Skip to content

Commit 4c7f44e

Browse files
authored
Merge pull request #224133 from MicrosoftDocs/main
1/17 AM Publish
2 parents cccdcf6 + dfda3f5 commit 4c7f44e

File tree

99 files changed

+2339
-535
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

99 files changed

+2339
-535
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-monitor/change/change-analysis-query.md",
5+
"redirect_url": "/azure/azure-monitor/change/change-analysis-visualizations",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-monitor/change/change-analysis-custom-filters.md",
10+
"redirect_url": "/azure/azure-monitor/change/change-analysis-visualizations",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/azure-monitor/change/change-analysis-powershell.md",
515
"redirect_url": "/azure/azure-monitor/change/change-analysis",

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ For example, if you listed Alice and Bob as the first stage approver(s), list Ca
155155

156156
1. In the **Forward to alternate approver(s) after how many days** box, put in the number of days the approvers have to approve or deny a request. If no approvers have approved or denied the request before the request duration, the request expires (timeout), and the user will have to submit another request for the access package.
157157

158-
Requests can only be forwarded to alternate approvers a day after the request duration reaches half-life, and the decision of the main approver(s) has to time out after at least four days. If the request time-out is less or equal than three, there isn't enough time to forward the request to alternate approver(s). In this example, the duration of the request is 14 days. So, the request duration reaches half-life at day 7. So the request can't be forwarded earlier than day 8. Also, requests can't be forwarded on the last day of the request duration. So in the example, the latest the request can be forwarded is day 13.
158+
Requests can only be forwarded to alternate approvers a day after the request has been initiated. To use alternate approval, the request time-out needs to be at least 4 days.
159159

160160
## Enable requests
161161

Loading

articles/active-directory/hybrid/how-to-connect-modify-group-writeback.md

Lines changed: 31 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -33,16 +33,38 @@ If the original version of group writeback is already enabled and in use in your
3333
To configure directory settings to disable automatic writeback of newly created Microsoft 365 groups, use one of these methods:
3434

3535
- Azure portal: Update the `NewUnifiedGroupWritebackDefault` setting to `false`.
36-
- PowerShell: Use the [New-AzureADDirectorySetting](../enterprise-users/groups-settings-cmdlets.md) cmdlet. For example:
36+
- PowerShell: Use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true). For example:
3737

3838
```PowerShell
39-
$TemplateId = (Get-AzureADDirectorySettingTemplate | where {$_.DisplayName -eq "Group.Unified" }).Id
40-
$Template = Get-AzureADDirectorySettingTemplate | where -Property Id -Value $TemplateId -EQ
41-
$Setting = $Template.CreateDirectorySetting()
42-
$Setting["NewUnifiedGroupWritebackDefault"] = "False"
43-
New-AzureADDirectorySetting -DirectorySetting $Setting
39+
# Import Module
40+
Import-Module Microsoft.Graph.Identity.DirectoryManagement
41+
42+
#Connect to MgGraph with necessary scope and select the Beta API Version
43+
Connect-MgGraph -Scopes Directory.ReadWrite.All
44+
Select-MgProfile -Name beta
45+
46+
# Import "Group.Unified" template values to a hashtable
47+
$Template = Get-MgDirectorySettingTemplate | Where-Object {$_.DisplayName -eq "Group.Unified"}
48+
$TemplateValues = @{}
49+
$Template.Values | ForEach-Object {
50+
$TemplateValues.Add($_.Name, $_.DefaultValue)
51+
}
52+
53+
# Update the value for new unified group writeback default
54+
$TemplateValues["NewUnifiedGroupWritebackDefault"] = "false"
55+
# Create a directory setting using the Template values hashtable including the updated value
56+
$params = @{}
57+
$params.Add("TemplateId", $Template.Id)
58+
$params.Add("Values", @())
59+
$TemplateValues.Keys | ForEach-Object {
60+
$params.Values += @(@{Name = $_; Value = $TemplateValues[$_]})
61+
}
62+
New-MgDirectorySetting -BodyParameter $params
4463
```
4564

