Skip to content

Commit 52e2377

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into PIM
2 parents a218881 + c6c5fdb commit 52e2377

File tree

331 files changed

+3150
-1666
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

331 files changed

+3150
-1666
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -248,6 +248,12 @@
248248
"branch": "main",
249249
"branch_mapping": {}
250250
},
251+
{
252+
"path_to_root": "azure-functions-nodejs-v4",
253+
"url": "https://github.com/Azure/azure-functions-nodejs-samples",
254+
"branch": "main",
255+
"branch_mapping": {}
256+
},
251257
{
252258
"path_to_root": "azure-functions-durable-js",
253259
"url": "https://github.com/Azure/azure-functions-durable-js",

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/active-directory/saas-apps/gainsight-tutorial",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path_from_root": "/articles/active-directory/saas-apps/planview-id-tutorial.md",
110+
"redirect_url": "/azure/active-directory/saas-apps/planview-admin-tutorial",
111+
"redirect_document_id": false
112+
},
108113
{
109114
"source_path_from_root": "/articles/active-directory/saas-apps/postman-provisioning-tutorialy.md",
110115
"redirect_url": "/azure/active-directory/saas-apps/postman-provisioning-tutorial",

.openpublishing.redirection.json

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14855,47 +14855,47 @@
1485514855
{
1485614856
"source_path_from_root": "/articles/scheduler/scheduler-intro.md",
1485714857
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14858-
"redirect_document_id": ""
14858+
"redirect_document_id": false
1485914859
},
1486014860
{
1486114861
"source_path_from_root": "/articles/scheduler/scheduler-advanced-complexity.md",
1486214862
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14863-
"redirect_document_id": ""
14863+
"redirect_document_id": false
1486414864
},
1486514865
{
1486614866
"source_path_from_root": "/articles/scheduler/scheduler-concepts-terms.md",
1486714867
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14868-
"redirect_document_id": ""
14868+
"redirect_document_id": false
1486914869
},
1487014870
{
1487114871
"source_path_from_root": "/articles/scheduler/scheduler-powershell-reference.md",
1487214872
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14873-
"redirect_document_id": ""
14873+
"redirect_document_id": false
1487414874
},
1487514875
{
1487614876
"source_path_from_root": "/articles/scheduler/scheduler-plans-billing.md",
1487714877
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14878-
"redirect_document_id": ""
14878+
"redirect_document_id": false
1487914879
},
1488014880
{
1488114881
"source_path_from_root": "/articles/scheduler/scheduler-limits-defaults-errors.md",
1488214882
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14883-
"redirect_document_id": ""
14883+
"redirect_document_id": false
1488414884
},
1488514885
{
1488614886
"source_path_from_root": "/articles/scheduler/scheduler-high-availability-reliability.md",
1488714887
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14888-
"redirect_document_id": ""
14888+
"redirect_document_id": false
1488914889
},
1489014890
{
1489114891
"source_path_from_root": "/articles/scheduler/scheduler-outbound-authentication.md",
1489214892
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14893-
"redirect_document_id": ""
14893+
"redirect_document_id": false
1489414894
},
1489514895
{
1489614896
"source_path_from_root": "/articles/scheduler/get-started-portal.md",
1489714897
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14898-
"redirect_document_id": ""
14898+
"redirect_document_id": false
1489914899
},
1490014900
{
1490114901
"source_path_from_root": "/articles/search/semantic-ranking.md",
@@ -17100,7 +17100,7 @@
1710017100
{
1710117101
"source_path_from_root": "/articles/service-fabric/service-fabric-deploy-multiple-apps.md",
1710217102
"redirect_url": "/azure/service-fabric/service-fabric-deploy-existing-app",
17103-
"redirect_document_id": ""
17103+
"redirect_document_id": false
1710417104
},
1710517105
{
1710617106
"source_path_from_root": "/articles/service-fabric/service-fabric-automate-powershell.md",
@@ -23820,27 +23820,27 @@
2382023820
{
2382123821
"source_path_from_root": "/articles/aks/managed-cluster-snapshot.md",
2382223822
"redirect_url": "/azure/aks/intro-kubernetes",
23823-
"redirect_document_id": "false"
23823+
"redirect_document_id": false
2382423824
},
2382523825
{
2382623826
"source_path_from_root": "/articles/azure-arc/servers/onboard-group-policy-service-principal-encryption.md",
2382723827
"redirect_url": "/azure/azure-arc/servers/onboard-group-policy-powershell",
23828-
"redirect_document_id": "false"
23828+
"redirect_document_id": false
2382923829
},
2383023830
{
2383123831
"source_path_from_root": "/articles/azure-arc/servers/onboard-group-policy.md",
2383223832
"redirect_url": "/azure/azure-arc/servers/onboard-group-policy-powershell",
23833-
"redirect_document_id": "false"
23833+
"redirect_document_id": false
2383423834
},
2383523835
{
2383623836
"source_path_from_root": "/articles/azure-arc/kubernetes/plan-at-scale-deployment.md",
2383723837
"redirect_url": "/azure/azure-arc/kubernetes/overview",
23838-
"redirect_document_id": "false"
23838+
"redirect_document_id": false
2383923839
},
2384023840
{
2384123841
"source_path_from_root": "/articles/azure-arc/kubernetes/tutorial-workload-management.md",
2384223842
"redirect_url": "/azure/azure-arc/kubernetes/workload-management",
23843-
"redirect_document_id": "true"
23843+
"redirect_document_id": true
2384423844
},
2384523845
{
2384623846
"source_path": "articles/azure-cache-for-redis/redis-cache-insights-overview.md",
@@ -23850,7 +23850,7 @@
2385023850
{
2385123851
"source_path_from_root": "/articles/aks/uptime-sla.md",
2385223852
"redirect_url": "/azure/aks/free-standard-pricing-tiers",
23853-
"redirect_document_id": "false"
23853+
"redirect_document_id": false
2385423854
},
2385523855
{
2385623856
"source_path": "articles/dotnet-develop-multitenant-applications.md",

