Skip to content

Commit 474d4c3

Browse files
authored
Merge pull request #243730 from MicrosoftDocs/main
Merge main to live, 4AM
2 parents 24657d4 + 579f622 commit 474d4c3

File tree

263 files changed

+4332
-1853
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

263 files changed

+4332
-1853
lines changed

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ items:
3535
href: on-premises-web-services-connector.md
3636
- name: Provisioning with custom connectors
3737
href: on-premises-custom-connector.md
38+
- name: Provisioning to SAP ECC 7.0
39+
href: on-premises-sap-connector-configure.md
3840
- name: Customize attribute mappings
3941
href: customize-application-attributes.md
4042
- name: Concepts

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 1607 deletions
Large diffs are not rendered by default.

articles/active-directory/governance/apps.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: compliance
99
ms.topic: overview
1010
ms.workload: identity
11-
ms.date: 04/28/2023
11+
ms.date: 06/30/2023
1212
ms.author: billmath
1313
ms.custom: contperf-fy21q3-portal
1414
ms.reviewer: amycolannino
@@ -268,6 +268,7 @@ Microsoft Entra identity governance can be integrated with many other applicatio
268268
| SAML-based apps | ||
269269
| [SAP Analytics Cloud](../../active-directory/saas-apps/sap-analytics-cloud-provisioning-tutorial.md) |||
270270
| [SAP Cloud Platform](../../active-directory/saas-apps/sap-cloud-platform-identity-authentication-provisioning-tutorial.md) |||
271+
| [SAP ECC 7.0](../../active-directory/app-provisioning/on-premises-sap-connector-configure.md) || |
271272
| SAP R/3 || |
272273
| [SAP HANA](../../active-directory/saas-apps/saphana-tutorial.md) |||
273274
| [SAP SuccessFactors to Active Directory](../../active-directory/saas-apps/sap-successfactors-inbound-provisioning-tutorial.md) |||

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Premium detections are visible only to Azure AD Premium P2 customers. Customers
5757
| Atypical travel | Offline | This risk detection type identifies two sign-ins originating from geographically distant locations, where at least one of the locations may also be atypical for the user, given past behavior. The algorithm takes into account multiple factors including the time between the two sign-ins and the time it would have taken for the user to travel from the first location to the second. This risk may indicate that a different user is using the same credentials. <br><br> The algorithm ignores obvious "false positives" contributing to the impossible travel conditions, such as VPNs and locations regularly used by other users in the organization. The system has an initial learning period of the earliest of 14 days or 10 logins, during which it learns a new user's sign-in behavior. |
5858
| Anomalous Token | Offline | This detection indicates that there are abnormal characteristics in the token such as an unusual token lifetime or a token that is played from an unfamiliar location. This detection covers Session Tokens and Refresh Tokens. <br><br> **NOTE:** Anomalous token is tuned to incur more noise than other detections at the same risk level. This tradeoff is chosen to increase the likelihood of detecting replayed tokens that may otherwise go unnoticed. Because this is a high noise detection, there's a higher than normal chance that some of the sessions flagged by this detection are false positives. We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user. If the location, application, IP address, User Agent, or other characteristics are unexpected for the user, the tenant admin should consider this risk as an indicator of potential token replay. |
5959
| Token Issuer Anomaly | Offline |This risk detection indicates the SAML token issuer for the associated SAML token is potentially compromised. The claims included in the token are unusual or match known attacker patterns. |
60-
| Malware linked IP address | Offline | This risk detection type indicates sign-ins from IP addresses infected with malware that is known to actively communicate with a bot server. This detection matches the IP addresses of the user's device against IP addresses that were in contact with a bot server while the bot server was active. <br><br> **[This detection has been deprecated](../fundamentals/whats-new-archive.md#planned-deprecation---malware-linked-ip-address-detection-in-identity-protection)**. Identity Protection will no longer generate new "Malware linked IP address" detections. Customers who currently have "Malware linked IP address" detections in their tenant will still be able to view, remediate, or dismiss them until the 90-day detection retention time is reached.|
60+
| Malware linked IP address | Offline | This risk detection type indicates sign-ins from IP addresses infected with malware that is known to actively communicate with a bot server. This detection matches the IP addresses of the user's device against IP addresses that were in contact with a bot server while the bot server was active. <br><br> **This detection has been deprecated**. Identity Protection will no longer generate new "Malware linked IP address" detections. Customers who currently have "Malware linked IP address" detections in their tenant will still be able to view, remediate, or dismiss them until the 90-day detection retention time is reached.|
6161
| Suspicious browser | Offline | Suspicious browser detection indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser. |
6262
| Unfamiliar sign-in properties | Real-time |This risk detection type considers past sign-in history to look for anomalous sign-ins. The system stores information about previous sign-ins, and triggers a risk detection when a sign-in occurs with properties that are unfamiliar to the user. These properties can include IP, ASN, location, device, browser, and tenant IP subnet. Newly created users will be in "learning mode" period where the unfamiliar sign-in properties risk detection will be turned off while our algorithms learn the user's behavior. The learning mode duration is dynamic and depends on how much time it takes the algorithm to gather enough information about the user's sign-in patterns. The minimum duration is five days. A user can go back into learning mode after a long period of inactivity. <br><br> We also run this detection for basic authentication (or legacy protocols). Because these protocols don't have modern properties such as client ID, there's limited telemetry to reduce false positives. We recommend our customers to move to modern authentication. <br><br> Unfamiliar sign-in properties can be detected on both interactive and non-interactive sign-ins. When this detection is detected on non-interactive sign-ins, it deserves increased scrutiny due to the risk of token replay attacks. |
6363
| Malicious IP address | Offline | This detection indicates sign-in from a malicious IP address. An IP address is considered malicious based on high failure rates because of invalid credentials received from the IP address or other IP reputation sources. |

articles/aks/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -618,6 +618,10 @@
618618
href: deploy-application-template.md
619619
- name: Deploy Kubernetes applications with Azure CLI
620620
href: deploy-application-az-cli.md
621+
- name: Deploy Intelligent Apps on AKS
622+
items:
623+
- name: Deploy an application that uses OpenAI on Azure Kubernetes Service (AKS)
624+
href: open-ai-quickstart.md
621625
- name: Deploy the Open Service Mesh AKS add-on
622626
items:
623627
- name: About Open Service Mesh
63.9 KB
Loading
813 KB
Loading
268 KB
Loading
109 KB
Loading

0 commit comments

Comments
 (0)