Skip to content

Commit 55b73e3

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into alerts-articles-batch-7
2 parents 9809950 + 25039f7 commit 55b73e3

File tree

185 files changed

+2285
-1315
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

185 files changed

+2285
-1315
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,11 @@
5555
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
5656
"redirect_document_id": false
5757
},
58+
{
59+
"source_path_from_root": "/articles/active-directory/saas-apps/trello-tutorial.md",
60+
"redirect_url": "/azure/active-directory/saas-apps/atlassian-cloud-tutorial",
61+
"redirect_document_id": false
62+
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/saas-apps/iauditor-tutorial.md",
6065
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717
# Customer intent: As an identity administrator, I want to understand how to use OATH tokens in Azure AD to improve and secure user sign-in events.
1818
---
19+
1920
# Authentication methods in Azure Active Directory - OATH tokens
2021

2122
OATH TOTP (Time-based One Time Password) is an open standard that specifies how one-time password (OTP) codes are generated. OATH TOTP can be implemented using either software or hardware to generate the codes. Azure AD doesn't support OATH HOTP, a different code generation standard.
@@ -48,7 +49,7 @@ Once tokens are acquired they must be uploaded in a comma-separated values (CSV)
4849
```csv
4950
upn,serial number,secret key,time interval,manufacturer,model
5051
[email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
51-
```
52+
```
5253

5354
> [!NOTE]
5455
> Make sure you include the header row in your CSV file.
@@ -61,9 +62,11 @@ Once any errors have been addressed, the administrator then can activate each ke
6162

6263
Users may have a combination of up to five OATH hardware tokens or authenticator applications, such as the Microsoft Authenticator app, configured for use at any time. Hardware OATH tokens cannot be assigned to guest users in the resource tenant.
6364

64-
.[!IMPORTANT]
65-
>Make sure to only assign each token to a single user.
66-
>In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
65+
> [!IMPORTANT]
66+
> Make sure to only assign each token to a single user.
67+
> In the future, support for the assignment of a single token to multiple users will stop to prevent a security risk.
68+
69+
6770

6871

6972
## Determine OATH token registration type in mysecurityinfo
@@ -75,7 +78,9 @@ OATH software token | <img width="63" alt="Software OATH token" src="media/con
7578
OATH hardware token | <img width="63" alt="Hardware OATH token" src="media/concept-authentication-methods/hardware-oath-token-icon.png">
7679

7780

81+
7882
## Next steps
7983

8084
Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
8185
Learn about [FIDO2 security key providers](concept-authentication-passwordless.md#fido2-security-key-providers) that are compatible with passwordless authentication.
86+

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 01/29/2023
1010

1111
ms.author: justinha
1212
author: justinha
13-
manager: daveba
13+
manager: amycolannino
1414
ms.reviewer: vimrang
1515

1616
ms.collection: M365-identity-device-management

articles/active-directory/authentication/concept-certificate-based-authentication-limitations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 01/29/2023
1010

1111
ms.author: justinha
1212
author: justinha
13-
manager: daveba
13+
manager: amycolannino
1414
ms.reviewer: vimrang
1515

1616
ms.collection: M365-identity-device-management

articles/active-directory/cloud-infrastructure-entitlement-management/ui-autopilot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 02/23/2022
11+
ms.date: 02/16/2023
1212
ms.author: jfields
1313
---
1414

1515
# View rules in the Autopilot dashboard
1616

17-
The **Autopilot** dashboard in Permissions Management provides a table of information about **Autopilot rules** for administrators.
17+
The **Autopilot** dashboard in Permissions Management provides a table of information about Autopilot rules for administrators. Creating Autopilot rules allows you to automate right-sizing policies so you can automatically remove unused roles and permissions assigned to identities in your authorization system.
1818

1919

2020
> [!NOTE]
@@ -30,13 +30,13 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
3030
The following information displays in the **Autopilot Rules** table:
3131

3232
- **Rule Name**: The name of the rule.
33-
- **State**: The status of the rule: idle (not being use) or active (being used).
34-
- **Rule Type**: The type of rule being applied.
33+
- **State**: The status of the rule: idle (not in use) or active (in use).
34+
- **Rule Type**: The type of rule that's applied.
3535
- **Mode**: The status of the mode: on-demand or not.
3636
- **Last Generated**: The date and time the rule was last generated.
3737
- **Created By**: The email address of the user who created the rule.