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 10/20/2022
10+
ms.date: 09/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -18,8 +18,6 @@ ms.collection: M365-identity-device-management
1818

1919
You can import into the Azure Active Directory (Azure AD) ECMA Connector Host a configuration for a specific connector from a Forefront Identity Manager Synchronization Service or Microsoft Identity Manager Synchronization Service (MIM Sync) installation. The MIM Sync installation is only used for configuration, not for the ongoing synchronization from Azure AD.
2020

21-
>[!IMPORTANT]
22-
>Currently, only the generic SQL and LDAP connectors are supported for use with the Azure AD ECMA Connector Host.
2321

2422
## Create a connector configuration in MIM Sync
2523
This section is included for illustrative purposes, if you wish to set up MIM Sync with a connector. If you already have MIM Sync with your ECMA connector configured, skip to the next section.

articles/active-directory/architecture/auth-sync-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following table presents authentication Azure AD integration with legacy aut
4242
| [LDAP authentication](auth-ldap.md)| ![check mark](./media/authentication-patterns/check.png)| | | |
4343
| [OAuth 2.0 authentication](auth-oauth2.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4444
| [OIDC authentication](auth-oidc.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
45-
| [Password based SSO authentication](auth-password-based-sso.md )| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
45+
| [Password based SSO authentication](auth-password-based-sso.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4646
| [RADIUS authentication]( auth-radius.md)| ![check mark](./media/authentication-patterns/check.png)| | ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4747
| [Remote Desktop Gateway services](auth-remote-desktop-gateway.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4848
| [Secure Shell (SSH)](auth-ssh.md) | ![check mark](./media/authentication-patterns/check.png)| | ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |

articles/active-directory/architecture/automate-provisioning-to-applications-solutions.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,15 +91,24 @@ In addition to the pre-integrated gallery applications, Azure AD supports provis
9191

