Skip to content

Commit 4074415

Browse files
authored
Merge pull request #226202 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST 02/03
2 parents 505d46e + 4e02822 commit 4074415

File tree

78 files changed

+862
-900
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

78 files changed

+862
-900
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4416,6 +4416,11 @@
44164416
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
44174417
"redirect_document_id": false
44184418
},
4419+
{
4420+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-reports-latencies.md",
4421+
"redirect_url": "/azure/active-directory/reports-monitoring/reference-azure-ad-sla-performance",
4422+
"redirect_document_id": false
4423+
},
44194424
{
44204425
"source_path_from_root": "/articles/active-directory/customize-branding.md",
44214426
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,11 @@ sections:
119119
answer: |
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122+
- question: |
123+
Why does not proof up for registering other auth methods come up when I use single factor certificates?
124+
answer: |
125+
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
126+
122127
- question: |
123128
How can I use single-factor certificates to complete MFA?
124129
answer: |

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Navigate to the [Microsoft Entra admin center](https://entr.microsoft.com/#home).
24+
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
2525
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.
@@ -37,7 +37,7 @@ This article describes how you can add or remove a new user for a group in Permi
3737

3838
## Remove a user
3939

40-
1. Navigate to the Microsoft [Entra admin center](https://entr.microsoft.com/#home).
40+
1. Navigate to the Microsoft [Entra admin center](https://entra.microsoft.com/#home).
4141
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
4242
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
4343
1. Select the group name for the group you want to remove the user from.

articles/active-directory/devices/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@
9595
href: howto-hybrid-join-downlevel.md
9696
- name: Enforce TLS 1.2
9797
href: reference-device-registration-tls-1-2.md
98-
- name: Graph APIs
98+
- name: Microsoft Graph APIs
9999
href: /graph/api/resources/device
100100
- name: Resources
101101
items:
@@ -110,4 +110,4 @@
110110
- name: Stack Overflow
111111
href: https://stackoverflow.com/questions/tagged/azure-active-directory
112112
- name: Videos
113-
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory
113+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory

articles/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 05/27/2022
11+
ms.date: 02/02/2023
1212
ms.author: jomondi
1313
ms.reviewer: jeedes
1414
ms.collection: M365-identity-device-management
@@ -22,7 +22,7 @@ In this article, we cover common questions and information related to certificat
2222

2323
This tutorial is relevant only to apps that are configured to use Azure AD SSO through [Security Assertion Markup Language](https://wikipedia.org/wiki/Security_Assertion_Markup_Language) (SAML) federation.
2424

25-
Using the information in this tutorial, an administrator of the application learns how to:
25+
In this tutorial, an administrator of the application learns how to:
2626

2727
> [!div class="checklist"]
2828
> * Generate certificates for gallery and non-gallery applications
@@ -41,13 +41,13 @@ Using the information in this tutorial, an administrator of the application lear
4141

4242
When you add a new application from the gallery and configure a SAML-based sign-on (by selecting **Single sign-on** > **SAML** from the application overview page), Azure AD generates a self-signed certificate for the application that is valid for three years. To download the active certificate as a security certificate (**.cer**) file, return to that page (**SAML-based sign-on**) and select a download link in the **SAML Signing Certificate** heading. You can choose between the raw (binary) certificate or the Base64 (base 64-encoded text) certificate. For gallery applications, this section might also show a link to download the certificate as federation metadata XML (an **.xml** file), depending on the requirement of the application.
4343

44-
You can also download an active or inactive certificate by selecting the **SAML Signing Certificate** heading's **Edit** icon (a pencil), which displays the **SAML Signing Certificate** page. Select the ellipsis (**...**) next to the certificate you want to download, and then choose which certificate format you want. You have the additional option to download the certificate in privacy-enhanced mail (PEM) format. This format is identical to Base64 but with a **.pem** file name extension, which isn't recognized in Windows as a certificate format.
44+
You can also download an active or inactive certificate by selecting the **SAML Signing Certificate** heading's **Edit** icon (a pencil), which displays the **SAML Signing Certificate** page. Select the ellipsis (**...**) next to the certificate you want to download, and then choose which certificate format you want. You have the other option to download the certificate in privacy-enhanced mail (PEM) format. This format is identical to Base64 but with a **.pem** file name extension, which isn't recognized in Windows as a certificate format.
4545

4646
:::image type="content" source="media/manage-certificates-for-federated-single-sign-on/all-certificate-download-options.png" alt-text="SAML signing certificate download options (active and inactive).":::
4747

4848
## Customize the expiration date for your federation certificate and roll it over to a new certificate
4949

50-
By default, Azure configures a certificate to expire after three years when it's created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you have to:
50+
By default, Azure configures a certificate to expire after three years when it's created automatically during SAML single sign-on configuration. Because you can't change the date of a certificate after you save it, you've to:
5151

5252
1. Create a new certificate with the desired date.
5353
1. Save the new certificate.
@@ -91,14 +91,16 @@ Next, download the new certificate in the correct format, upload it to the appli
9191

9292
If your application doesn't have any validation for the certificate's expiration, and the certificate matches in both Azure Active Directory and your application, your application is still accessible despite having an expired certificate. Ensure your application can validate the certificate's expiration date.
9393

