Skip to content

Commit 55abe5b

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents a7b40e8 + 504c9a8 commit 55abe5b

File tree

122 files changed

+1734
-1043
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

122 files changed

+1734
-1043
lines changed

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,10 +80,11 @@ After the first failure, the first retry happens within the next 2 hours (usuall
8080
- The third retry happens 12 hours after the first failure.
8181
- The fourth retry happens 24 hours after the first failure.
8282
- The fifth retry happens 48 hours after the first failure.
83-
- The sixth retry happens 96 hours after the first failure
84-
- The seventh retry happens 168 hours after the first failure.
83+
- The sixth retry happens 72 hours after the first failure.
84+
- The seventh retry happens 96 hours after the first failure.
85+
- The eigth retry happens 120 hours after the first failure.
8586

86-
After the 7th failure, entry is flagged and no further retries are run.
87+
This cycle is repeated every 24 hours until the 30th day when retries are stopped and the job is disabled.
8788

8889

8990
## How do I get my application out of quarantine?

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/30/2022
11+
ms.date: 07/06/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -146,7 +146,6 @@ There are currently a few known limitations to on-demand provisioning. Post your
146146
> [!NOTE]
147147
> The following limitations are specific to the on-demand provisioning capability. For information about whether an application supports provisioning groups, deletions, or other capabilities, check the tutorial for that application.
148148
149-
* Amazon Web Services (AWS) application does not support on-demand provisioning.
150149
* On-demand provisioning of groups supports updating up to 5 members at a time
151150
* On-demand provisioning of roles isn't supported.
152151
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users won't appear when you search for a user.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,6 @@ This article describes how to onboard an Amazon Web Services (AWS) account on Pe
1818
> [!NOTE]
1919
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2020
21-
22-
## View a training video on configuring and onboarding an AWS account
23-
24-
To view a video on how to configure and onboard AWS accounts in Permissions Management, select [Configure and onboard AWS accounts](https://www.youtube.com/watch?v=R6K21wiWYmE).
25-
2621
## Onboard an AWS account
2722

2823
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,6 @@ To add Permissions Management to your Azure AD tenant:
2424
- You must have an Azure AD user account and an Azure command-line interface (Azure CLI) on your system, or an Azure subscription. If you don't already have one, [create a free account](https://azure.microsoft.com/free/).
2525
- You must have **Microsoft.Authorization/roleAssignments/write** permission at the subscription or management group scope to perform these tasks. If you don't have this permission, you can ask someone who has this permission to perform these tasks for you.
2626

27-
28-
## View a training video on enabling Permissions Management in your Azure AD tenant
29-
30-
To view a video on how to enable Permissions Management in your Azure AD tenant, select [Enable Permissions Management in your Azure AD tenant](https://www.youtube.com/watch?v=-fkfeZyevoo).
31-
3227
## How to onboard an Azure subscription
3328

3429
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,6 @@ To enable Permissions Management in your organization:
2828
> [!NOTE]
2929
> During public preview, Permissions Management doesn't perform a license check.
3030
31-
## View a training video on enabling Permissions Management
32-
33-
- To view a video on how to enable Permissions Management in your Azure AD tenant, select [Enable Permissions Management in your Azure AD tenant](https://www.youtube.com/watch?v=-fkfeZyevoo).
34-
- To view a video on how to configure and onboard AWS accounts in Permissions Management, select [Configure and onboard AWS accounts](https://www.youtube.com/watch?v=R6K21wiWYmE).
35-
- To view a video on how to configure and onboard GCP accounts in Permissions Management, select [Configure and onboard GCP accounts](https://www.youtube.com/watch?app=desktop&v=W3epcOaec28).
36-
37-
3831
## How to enable Permissions Management on your Azure AD tenant
3932

4033
1. In your browser:

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,6 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
1818
> [!NOTE]
1919
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2020
21-
## View a training video on configuring and onboarding a GCP account
22-
23-
To view a video on how to configure and onboard GCP accounts in Permissions Management, select [Configure and onboard GCP accounts](https://www.youtube.com/watch?app=desktop&v=W3epcOaec28).
24-
25-
2621
## Onboard a GCP project
2722

