Skip to content

Commit 57905c8

Browse files
committed
2 parents 193acd1 + 6e94aa3 commit 57905c8

File tree

145 files changed

+1635
-1627
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

145 files changed

+1635
-1627
lines changed

.openpublishing.redirection.json

Lines changed: 26 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26850,6 +26850,11 @@
2685026850
"redirect_url": "/azure/logic-apps/quickstart-create-logic-apps-visual-studio-code",
2685126851
"redirect_document_id": true
2685226852
},
26853+
{
26854+
"source_path_from_root": "/articles/logic-apps/logic-apps-overview-preview.md",
26855+
"redirect_url": "/azure/logic-apps/single-tenant-overview-compare",
26856+
"redirect_document_id": true
26857+
},
2685326858
{
2685426859
"source_path_from_root": "/articles/machine-learning/service/index.yml",
2685526860
"redirect_url": "/azure/machine-learning/",
@@ -51413,7 +51418,7 @@
5141351418
{
5141451419
"source_path_from_root": "/articles/active-directory/active-directory-conditional-access-locations.md",
5141551420
"redirect_url": "/azure/active-directory/conditional-access/location-condition",
51416-
"redirect_document_id": true
51421+
"redirect_document_id": false
5141751422
},
5141851423
{
5141951424
"source_path_from_root": "/articles/active-directory/active-directory-conditional-access-azure-portal.md",
@@ -53560,6 +53565,11 @@
5356053565
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
5356153566
"redirect_document_id": true
5356253567
},
53568+
{
53569+
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-configure-named-locations.md",
53570+
"redirect_url": "/azure/active-directory/conditional-access/location-condition",
53571+
"redirect_document_id": true
53572+
},
5356353573
{
5356453574
"source_path_from_root": "/articles/active-directory/customize-branding.md",
5356553575
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",
@@ -56360,11 +56370,6 @@
5636056370
"redirect_url": "/azure/active-directory/reports-monitoring/quickstart-azure-monitor-stream-logs-to-event-hub",
5636156371
"redirect_document_id": false
5636256372
},
56363-
{
56364-
"source_path_from_root": "/articles/active-directory/active-directory-named-locations.md",
56365-
"redirect_url": "/azure/active-directory/reports-monitoring/quickstart-configure-named-locations",
56366-
"redirect_document_id": true
56367-
},
5636856373
{
5636956374
"source_path_from_root": "/articles/active-directory/active-directory-reporting-activity-audit-reference.md",
5637056375
"redirect_url": "/azure/active-directory/reports-monitoring/reference-audit-activities",
@@ -66119,11 +66124,6 @@
6611966124
"redirect_url": "/azure/iot-develop/quickstart-send-telemetry-central",
6612066125
"redirect_document_id": false
6612166126
},
66122-
{
66123-
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-configure-named-locations.md",
66124-
"redirect_url": "/azure/active-directory/conditional-access/location-condition",
66125-
"redirect_document_id": false
66126-
},
6612766127
{
6612866128
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-azure-monitor-audit-log-schema.md",
6612966129
"redirect_url": "/azure/active-directory/reports-monitoring/overview-reports",
@@ -66138,6 +66138,21 @@
6613866138
"source_path_from_root": "/articles/iot-develop/quickstart-send-telemetry-cli-node.md",
6613966139
"redirect_url": "/azure/iot-develop/quickstart-send-telemetry-iot-hub",
6614066140
"redirect_document_id": false
66141+
},
66142+
{
66143+
"source_path_from_root": "/articles/communication-services/quickstarts/ui-framework/create-your-own-components.md",
66144+
"redirect_url": "https://azure.github.io/communication-ui-sdk",
66145+
"redirect_document_id": false
66146+
},
66147+
{
66148+
"source_path_from_root": "/articles/communication-services/quickstarts/ui-framework/get-started-with-components.md",
66149+
"redirect_url": "https://azure.github.io/communication-ui-sdk",
66150+
"redirect_document_id": false
66151+
},
66152+
{
66153+
"source_path_from_root": "/articles/communication-services/quickstarts/ui-framework/get-started-with-composites.md",
66154+
"redirect_url": "https://azure.github.io/communication-ui-sdk",
66155+
"redirect_document_id": false
6614166156
}
6614266157
]
6614366158
}