65+
> [!NOTE]
66+
> We recommend using Microsoft Graph PowerShell SDK with [Windows PowerShell 7](/powershell/scripting/whats-new/migrating-from-windows-powershell-51-to-powershell-7?view=powershell-7.3&preserve-view=true).
67+
4668
- Microsoft Graph: Use the [directorySetting](/graph/api/resources/directorysetting?view=graph-rest-beta&preserve-view=true) resource type.
4769

4870
### Disable writeback for all existing Microsoft 365 group
@@ -56,7 +78,7 @@ To disable writeback of all Microsoft 365 groups that were created before these
5678
#Import-module
5779
Import-module Microsoft.Graph
5880
59-
#Connect to MgGraph and select the Beta API Version
81+
#Connect to MgGraph with necessary scope and select the Beta API Version
6082
Connect-MgGraph -Scopes Group.ReadWrite.All
6183
Select-MgProfile -Name beta
6284
@@ -68,8 +90,8 @@ To disable writeback of all Microsoft 365 groups that were created before these
6890
{
6991
Update-MgGroup -GroupId $group.id -WritebackConfiguration @{isEnabled=$false}
7092
}
71-
> We recomend using Microsoft Graph PowerShell SDK with [Windows PowerShell 7](/powershell/scripting/whats-new/migrating-from-windows-powershell-51-to-powershell-7?view=powershell-7.3&preserve-view=true)
72-
93+
```
94+
7395
- Microsoft Graph Explorer: Use a [group object](/graph/api/group-update?tabs=http&view=graph-rest-beta&preserve-view=true).
7496

7597
## Delete groups when they're disabled for writeback or soft deleted

articles/active-directory/saas-apps/digital-pigeon-tutorial.md

Lines changed: 27 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 11/21/2022
12+
ms.date: 01/10/2023
1313
ms.author: jeedes
1414

1515
---
@@ -31,7 +31,8 @@ To integrate Azure Active Directory with Digital Pigeon, you need:
3131
* An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3232
* One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3333
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
34-
* Digital Pigeon single sign-on (SSO) enabled subscription.
34+
* Digital Pigeon single sign-on (SSO) enabled subscription (i.e.: Business or Enterprise plans)
35+
* Digital Pigeon account owner access to the above subscription
3536

3637
## Add application and assign a test user
3738

@@ -46,7 +47,8 @@ Add Digital Pigeon from the Azure AD application gallery to configure single sig
4647
Follow the guidelines in the [create and assign a user account](../manage-apps/add-application-portal-assign-users.md) article to create a test user account in the Azure portal called B.Simon.
4748

4849
> [!NOTE]
49-
> Please click [here](../develop/howto-add-app-roles-in-azure-ad-apps.md#app-roles-ui) to know how to configure Role in Azure AD. Role value is one of 'Digital Pigeon User', 'Digital Pigeon Power User', or 'Digital Pigeon Admin'. If role claim not supplied, default role is configurable in Digital Pigeon app by a Digital Pigeon Owner.
50+
> Please click [here](../develop/howto-add-app-roles-in-azure-ad-apps.md#app-roles-ui) to learn how to configure App Roles in Azure AD. The Role value must be one of 'Digital Pigeon User', 'Digital Pigeon Power User', or 'Digital Pigeon Admin'. If a role claim is not supplied, the default role is configurable in the Digital Pigeon app (`Account Settings > SSO > SAML Provisioning Settings`) by a Digital Pigeon Owner, as seen below:
51+
![Screenshot shows how to configure SAML Provisioning Default Role.](media/digital-pigeon-tutorial/saml-default-role.png "SAML Default Role")
5052

5153
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, and assign roles. The wizard also provides a link to the single sign-on configuration pane in the Azure portal. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides).
5254

@@ -60,22 +62,25 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6062

6163
![Screenshot shows to edit Basic SAML Configuration.](common/edit-urls.png "Basic Configuration")
6264

63-
1. On the **Basic SAML Configuration** section, perform the following steps:
65+
1. In another browser tab, log in to Digital Pigeon as an account administrator.
6466

65-
a. In the **Identifier** textbox, type a URL using the following pattern:
66-
`https://digitalpigeon.com/saml2/service-provider-metadata/<CustomerID>`
67+
1. Navigate to **Account Settings > SSO** and copy the **SP Entity ID** and **SP ACS URL** values.
