Skip to content

Commit 47283a6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-aadroles-roles-microsoft-hardware-warranty
2 parents 4d30121 + f82c90b commit 47283a6

File tree

66 files changed

+740
-1704
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+740
-1704
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@
99
"source_path_from_root": "/articles/api-management/developer-portal-use-community-widgets.md",
1010
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
1111
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/sentinel/whats-new-archive.md",
15+
"redirect_url": "/azure/sentinel/whats-new",
16+
"redirect_document_id": false
1217
},
1318
{
1419
"source_path": "articles/backup/sap-hana-db-manage.md",

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,9 @@ If MFA is required for the resource tenant, the guest user needs to perform MFA
169169
### Expiration
170170

171171
An expired or deleted Temporary Access Pass can’t be used for interactive or non-interactive authentication.
172-
Users need to reauthenticate with different authentication methods after the Temporary Access Pass is expired or deleted.
172+
Users need to reauthenticate with different authentication methods after the Temporary Access Pass is expired or deleted.
173+
174+
The token lifetime (session token, refresh token, access token, etc.) obtained via a Temporary Access Pass login will be limited to the Temporary Access Pass lifetime. As a result, a Temporary Access Pass expiring will lead to the expiration of the associated token.
173175

174176
## Delete an expired Temporary Access Pass
175177

articles/active-directory/develop/app-objects-and-service-principals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/20/2022
12+
ms.date: 11/02/2022
1313
ms.author: ryanwi
1414
ms.custom: contperf-fy21q4-portal, aaddev, identityplatformtop40
1515
ms.reviewer: sureshja

articles/active-directory/develop/application-model.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 09/27/2021
12+
ms.date: 11/02/2022
1313
ms.author: ryanwi
1414
ms.reviewer: jmprieur, saeeda, sureshja, ludwignick
1515
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started

articles/active-directory/develop/authentication-vs-authorization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 08/26/2022
12+
ms.date: 11/02/2022
1313
ms.author: ryanwi
1414
ms.reviewer: jmprieur, saeeda, sureshja, ludwignick
1515
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started

articles/active-directory/develop/howto-modify-supported-accounts.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,10 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 11/15/2020
12+
ms.date: 11/02/2022
1313
ms.author: ryanwi
1414
ms.custom: aaddev
15-
ms.reviewer: marsma, aragra, lenalepa, sureshja
15+
ms.reviewer: aragra, sureshja
1616
# Customer intent: As an application developer, I need to know how to modify which account types can sign in to or access my application or API.
1717
---
1818

@@ -33,14 +33,17 @@ To specify a different setting for the account types supported by an existing ap
3333
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
3434
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant in which the app is registered.
3535
1. Search for and select **Azure Active Directory**.
36-
1. Under **Manage**, select **App registrations**, then select your application.
37-
1. Now, specify who can use the application, sometimes referred to as the *sign-in audience*.
38-
39-
| Supported account types | Description |
40-
|-------------------------|-------------|
41-
| **Accounts in this organizational directory only** | Select this option if you're building an application for use only by users (or guests) in *your* tenant.<br><br>Often called a *line-of-business* (LOB) application, this is a **single-tenant** application in the Microsoft identity platform. |
42-
| **Accounts in any organizational directory** | Select this option if you'd like users in *any* Azure AD tenant to be able to use your application. This option is appropriate if, for example, you're building a software-as-a-service (SaaS) application that you intend to provide to multiple organizations.<br><br>This is known as a **multi-tenant** application in the Microsoft identity platform. |
43-
1. Select **Save**.
36+
1. Under **Manage**, select **App registrations**, select your application, and then select **Manifest** to use the manifest editor.
37+
1. Download the manifest JSON file locally.
38+
1. Now, specify who can use the application, sometimes referred to as the *sign-in audience*. Find the *signInAudience* property in the manifest JSON file and set it to one of the following property values:
39+
40+
| Property value | Supported account types | Description |
41+
|----------------|-------------------------|-------------|
42+
| **AzureADMyOrg** | Accounts in this organizational directory only (Microsoft only - Single tenant) |All user and guest accounts in your directory can use your application or API. Use this option if your target audience is internal to your organization. |
43+
| **AzureADMultipleOrgs** | Accounts in any organizational directory (Any Azure AD directory - Multitenant) | All users with a work or school account from Microsoft can use your application or API. This includes schools and businesses that use Office 365. Use this option if your target audience is business or educational customers and to enable multitenancy. |
44+
| **AzureADandPersonalMicrosoftAccount** | Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox) | All users with a work or school, or personal Microsoft account can use your application or API. It includes schools and businesses that use Office 365 as well as personal accounts that are used to sign in to services like Xbox and Skype. Use this option to target the widest set of Microsoft identities and to enable multitenancy.|
45+
| **PersonalMicrosoftAccount** | Personal Microsoft accounts only | Personal accounts that are used to sign in to services like Xbox and Skype. Use this option to target the widest set of Microsoft identities.|
46+
1. Save your changes to the JSON file locally, then select **Upload** in the manifest editor to upload the updated manifest JSON file.
4447

4548
### Why changing to multi-tenant can fail
4649

articles/active-directory/develop/single-and-multi-tenant-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 10/13/2021
12+
ms.date: 11/02/2022
1313
ms.author: ryanwi
1414
ms.reviewer: justhu
1515
ms.custom: aaddev

articles/active-directory/develop/workload-identities-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: develop
88
ms.workload: identity
99
ms.topic: conceptual
10-
ms.date: 12/06/2021
10+
ms.date: 11/02/2022
1111
ms.author: ryanwi
1212
ms.reviewer: udayh, ilanas
1313
ms.custom: aaddev

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,19 @@ If you want all the latest features and updates, check this page and install wha
7777

7878
To read more about auto-upgrade, see [Azure AD Connect: Automatic upgrade](how-to-connect-install-automatic-upgrade.md).
7979

80+
## 2.1.19.0
81+
82+
### Release status:
83+
11/2/2022: Released for download
84+
85+
### Functional changes
86+
87+
- We added a new attribute 'employeeLeaveDateTime' for syncing to Azure AD
88+
89+
### Bug fixes
90+
91+
- we fixed a bug where Azure AD Connect Password writeback stopped with error code "SSPR_0029 ERROR_ACCESS_DENIED"
92+
8093
## 2.1.18.0
8194

8295
### Release status:

articles/aks/use-pod-security-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ ms.date: 03/25/2021
88

99
# Preview - Secure your cluster using pod security policies in Azure Kubernetes Service (AKS)
1010

11-
[!Important]
12-
The feature described in this document, pod security policy (preview), will begin deprecation with Kubernetes version 1.21, with its removal in version 1.25. AKS will mark Pod Security Policy as "Deprecated" in the AKS API on 04-01-2023. You can now Migrate Pod Security Policy to Pod Security Admission Controller ahead of the deprecation.
11+
> [!Important]
12+
> The feature described in this article, pod security policy (preview), will be deprecated starting with Kubernetes version 1.21, and it will be removed in version 1.25. AKS will mark the pod security policy as Deprecated with the AKS API on 04-01-2023. You can migrate pod security policy to pod security admission controller before the deprecation deadline.
1313
1414
After pod security policy (preview) is deprecated, you must have already migrated to Pod Security Admission controller or disabled the feature on any existing clusters using the deprecated feature to perform future cluster upgrades and stay within Azure support.
1515

0 commit comments

Comments
 (0)