3838
- **Last Modified**: The date and time the rule was last modified.
39-
- **Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations have been generated, applied, or unapplied.
39+
- **Subscription**: Provides an **On** or **Off** subscription that allows you to receive email notifications when recommendations are generated, applied, or unapplied.
4040

4141
## View other available options for rules
4242

@@ -48,7 +48,7 @@ The **Autopilot** dashboard in Permissions Management provides a table of inform
4848
- **Delete Rule**: Select to delete the rule. Only the user who created the selected rule can delete the rule.
4949
- **Generate Recommendations**: Creates recommendations for each user and the authorization system. Only the user who created the selected rule can create recommendations.
5050
- **View Recommendations**: Displays the recommendations for each user and authorization system.
51-
- **Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to be notified.
51+
- **Notification Settings**: Displays the users subscribed to this rule. Only the user who created the selected rule can add other users to receive notifications.
5252

5353
You can also select:
5454

articles/active-directory/conditional-access/concept-filter-for-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 09/30/2022
88

99
ms.author: joflore
1010
author: MicrosoftGuyJFlo
11-
manager: karenhoran
11+
manager: amycolannino
1212
ms.reviewer: calebb, oanae
1313

1414
ms.custom: subject-rbac-steps

articles/active-directory/develop/workload-identity-federation.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/31/2022
12+
ms.date: 02/16/2023
1313
ms.author: ryanwi
14-
ms.reviewer: shkhalid, udayh, vakarand
14+
ms.reviewer: shkhalid, udayh
1515
ms.custom: aaddev
1616
#Customer intent: As a developer, I want to learn about workload identity federation so that I can securely access Azure AD protected resources from external apps and services without needing to manage secrets.
1717
---
@@ -23,6 +23,9 @@ You can use workload identity federation in scenarios such as GitHub Actions, wo
2323

2424
## Why use workload identity federation?
2525

26+
Watch this video to learn why you would use workload identity federation.
27+
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWXamJ]
28+
2629
Typically, a software workload (such as an application, service, script, or container-based application) needs an identity in order to authenticate and access resources or communicate with other services. When these workloads run on Azure, you can use [managed identities](../managed-identities-azure-resources/overview.md) and the Azure platform manages the credentials for you. For a software workload running outside of Azure, you need to use application credentials (a secret or certificate) to access Azure AD protected resources (such as Azure, Microsoft Graph, Microsoft 365, or third-party resources). These credentials pose a security risk and have to be stored securely and rotated regularly. You also run the risk of service downtime if the credentials expire.
2730

2831
You use workload identity federation to configure an Azure AD app registration or [user-assigned managed identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md) to trust tokens from an external identity provider (IdP), such as GitHub. Once that trust relationship is created, your software workload can exchange trusted tokens from the external IdP for access tokens from Microsoft identity platform. Your software workload then uses that access token to access the Azure AD protected resources to which the workload has been granted access. This eliminates the maintenance burden of manually managing credentials and eliminates the risk of leaking secrets or having certificates expire.

articles/active-directory/enterprise-users/groups-dynamic-rule-member-of.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: How to create a dynamic membership group that can contain members o
44
services: active-directory
55
documentationcenter: ''
66
author: billmath
7-
manager: billmath
7+
manager: amycolannino
88
ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity

articles/active-directory/governance/how-to-lifecycle-workflow-sync-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'How to synchronize attributes for Lifecycle workflows'
33
description: Describes overview of Lifecycle workflow attributes.
44
services: active-directory
55
author: owinfreyATL
6-
manager: billmath
6+
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview

articles/active-directory/governance/manage-lifecycle-workflows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to manage user lifecycles with Lifecycle Workflows
44
services: active-directory
55
documentationcenter: ''
66
author: owinfreyATL
7-
manager: karenhoran
7+
manager: amycolannino
88
editor: markwahl-msft
99
ms.service: active-directory
1010
ms.workload: identity

0 commit comments

Comments
 (0)