Skip to content

Commit 54b6f66

Browse files
authored
Merge branch 'main' into batamig-patch-1-6
2 parents 440ea66 + e5e54f5 commit 54b6f66

File tree

1,575 files changed

+13150
-9789
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,575 files changed

+13150
-9789
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 153 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1715,6 +1715,21 @@
17151715
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-daemon-node-call-api-prepare-tenant",
17161716
"redirect_document_id": false
17171717
},
1718+
{
1719+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-tenant.md",
1720+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-tenant",
1721+
"redirect_document_id": false
1722+
},
1723+
{
1724+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-app.md",
1725+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-app",
1726+
"redirect_document_id": false
1727+
},
1728+
{
1729+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-sign-out.md",
1730+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-sign-out",
1731+
"redirect_document_id": false
1732+
},
17181733
{
17191734
"source_path_from_root": "/articles/active-directory/external-identities/conditional-access.md",
17201735
"redirect_url": "/azure/active-directory/external-identities/authentication-conditional-access",
@@ -5250,6 +5265,61 @@
52505265
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
52515266
"redirect_document_id": true
52525267
},
5268+
{
5269+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md",
5270+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-use-workbooks",
5271+
"redirect_document_id": true
5272+
},
5273+
{
5274+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md",
5275+
"redirect_url": "/azure/active-directory/reports-monitoring/concept-log-monitoring-integration-options-considerations",
5276+
"redirect_document_id": true
5277+
},
5278+
{
5279+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-log-analytics-wizard.md",
5280+
"redirect_url": "/azure/active-directory/reports-monitoring/tutorial-configure-log-analytics-workspace",
5281+
"redirect_document_id": true
5282+
},
5283+
{
5284+
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md",
5285+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-archive-logs-to-storage-account",
5286+
"redirect_document_id": true
5287+
},
5288+
{
5289+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-monitoring.md",
5290+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5291+
"redirect_document_id": false
5292+
},
5293+
{
5294+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-reports.md",
5295+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5296+
"redirect_document_id": true
5297+
},
5298+
{
5299+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-sumologic.md",
5300+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5301+
"redirect_document_id": true
5302+
},
5303+
{
5304+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-splunk.md",
5305+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5306+
"redirect_document_id": false
5307+
},
5308+
{
5309+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-arcsight.md",
5310+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5311+
"redirect_document_id": false
5312+
},
5313+
{
5314+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md",
5315+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-azure-monitor-logs",
5316+
"redirect_document_id": true
5317+
},
5318+
{
5319+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-service-health-notifications.md",
5320+
"redirect_url": "/azure/service-health/service-health-portal-update",
5321+
"redirect_document_id": true
5322+
},
52535323
{
52545324
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-configure-named-locations.md",
52555325
"redirect_url": "/azure/active-directory/conditional-access/location-condition",
@@ -13479,10 +13549,93 @@
1347913549
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/services-id-authentication-support",
1348013550
"redirect_document_id": false
1348113551
},
13552+
{
13553+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-accesscontrol-requirements.md",
13554+
"redirect_url": "/azure/active-directory/hybrid/index",
13555+
"redirect_document_id": false
13556+
},
13557+
{
13558+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-business-needs.md",
13559+
"redirect_url": "/azure/active-directory/hybrid/index",
13560+
"redirect_document_id": false
13561+
},
13562+
{
13563+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-contentmgt-requirements.md",
13564+
"redirect_url": "/azure/active-directory/hybrid/index",
13565+
"redirect_document_id": false
13566+
},
13567+
{
13568+
"source_path_from_root": "/articles/active-directory/hybrid/connect/aplan-hybrid-identity-design-considerations-data-protection-strategy.md",
13569+
"redirect_url": "/azure/active-directory/hybrid/index",
13570+
"redirect_document_id": false
13571+
},
13572+
{
13573+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-dataprotection-requirements.md",
13574+
"redirect_url": "/azure/active-directory/hybrid/index",
13575+
"redirect_document_id": false
13576+
},
13577+
{
13578+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-hybrid-id-management-tasks.md",
13579+
"redirect_url": "/azure/active-directory/hybrid/index",
13580+
"redirect_document_id": false
13581+
},
13582+
{
13583+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-identity-adoption-strategy.md",
13584+
"redirect_url": "/azure/active-directory/hybrid/index",
13585+
"redirect_document_id": false
13586+
},
13587+
{
13588+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-lifecycle-adoption-strategy.md",
13589+
"redirect_url": "/azure/active-directory/hybrid/index",
13590+
"redirect_document_id": false
13591+
},
13592+
{
13593+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-data-protection-strategy.md",
13594+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13595+
"redirect_document_id": false
13596+
},
13597+
{
13598+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-directory-sync-requirements.md",
13599+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13600+
"redirect_document_id": false
13601+
},
13602+
{
13603+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-multifactor-auth-requirements.md",
13604+
"redirect_url": "/azure/active-directory/hybrid/index",
13605+
"redirect_document_id": false
13606+
},
13607+
{
13608+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-incident-response-requirements.md",
13609+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13610+
"redirect_document_id": false
13611+
},
13612+
13613+
{
13614+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-nextsteps.md",
13615+
"redirect_url": "/azure/active-directory/hybrid/index",
13616+
"redirect_document_id": false
13617+
},
13618+
{
13619+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-overview.md",
13620+
"redirect_url": "/azure/active-directory/hybrid/index",
13621+
"redirect_document_id": false
13622+
},
13623+
{
13624+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-tools-comparison.md",
13625+
"redirect_url": "/azure/active-directory/hybrid/index",
13626+
"redirect_document_id": false
13627+
},
13628+
13629+
1348213630
{
1348313631
"source_path_from_root": "/articles/active-directory/fundamentals/add-users-azure-active-directory.md",
1348413632
"redirect_url": "/azure/active-directory/fundamentals/add-users",
1348513633
"redirect_document_id": false
13634+
},
13635+
{
13636+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/subscription-requirements.md",
13637+
"redirect_url": "/azure/active-directory/governance/licensing-fundamentals",
13638+
"redirect_document_id": false
1348613639
}
1348713640