9292
[Learn more about provisioning to SCIM enabled applications](../app-provisioning/use-scim-to-provision-users-and-groups.md)
9393

94-
### Automate provisioning to SQL and LDAP based applications
94+
### Automate provisioning to on-premises applications
9595

96-
Many applications don't support the SCIM standard, and customers have historically used connectors developed for MIM to connect to them. The Azure AD provisioning service supports reusing connectors developed for MIM and provisioning users into applications that rely on an LDAP user store or a SQL database.
96+
Many applications don't support the SCIM standard, and customers have historically used connectors developed for MIM to connect to them. The Azure AD provisioning service supports reusing connectors built for MIM, without needing a MIM sync deployment. This opens up connectivity to a wide range of on-premises and SaaS applications.
97+
98+
|Protocol |Connector|
99+
|-----|-----|
100+
| LDAP | [LDAP](../app-provisioning/on-premises-ldap-connector-configure.md)|
101+
| SQL | [SQL](../app-provisioning/tutorial-ecma-sql-connector.md) |
102+
| REST | [Web Services](../app-provisioning/on-premises-web-services-connector.md)|
103+
| SOAP | [Web Services](../app-provisioning/on-premises-web-services-connector.md)|
104+
| Flat-file| [PowerShell](../app-provisioning/on-premises-powershell-connector.md) |
105+
| Custom | [Custom ECMA connectors](../app-provisioning/on-premises-custom-connector.md) |
97106

98107
[Learn more about on-premises application provisioning](../app-provisioning/user-provisioning.md)
99108

100109
### Use integrations developed by partners
101110

102-
Many applications may not yet support SCIM or rely on SQL / LDAP databases. Microsoft partners have developed SCIM gateways that allow you to synchronize users between Azure AD and various systems such as mainframes, HR systems, and legacy databases. In the image below, the SCIM Gateways are built and managed by partners.
111+
Microsoft partners have developed SCIM gateways that allow you to synchronize users between Azure AD and various systems such as mainframes, HR systems, and legacy databases. In the image below, the SCIM Gateways are built and managed by partners.
103112

104113
![Agent with SCIM gateway](media/automate-user-provisioning-to-applications-solutions/provisioning-agent-with-scim-gateway.png)
105114

articles/active-directory/external-identities/customers/how-to-google-federation-customers.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,10 @@ To configure Google federation by using PowerShell, follow these steps:
8787
At this point, the Google identity provider has been set up in your Azure AD, but it's not yet available in any of the sign-in pages. To add the Google identity provider to a user flow:
8888

8989
1. In your customer tenant, browse to **Identity** > **External Identities** > **User flows**.
90-
1. Select the user flow where you want to add the Facebook identity provider.
91-
1. Under Settings, select **Identity providers**
90+
1. Select the user flow where you want to add the Google identity provider.
91+
92+
1. Under Settings, select **Identity providers.**
93+
9294
1. Under **Other Identity Providers**, select **Google**.
9395

9496
<!-- ![Screenshot that shows how to add Google identity provider a user flow.](./media/sign-in-with-google/add-google-idp-to-user-flow.png)-->
@@ -99,3 +101,5 @@ At this point, the Google identity provider has been set up in your Azure AD, bu
99101

100102
- [Add Facebook as an identity provider](how-to-facebook-federation-customers.md)
101103
- [Customize the branding for customer sign-in experiences](how-to-customize-branding-customers.md)
104+
105+

articles/active-directory/external-identities/customers/samples-ciam-all.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ These samples and how-to guides demonstrate how to write a browserless applicati
6161
> [!div class="mx-tdCol2BreakAll"]
6262
> | Language/<br/>Platform | Code sample guide | Build and integrate guide |
6363
> | ------- | -------- | ------------- |
64-
> | JavaScript, Node | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md ) |
64+
> | JavaScript, Node | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md) |
6565
> | .NET | &#8226; [Sign in users](./sample-browserless-app-dotnet-sign-in.md) | &#8226; [Sign in users](./tutorial-browserless-app-dotnet-sign-in-prepare-tenant.md) |
6666
6767