articles/active-directory/conditional-access/location-condition.md

Lines changed: 51 additions & 35 deletions
Large diffs are not rendered by default.
103 KB
Loading
20.4 KB
Loading
95.2 KB
Loading
Loading
Loading

articles/active-directory/privileged-identity-management/pim-resource-roles-assign-roles.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/23/2020
14+
ms.date: 05/11/2020
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -30,6 +30,10 @@ Azure Active Directory (Azure AD) Privileged Identity Management (PIM) can manag
3030
> [!NOTE]
3131
> Users or members of a group assigned to the Owner or User Access Administrator subscription roles, and Azure AD Global administrators that enable subscription management in Azure AD have Resource administrator permissions by default. These administrators can assign roles, configure role settings, and review access using Privileged Identity Management for Azure resources. A user can't manage Privileged Identity Management for Resources without Resource administrator permissions. View the list of [Azure built-in roles](../../role-based-access-control/built-in-roles.md).
3232
33+
## Role assignment conditions
34+
35+
You can use the Azure attribute-based access control (Azure ABAC) preview to place resource conditions on eligible role assignments using Privileged Identity Management (PIM). With PIM, your end users must activate an eligible role assignment to get permission to perform certain actions. Using Azure ABAC conditions in PIM enables you not only to limit a user’s role permissions to a resource using fine-grained conditions, but also to use PIM to secure the role assignment with a time-bound setting, approval workflow, audit trail, and so on. For more information, see [Azure attribute-based access control public preview](../../role-based-access-control/conditions-overview.md).
36+
3337
## Assign a role
3438

3539
Follow these steps to make a user eligible for an Azure resource role.
@@ -104,6 +108,10 @@ Follow these steps to update or remove an existing role assignment.
104108

105109
![Update or remove role assignment](./media/pim-resource-roles-assign-roles/resources-update-remove.png)
106110

111+
1. To add or update a condition to refine Azure resource access, select **Add** or **View/Edit** in the **Condition** column for the role assignment. Currently, the Storage Blob Data Owner, Storage Blob Data Reader, and the Blob Storage Blob Data Contributor roles in Privileged Identity Management are the only two roles supported as part of the [Azure attribute-based access control public preview](../../role-based-access-control/conditions-overview.md).
112+
113+
![Update or remove attributes for access control](./media/pim-resource-roles-assign-roles/resources-abac-update-remove.png)
114+
107115
1. Select **Update** or **Remove** to update or remove the role assignment.
108116

109117
For information about extending a role assignment, see [Extend or renew Azure resource roles in Privileged Identity Management](pim-resource-roles-renew-extend.md).

articles/active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ After data is displayed in the event hub, you can access and read the data in tw
7575

7676
* **Configure a supported SIEM tool**. To read data from the event hub, most tools require the event hub connection string and certain permissions to your Azure subscription. Third-party tools with Azure Monitor integration include, but are not limited to:
7777

78-
* **ArcSight**: For more information about integrating Azure AD logs with Splunk, see [Integrate Azure Active Directory logs with ArcSight using Azure Monitor](howto-integrate-activity-logs-with-arcsight.md).
78+
* **ArcSight**: For more information about integrating Azure AD logs with ArcSight, see [Integrate Azure Active Directory logs with ArcSight using Azure Monitor](howto-integrate-activity-logs-with-arcsight.md).
7979

8080
* **Splunk**: For more information about integrating Azure AD logs with Splunk, see [Integrate Azure AD logs with Splunk by using Azure Monitor](./howto-integrate-activity-logs-with-splunk.md).
8181

articles/aks/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@
282282
href: managed-aad.md
283283
- name: Azure AD integration (legacy)
284284
href: azure-ad-integration-cli.md
285-
- name: Use Azure RBAC for Kubernetes Authorization (preview)
285+
- name: Use Azure RBAC for Kubernetes Authorization
286286
href: manage-azure-rbac.md
287287
- name: Use Kubernetes RBAC with Azure AD integration
288288
href: azure-ad-rbac.md

0 commit comments

Comments
 (0)