administrator from locking themselves out of their directory when creating a policy applied to **All users** and **All apps**, they'll see the following warning.
7070

7171
> Don't lock yourself out! We recommend applying a policy to a small set of users first to verify it behaves as expected. We also recommend excluding at least one administrator from this policy. This ensures that you still have access and can update a policy if a change is required. Please review the affected users and apps.
7272
7373
By default the policy will provide an option to exclude the current user from the policy, but this default can be overridden by the administrator as shown in the following image.
7474

7575
![Warning, don't lock yourself out!](./media/concept-conditional-access-users-groups/conditional-access-users-and-groups-lockout-warning.png)
7676

77-
If you do find yourself locked out, see [What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
77+
If you do find yourself locked out, see [What to do if you're locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
78+
79+
### External partner access
80+
81+
Conditional Access policies that target external users may interfere with service provider access, for example granular delegated admin privileges [Introduction to granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction).
7882

7983
## Next steps
8084

articles/active-directory/fundamentals/7-secure-access-conditional-access.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,10 @@ There may be times you want to block external users except a specific group. For
8989

9090
After confirming your settings using [report-only mode](../conditional-access/howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
9191

92+
### External partner access
93+
94+
Conditional Access policies that target external users may interfere with service provider access, for example granular delegated admin privileges [Introduction to granular delegated admin privileges (GDAP)](/partner-center/gdap-introduction).
95+
9296
## Implement Conditional Access
9397

9498
Many common Conditional Access policies are documented. See the article [Common Conditional Access policies](../conditional-access/concept-conditional-access-policy-common.md) for other common policies you may want to adapt for external users.

articles/active-directory/manage-apps/add-application-portal-setup-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: 'Quickstart: Enable single sign-on for an enterprise application'
33
titleSuffix: Microsoft Entra
44
description: Enable single sign-on for an enterprise application in Azure Active Directory.
55
services: active-directory
6-
author: omondiatieno
6+
author: davidmu1
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.topic: quickstart
1111
ms.workload: identity
1212
ms.date: 09/21/2021
13-
ms.author: jomondi
13+
ms.author: davidmu
1414
ms.reviewer: ergleenl
1515
ms.custom: contperf-fy22q2, mode-other
1616
#Customer intent: As an administrator of an Azure AD tenant, I want to enable single sign-on for an enterprise application.

articles/api-management/api-management-howto-create-or-invite-developers.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,8 @@ When a developer is invited, an email is sent to the developer. This email is ge
5252

5353
Once the invitation is accepted, the account becomes active.
5454

55+
Invitation link will be active for 2 days.
56+
5557
## <a name="block-developer"> </a> Deactivate or reactivate a developer account
5658

5759
By default, newly created or invited developer accounts are **Active**. To deactivate a developer account, click **Block**. To reactivate a blocked developer account, click **Activate**. A blocked developer account can't access the developer portal or call any APIs. To delete a user account, click **Delete**.
4.09 KB
Loading
-18.6 KB
Loading
51.8 KB
Loading
15.9 KB
Loading

0 commit comments

Comments
 (0)