6768

68-
b. In the **Reply URL** textbox, type a URL using the following pattern:
69-
`https://digitalpigeon.com/login/saml2/sso/<CustomerID>`
69+
![Screenshot shows Digital Pigeon SAML Service Provider Settings.](media/digital-pigeon-tutorial/saml-service-provider-settings.png "SAML Service Provider Settings")
70+
71+
1. Now in Azure AD, in the **Basic SAML Configuration** section, perform the following steps:
72+
73+
a. In the **Identifier** textbox, paste the value from _Digital Pigeon > Account Settings > SSO > **SP Entity ID**_.
74+
It should match the following pattern: `https://digitalpigeon.com/saml2/service-provider-metadata/<CustomerID>`
75+
76+
b. In the **Reply URL** textbox, paste the value from _Digital Pigeon > Account Settings > SSO > **SP ACS URL**_.
77+
It should match the following pattern: `https://digitalpigeon.com/login/saml2/sso/<CustomerID>`
7078

7179
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
7280

7381
In the **Sign on URL** textbox, type the URL:
7482
`https://digitalpigeon.com/login`
7583

76-
> [!NOTE]
77-
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Digital Pigeon Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
78-
7984
1. Digital Pigeon application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
8085

8186
![Screenshot shows the image of attributes configuration.](common/default-attributes.png "Attributes")
@@ -91,13 +96,19 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
9196

9297
![Screenshot shows the Certificate download link.](common/metadataxml.png "Certificate")
9398

94-
1. On the **Set up Digital Pigeon** section, copy the appropriate URL(s) based on your requirement.
99+
1. In Digital Pigeon, paste the content of downloaded **Federation Metadata XML** file into the **IDP Metadata XML** text field.
100+
101+
![Screenshot shows IDP Metadata XML.](media/digital-pigeon-tutorial/idp-metadata-xml.png "IDP Metadata XML")
102+
103+
1. In Azure AD, on the **Set up Digital Pigeon** section, copy the Azure AD Identifier URL.
95104

96105
![Screenshot shows to copy configuration appropriate U R L.](common/copy-configuration-urls.png "Metadata")
97106

98-
## Configure Digital Pigeon SSO
107+
1. In Digital Pigeon, paste this URL into the **IDP Entity ID** text field.
108+
109+
![Screenshot shows IDP Entity ID.](media/digital-pigeon-tutorial/idp-entity-id.png "IDP Entity ID")
99110

100-
To configure single sign-on on **Digital Pigeon** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Digital Pigeon support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
111+
1. Click **Save** button to activate Digital Pigeon SSO.
101112

102113
### Create Digital Pigeon test user
103114

@@ -121,6 +132,8 @@ You can also use Microsoft My Apps to test the application in any mode. When you
121132

122133
## Additional resources
123134

135+
* Should you run into any issues or require additional support, please contact the [Digital Pigeon support team](mailto:[email protected])
136+
* For an alternative step-by-step guide, please refer to the Digital Pigeon KB article: [Azure AD SSO Configuration](https://digitalpigeon.zendesk.com/hc/en-us/articles/5403612403855-Azure-AD-SSO-Configuration)
124137
* [What is single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
125138
* [Plan a single sign-on deployment](../manage-apps/plan-sso-deployment.md).
126139

articles/active-directory/saas-apps/kintone-tutorial.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/13/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure AD SSO integration with Kintone
@@ -71,12 +71,8 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7171

7272
4. On the **Basic SAML Configuration** section, perform the following steps:
7373

74-
a. In the **Identifier (Entity ID)** text box, type a URL using one of the following patterns:
75-
76-
| **Identifier** |
77-
|---|
78-
| `https://<companyname>.cybozu.com` |
79-
| `https://<companyname>.kintone.com` |
74+
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
75+
`https://<companyname>.kintone.com`
8076

8177
b. In the **Sign on URL** text box, type a URL using the following pattern:
8278
`https://<companyname>.kintone.com`
14.6 KB
Loading
19.6 KB
Loading
16.8 KB
Loading
16.1 KB
Loading

0 commit comments

Comments
 (0)