1348813641
]

CODEOWNERS

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,6 @@
44
# Background: https://github.blog/2017-07-06-introducing-code-owners/
55
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
66

7-
# Azure Policy: Samples and Compliance Controls
8-
/articles/**/policy-reference.md @timwarner-msft
9-
/articles/**/security-controls-policy.md @timwarner-msft
10-
/includes/policy/ @timwarner-msft
11-
127
# Azure Monitor
138
articles/azure-monitor/* @bwren
149
articles/azure-monitor/agents @guywi-ms @bwren
@@ -56,9 +51,6 @@ articles/service-health @rboucher
5651
/articles/container-instances/ @macolso @mimckitt
5752
/articles/container-registry/ @dlepow @mimckitt
5853

59-
# Governance
60-
/articles/governance/ @timwarner-msft
61-
6254
# Security
6355
/articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear
6456

articles/active-directory-b2c/enable-authentication-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ To specify your Azure AD B2C user flows, do the following:
215215

216216
1. Replace `B2C_1_SUSI` with your sign-in Azure AD B2C Policy name.
217217
1. Replace `B2C_1_EditProfile` with your edit profile Azure AD B2C policy name.
218-
1. Replace all instances of `contoso` with your [Azure AD B2C tenant name](./ tenant-management-read-tenant-name.md#get-your-tenant-name).
218+
1. Replace all instances of `contoso` with your [Azure AD B2C tenant name](./tenant-management-read-tenant-name.md#get-your-tenant-name).
219219

220220
## Step 7: Use the MSAL to sign in the user
221221

articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,4 +63,4 @@ For the next 3 months, the behavior will continue as it is today. Users with the
6363
For questions about these changes, please reach out to [email protected]
6464
## Next steps
6565

66-
[Azure AD Connect sync: Understanding Declarative Provisioning](../hybrid/concept-azure-ad-connect-sync-declarative-provisioning.md)
66+
[Azure AD Connect sync: Understanding Declarative Provisioning](../hybrid/connect/concept-azure-ad-connect-sync-declarative-provisioning.md)

articles/active-directory/app-provisioning/application-provisioning-log-analytics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ AADProvisioningLogs
9191

9292
Azure Monitor lets you configure custom alerts so that you can get notified about key events related to Provisioning. For example, you might want to receive an alert on spikes in failures. Or perhaps spikes in disables or deletes. Another example of where you might want to be alerted is a lack of any provisioning, which indicates something is wrong.
9393

94-
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-log.md).
94+
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-create-new-alert-rule.md).
9595

9696
Alert when there's a spike in failures. Replace the jobID with the jobID for your application.
9797

@@ -115,5 +115,5 @@ We're taking an open source and community-based approach to application provisio
115115
- [Log analytics](../reports-monitoring/howto-analyze-activity-logs-log-analytics.md)
116116
- [Get started with queries in Azure Monitor logs](../../azure-monitor/logs/get-started-queries.md)
117117
- [Create and manage alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md)
118-
- [Install and use the log analytics views for Azure Active Directory](../reports-monitoring/howto-install-use-log-analytics-views.md)
118+
- [Install and use the log analytics views for Azure Active Directory](../../azure-monitor/visualize/workbooks-view-designer-conversion-overview.md)
119119
- [Provisioning logs API](/graph/api/resources/provisioningobjectsummary?preserve-view=true&view=graph-rest-beta)