2823
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:

articles/active-directory/saas-apps/sap-analytics-cloud-provisioning-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
5151

5252
## Step 2. Configure SAP Analytics Cloud to support provisioning with Azure AD
5353

54-
1. Sign into [SAP Identity Provisioning admin console](https://ips-xlnk9v890j.dispatcher.us1.hana.ondemand.com/) with your administrator account and then select **Proxy Systems**.
54+
1. Sign into the SAP Identity Provisioning admin console with your administrator account and then select **Proxy Systems**.
5555

5656
![SAP Proxy Systems](./media/sap-analytics-cloud-provisioning-tutorial/sap-proxy-systems.png)
5757

@@ -159,4 +159,4 @@ Once you've configured provisioning, use the following resources to monitor your
159159

160160
## Next steps
161161

162-
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)
162+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

articles/active-directory/verifiable-credentials/how-to-use-quickstart-idtoken.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: decentralized-identity
88
ms.topic: how-to
99
ms.subservice: verifiable-credentials
10-
ms.date: 06/22/2022
10+
ms.date: 07/06/2022
1111
ms.author: barclayn
1212

1313
#Customer intent: As an administrator, I am looking for information to help me create verifiable credentials for ID tokens.
@@ -86,6 +86,7 @@ The JSON attestation definition should contain the **idTokens** name, the [OIDC
8686

8787
The claims mapping in the following example requires that you configure the token as explained in the [Claims in the ID token from the identity provider](#claims-in-the-id-token-from-the-identity-provider) section.
8888

89+
8990
```json
9091
{
9192
"attestations": {
@@ -124,10 +125,17 @@ The claims mapping in the following example requires that you configure the toke
124125
"required": false
125126
}
126127
]
128+
},
129+
"validityInterval": 2592000,
130+
"vc": {
131+
"type": [
132+
"VerifiedCredentialExpert"
133+
]
127134
}
128135
}
129136
```
130137

138+
131139
## Application registration
132140

133141
The clientId attribute is the application ID of a registered application in the OIDC identity provider. For Azure Active Directory, you create the application by doing the following:

articles/active-directory/verifiable-credentials/how-to-use-quickstart-selfissued.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: decentralized-identity
88
ms.topic: how-to
99
ms.subservice: verifiable-credentials
10-
ms.date: 06/22/2022
10+
ms.date: 07/06/2022
1111
ms.author: barclayn
1212

1313
#Customer intent: As a verifiable credentials administrator, I want to create a verifiable credential for self-asserted claims scenario.
@@ -94,6 +94,12 @@ The JSON attestation definition should contain the **selfIssued** name and the c
9494
],
9595
"required": false
9696
}
97+
},
98+
"validityInterval": 2592000,
99+
"vc": {
100+
"type": [
101+
"VerifiedCredentialExpert"
102+
]
97103
}
98104
}
99105
```

articles/active-directory/verifiable-credentials/how-to-use-quickstart.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: decentralized-identity
88
ms.topic: how-to
99
ms.subservice: verifiable-credentials
10-
ms.date: 06/16/2022
10+
ms.date: 07/06/2022
1111
ms.author: barclayn
1212

1313
#Customer intent: As a verifiable credentials administrator, I want to create a verifiable credential for the ID token hint scenario.
@@ -105,10 +105,17 @@ The expected JSON for the rules definitions is the inner content of the rules at
105105
"required": false
106106
}
107107
]
108+
},
109+
"validityInterval": 2592000,
110+
"vc": {
111+
"type": [
112+
"VerifiedCredentialExpert"
113+
]
108114
}
109115
}
110116
```
111117

118+
112119
## Configure the samples to issue and verify your custom credential
113120

114121
To configure your sample code to issue and verify by using custom credentials, you need:

0 commit comments

Comments
 (0)