@@ -149,7 +149,7 @@ These samples and how-to guides demonstrate how to write a daemon application th
149149
> [!div class="mx-tdCol2BreakAll"]
150150
> | App type | Code sample guide | Build and integrate guide |
151151
> | ------- | -------- | ------------- |
152-
> | Browserless | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md ) |
152+
> | Browserless | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md) |
153153
> | Daemon | &#8226; [Call an API](./sample-daemon-node-call-api.md) | &#8226; [Call an API](./tutorial-daemon-node-call-api-prepare-tenant.md) |
154154
155155

articles/active-directory/external-identities/tenant-restrictions-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ While [tenant restrictions v1](../manage-apps/tenant-restrictions.md) provide au
4646

4747
In your organization's [cross-tenant access settings](cross-tenant-access-overview.md), you can configure a tenant restrictions v2 policy. After you create the policy, there are three ways to apply the policy in your organization.
4848

49-
- **Universal tenant restrictions v2**. This option provides both authentication plane and data plane protection without a corporate proxy. [Universal tenant restrictions](https://learn.microsoft.com/azure/global-secure-access/how-to-universal-tenant-restrictions) use Global Secure Access (preview) to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity.
49+
- **Universal tenant restrictions v2**. This option provides both authentication plane and data plane protection without a corporate proxy. [Universal tenant restrictions](/azure/global-secure-access/how-to-universal-tenant-restrictions) use Global Secure Access (preview) to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity.
5050
- **Authentication plane tenant restrictions v2**. You can deploy a corporate proxy in your organization and [configure the proxy to set tenant restrictions v2 signals](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy) on all traffic to Microsoft Entra and Microsoft Accounts (MSA).
5151
- **Windows tenant restrictions v2**. For your corporate-owned Windows devices, you can enforce both authentication plane and data plane protection by enforcing tenant restrictions directly on devices. Tenant restrictions are enforced upon resource access, providing data path coverage and protection against token infiltration. A corporate proxy isn't required for policy enforcement. Devices can be Azure AD managed or domain-joined devices that are managed via Group Policy.
5252

@@ -341,7 +341,7 @@ There are three options for enforcing tenant restrictions v2 for clients:
341341

342342
### Option 1: Universal tenant restrictions v2 as part of Microsoft Entra Global Secure Access (preview)
343343

344-
Universal tenant restrictions v2 as part of [Microsoft Entra Global Secure Access](https://learn.microsoft.com/azure/global-secure-access/overview-what-is-global-secure-access) is recommended because it provides authentication and data plane protection for all devices and platforms. This option provides more protection against sophisticated attempts to bypasses authentication. For example, attackers might try to allow anonymous access to a malicious tenant’s apps, such as anonymous meeting join in Teams. Or, attackers might attempt to import to your organizational device an access token lifted from a device in the malicious tenant. Universal tenant restrictions v2 prevents these attacks by sending tenant restrictions v2 signals on the authentication plane (Microsoft Entra and Microsoft Account) and data plane (Microsoft cloud applications).
344+
Universal tenant restrictions v2 as part of [Microsoft Entra Global Secure Access](/azure/global-secure-access/overview-what-is-global-secure-access) is recommended because it provides authentication and data plane protection for all devices and platforms. This option provides more protection against sophisticated attempts to bypasses authentication. For example, attackers might try to allow anonymous access to a malicious tenant’s apps, such as anonymous meeting join in Teams. Or, attackers might attempt to import to your organizational device an access token lifted from a device in the malicious tenant. Universal tenant restrictions v2 prevents these attacks by sending tenant restrictions v2 signals on the authentication plane (Microsoft Entra and Microsoft Account) and data plane (Microsoft cloud applications).
345345

346346
### Option 2: Set up tenant restrictions v2 on your corporate proxy
347347

0 commit comments

Comments
 (0)