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ Applications and systems that support customization of the attribute list includ
123123
> Editing the list of supported attributes is only recommended for administrators who have customized the schema of their applications and systems, and have first-hand knowledge of how their custom attributes have been defined or if a source attribute isn't automatically displayed in the Azure portal UI. This sometimes requires familiarity with the APIs and developer tools provided by an application or system. The ability to edit the list of supported attributes is locked down by default, but customers can enable the capability by navigating to the following URL: https://portal.azure.com/?Microsoft_AAD_Connect_Provisioning_forceSchemaEditorEnabled=true . You can then navigate to your application to view the [attribute list](#editing-the-list-of-supported-attributes).
124124
125125
> [!NOTE]
126-
> When a directory extension attribute in Azure AD doesn't show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx_acmeCostCenter`, make sure you enter it in the same format as defined in the directory.
126+
> When a directory extension attribute in Azure AD doesn't show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx_acmeCostCenter`, make sure you enter it in the same format as defined in the directory. Provisioning multi-valued directory extension attributes is not supported.
127127
128128
When you're editing the list of supported attributes, the following properties are provided:
129129

@@ -348,7 +348,7 @@ Selecting this option forces a resynchronization of all users while the provisio
348348
- The attribute `IsSoftDeleted` is often part of the default mappings for an application. `IsSoftdeleted` can be true in one of four scenarios: 1) The user is out of scope due to being unassigned from the application. 2) The user is out of scope due to not meeting a scoping filter. 3) The user has been soft deleted in Azure AD. 4) The property `AccountEnabled` is set to false on the user. It's not recommended to remove the `IsSoftDeleted` attribute from your attribute mappings.
349349
- The Azure AD provisioning service doesn't support provisioning null values.
350350
- They primary key, typically "ID", shouldn't be included as a target attribute in your attribute mappings.
351-
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#Provisioning a role to a SCIM app).
351+
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#provisioning-a-role-to-a-scim-app).
352352
- While you can disable groups from your mappings, disabling users isn't supported.
353353

354354
## Next steps

articles/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -144,8 +144,8 @@ Scoping filters are configured as part of the attribute mappings for each Azure
144144
## Common scoping filters
145145
| Target Attribute| Operator | Value | Description|
146146
|----|----|----|----|
147-
|userPrincipalName|REGEX MATCH|`.\*@domain.com`|All users with `userPrincipal` that have the domain `@domain.com` are in scope for provisioning. |
148-
|userPrincipalName|NOT REGEX MATCH|`.\*@domain.com`|All users with `userPrincipal` that has the domain `@domain.com` are out of scope for provisioning. |
147+
|userPrincipalName|REGEX MATCH|`.*\@domain.com`|All users with `userPrincipal` that have the domain `@domain.com` are in scope for provisioning. |
148+
|userPrincipalName|NOT REGEX MATCH|`.*\@domain.com`|All users with `userPrincipal` that has the domain `@domain.com` are out of scope for provisioning. |
149149
|department|EQUALS|`sales`|All users from the sales department are in scope for provisioning|
150150
|workerID|REGEX MATCH|`(1[0-9][0-9][0-9][0-9][0-9][0-9])`| All employees with `workerID` between 1000000 and 2000000 are in scope for provisioning.|
151151

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ Confirm the mapping for *active* for your application. If you're using an applic
201201
**Configure your application to delete a user**
202202

203203
The scenario triggers a disable or a delete:
204-
* A user is soft-deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false). Thirty days after a user is deleted in Azure AD, they're permanently deleted from the tenant. At this point, the provisioning service sends a DELETE request to permanently delete the user in the application. At any time during the 30-day window, you can [manually delete a user permanently](../fundamentals/active-directory-users-restore.md), which sends a delete request to the application.
204+
* A user is soft-deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false). Thirty days after a user is deleted in Azure AD, they're permanently deleted from the tenant. At this point, the provisioning service sends a DELETE request to permanently delete the user in the application. At any time during the 30-day window, you can [manually delete a user permanently](../fundamentals/users-restore.md), which sends a delete request to the application.
205205
* A user is permanently deleted / removed from the recycle bin in Azure AD.
206206
* A user is unassigned from an app.
207207
* A user goes from in scope to out of scope (doesn't pass a scoping filter anymore).

0 commit comments

Comments
 (0)