94+
If you intend to keep certificate expiry validation disabled, then the new certificate shouldn't be created until your scheduled maintenance window for the certificate rollover. If both an expired and an inactive valid certificate exist on the application, Azure AD will automatically utilize the valid certificate. In this case, users may experience application outage.
95+
9496
## Add email notification addresses for certificate expiration
9597

96-
Azure AD will send an email notification 60, 30, and 7 days before the SAML certificate expires. You may add more than one email address to receive notifications. To specify the email address(es) you want the notifications to be sent to:
98+
Azure AD will send an email notification 60, 30, and 7 days before the SAML certificate expires. You may add more than one email address to receive notifications. To specify the email address(es), you want the notifications to be sent to:
9799

98100
1. In the **SAML Signing Certificate** page, go to the **notification email addresses** heading. By default, this heading uses only the email address of the admin who added the application.
99101
1. Below the final email address, type the email address that should receive the certificate's expiration notice, and then press Enter.
100102
1. Repeat the previous step for each email address you want to add.
101-
1. For each email address you want to delete, select the **Delete** icon (a garbage can) next to the email address.
103+
1. For each email address you want to delete, select the **Delete** icon (garbage can) next to the email address.
102104
1. Select **Save**.
103105

104106
You can add up to five email addresses to the Notification list (including the email address of the admin who added the application). If you need more people to be notified, use the distribution list emails.

articles/active-directory/reports-monitoring/reference-reports-latencies.md

Lines changed: 0 additions & 78 deletions
This file was deleted.

articles/active-directory/reports-monitoring/reports-faq.yml

Lines changed: 3 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ metadata:
99
ms.workload: identity
1010
ms.topic: faq
1111
ms.subservice: report-monitor
12-
ms.date: 01/30/2023
12+
ms.date: 02/02/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: besiler
1515
ms.collection: M365-identity-device-management
@@ -47,17 +47,7 @@ sections:
4747
Do I need to be a Global Administrator to see the activity logs in the Azure portal or to get data through the API?
4848
answer: |
4949
No, the [least privilege role](../roles/delegate-by-task.md) to view audit and sign-in logs is **Reports Reader**. Other roles include **Security Reader** and **Security Administrator** for the tenant. You can also access the reporting data through the portal or through the API if you're a Global Administrator.
50-
51-
- question: |
52-
What is the data retention for activity logs (Audit, Sign-ins, and Provisioning) in the Azure portal?
53-
answer: |
54-
For more information, see [data retention policies for Azure AD reports](reference-reports-data-retention.md).
55-
56-
- question: |
57-
How long does it take until I can see the activity data after I've completed my task?
58-
answer: |
59-
Audit logs have a latency ranging from 15 minutes to an hour. Sign-in activity logs can take from 15 minutes to up to 2 hours for some records. If you don’t see the logs even after two hours, [file a support ticket](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest) and we'll look into it.
60-
50+
6151
- question: |
6252
Can I get Microsoft 365 activity log information through the Azure portal?
6353
answer: |
@@ -74,7 +64,7 @@ sections:
7464
You can download up to 250,000 records from the Azure portal. To download data sets larger than 250,000 records, use the [reporting API](/graph/api/resources/azure-ad-auditlog-overview?view=graph-rest-1.0) to download the data.
7565
7666
- question: |
77-
How long does Azure AD store activity logs?
67+
How long does Azure AD store activity logs? What is the data retention?
7868
answer: |
7969
Depending on your license, Azure AD stores activity logs for between 7 and 30 days. For more information, see [Azure Active Directory report retention policies](reference-reports-data-retention.md).
8070

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -109,8 +109,6 @@ items:
109109
href: reference-audit-activities.md
110110
- name: Data retention policies
111111
href: reference-reports-data-retention.md
112-
- name: Reporting latencies
113-
href: reference-reports-latencies.md
114112
- name: Frequently asked questions
115113
href: reports-faq.yml
116114
- name: Sign-in log schema

articles/aks/azure-cni-overlay.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-kubernetes-service
77
ms.subservice: aks-networking
88
ms.topic: how-to
99
ms.custom: references_regions
10-
ms.date: 12/12/2022
10+
ms.date: 02/03/2023
1111
---
1212

1313
# Configure Azure CNI Overlay networking in Azure Kubernetes Service (AKS)
@@ -21,6 +21,8 @@ With Azure CNI Overlay, the cluster nodes are deployed into an Azure Virtual Net
2121
> - North Central US
2222
> - West Central US
2323
> - East US
24+
> - UK South
25+
> - Australia East
2426
2527
## Overview of overlay networking
2628

articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -150,6 +150,11 @@
150150
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/build-training-data-set.md",
151151
"redirect_url": "/azure/applied-ai-services/form-recognizer/how-to-guides/build-a-custom-model?view=form-recog-2.1.0&preserve-view=true",
152152
"redirect_document_id": true
153+
},
154+
{
155+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/try-v3-form-recognizer-studio.md",
156+
"redirect_url": "/azure/applied-ai-services/form-recognizer/quickstarts/try-form-recognizer-studio",
157+
"redirect_document_id": true
153158
}
154159
]
155160
}

0 commit comments

Comments
 (0)