Skip to content

Commit 44b0466

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-startvm-character
2 parents a2bcd6e + af7bd67 commit 44b0466

File tree

58 files changed

+314
-349
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+314
-349
lines changed

articles/active-directory-b2c/partner-idemia.md

Lines changed: 128 additions & 145 deletions
Large diffs are not rendered by default.

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 01/29/2023
11+
ms.date: 03/10/2023
1212
ms.author: justinha
1313
---
1414

@@ -174,11 +174,11 @@ Before you begin the migration process, complete the following initial checks an
174174

175175
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
176176

177-
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
178-
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
179-
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
180-
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
181-
| 636 | TCP | AzureActiveDirectoryDomainServices | Inbound | Allow | Optional | Secure LDAP. |
177+
| Source | Source service tag | Source port ranges | Destination | Service | Destination port ranges | Protocol | Action | Required | Purpose |
178+
|:-----------:|:----------------------------------:|:------------------:|:-------------:|:-------:|:-----------------------:|:--------:|:------:|:--------:|:--------|
179+
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 5986 | TCP | Allow | Yes | Management of your domain |
180+
| Service tag | CorpNetSaw | * | Any | WinRM | 3389 | TCP | Allow | Optional | Debugging for support |
181+
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 636 | TCP | Allow | Optional | Secure LDAP |
182182

183183
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
184184

articles/active-directory/develop/supported-accounts-validation.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,17 +15,19 @@ ms.reviewer: manrath, sureshja
1515

1616
# Validation differences by supported account types (signInAudience)
1717

18-
When registering an application with the Microsoft identity platform for developers, you're asked to select which account types your application supports. In the application object and manifest, this property is `signInAudience`.
18+
When registering an application with the Microsoft identity platform for developers, you're asked to select which account types your application supports. You can refer to the **Help me choose** link under **Supported account types** during the registration process. The value you select for this property has implications on other app object properties.
1919

20-
The options include the following values:
20+
After the application has been registered, you can check or change the account type that the application supports at any time. Under the **Manage** pane of your application, search for **Manifest** and find the `signInAudience` value. The different account types, and the corresponding `signInAudience` are shown in the following table:
2121

22-
- **AzureADMyOrg**: Only accounts in the organizational directory where the app is registered (single-tenant).
23-
- **AzureADMultipleOrgs**: Accounts in any organizational directory (multi-tenant).
24-
- **AzureADandPersonalMicrosoftAccount**: Accounts in any organizational directory (multi-tenant) and personal Microsoft accounts (for example, Skype, Xbox, and Outlook.com).
22+
| Supported account types (Register an application) | `signInAudience` (Manifest) |
23+
|---------------------------------------------------|-----------------------------|
24+
| Accounts in this organizational directory only (Single tenant) | `AzureADMyOrg` |
25+
| Accounts in any organizational directory (Any Azure AD directory - Multitenant) | `AzureADMultipleOrgs` |
26+
| Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox) | `AzureADandPersonalMicrosoftAccount` |
2527

26-
For registered applications, you can find the value for supported account types on the **Authentication** section of an application. You can also find it under the `signInAudience` property in the **Manifest**.
28+
If you change this property you may need to change other properties first.
2729

28-
The value you select for this property has implications on other app object properties. As a result, if you change this property you may need to change other properties first.
30+
## Validation differences
2931

3032
See the following table for the validation differences of various properties for different supported account types.
3133

articles/active-directory/saas-apps/advance-kerbf5-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ When you click the F5 tile in the Access Panel, you should be automatically sign
332332
333333
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
334334
335-
- [Try F5 with Azure AD](https://aad.portal.azure.com/)
335+
336336
337337
- [Configure F5 single sign-on for Header Based application](headerf5-tutorial.md)
338338

articles/active-directory/saas-apps/bright-pattern-omnichannel-contact-center-tutorial.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,5 +164,3 @@ When you click the Bright Pattern Omnichannel Contact Center tile in the Access
164164
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
165165

166166
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
167-
168-
- [Try Bright Pattern Omnichannel Contact Center with Azure AD](https://aad.portal.azure.com/)

articles/active-directory/saas-apps/cloudpassage-tutorial.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,8 +211,6 @@ When you click the CloudPassage tile in the Access Panel, you should be automati
211211

212212
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
213213

214-
- [Try CloudPassage with Azure AD](https://aad.portal.azure.com/)
215-
216214
<!--Image references-->
217215

218216
[12]: ./media/cloudpassage-tutorial/tutorial_cloudpassage_07.png

articles/active-directory/saas-apps/collaborativeinnovation-tutorial.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,4 +160,3 @@ When you click the Collaborative Innovation tile in the Access Panel, you should
160160

161161
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
162162

163-
- [Try Collaborative Innovation with Azure AD](https://aad.portal.azure.com/)

articles/active-directory/saas-apps/coralogix-tutorial.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,5 +167,3 @@ When you click the Coralogix tile in the Access Panel, you should be automatical
167167
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
168168

169169
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
170-
171-
- [Try Coralogix with Azure AD](https://aad.portal.azure.com/)

articles/active-directory/saas-apps/crossknowledge-learning-suite-tutorial.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,8 +149,6 @@ When you click the CrossKnowledge Learning Suite tile in the Access Panel, you s
149149

150150
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
151151

152-
- [Try CrossKnowledge Learning Suite with Azure AD](https://aad.portal.azure.com/)
153-
154152
- [What is session control in Microsoft Defender for Cloud Apps?](/cloud-app-security/proxy-intro-aad)
155153

156154
- [How to protect CrossKnowledge Learning Suite with advanced visibility and controls](/cloud-app-security/proxy-intro-aad)

articles/active-directory/saas-apps/dovetale-tutorial.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -161,5 +161,3 @@ When you click the Dovetale tile in the Access Panel, you should be automaticall
161161
- [What is application access and single sign-on with Azure Active Directory? ](../manage-apps/what-is-single-sign-on.md)
162162

163163
- [What is conditional access in Azure Active Directory?](../conditional-access/overview.md)
164-
165-
- [Try Dovetale with Azure AD](https://aad.portal.azure.com/)

0 commit comments

Comments
 (0)