Skip to content

Commit 57aeccc

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 8e056a9 + b18cc2f commit 57aeccc

File tree

742 files changed

+8901
-7945
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

742 files changed

+8901
-7945
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11221,6 +11221,11 @@
1122111221
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review",
1122211222
"redirect_document_id": false
1122311223
},
11224+
{
11225+
"source_path_from_root": "/articles/active-directory-b2c/user-manage-inactive.md",
11226+
"redirect_url": "/azure/active-directory-b2c/manage-users-portal",
11227+
"redirect_document_id": false
11228+
},
1122411229
{
1122511230
"source_path_from_root": "/articles/active-directory-b2c/troubleshoot-custom-policies.md",
1122611231
"redirect_url": "/azure/active-directory-b2c/troubleshoot",
@@ -12892,7 +12897,94 @@
1289212897
"source_path_from_root": "/articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md",
1289312898
"redirect_url": "/azure/active-directory/authentication/certificate-based-authentication-federation-get-started",
1289412899
"redirect_document_id": false
12900+
},
12901+
{
12902+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-access-create-new-tenant.md",
12903+
"redirect_url": "/azure/active-directory/fundamentals/create-new-tenant",
12904+
"redirect_document_id": false
12905+
},
12906+
{
12907+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-architecture.md",
12908+
"redirect_url": "/azure/active-directory/fundamentals/architecture",
12909+
"redirect_document_id": false
12910+
},
12911+
{
12912+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-data-storage-australia.md",
12913+
"redirect_url": "/azure/active-directory/fundamentals/data-storage-australia",
12914+
"redirect_document_id": false
12915+
},
12916+
{
12917+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-data-storage-australia-newzealand.md",
12918+
"redirect_url": "/azure/active-directory/fundamentals/data-storage-australia-newzealand",
12919+
"redirect_document_id": false
12920+
},
12921+
{
12922+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-data-storage-eu.md",
12923+
"redirect_url": "/azure/active-directory/fundamentals/data-storage-eu",
12924+
"redirect_document_id": false
12925+
},
12926+
{
12927+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-faq.yml",
12928+
"redirect_url": "/azure/active-directory/fundamentals/faq",
12929+
"redirect_document_id": false
12930+
},
12931+
{
12932+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-data-storage-japan.md",
12933+
"redirect_url": "/azure/active-directory/fundamentals/data-storage-japan",
12934+
"redirect_document_id": false
12935+
},
12936+
{
12937+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-get-started-premium.md",
12938+
"redirect_url": "/azure/active-directory/fundamentals/get-started-premium",
12939+
"redirect_document_id": false
12940+
},
12941+
{
12942+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-groups-view-azure-portal.md",
12943+
"redirect_url": "/azure/active-directory/fundamentals/groups-view-azure-portal",
12944+
"redirect_document_id": false
12945+
},
12946+
{
12947+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md",
12948+
"redirect_url": "/azure/active-directory/fundamentals/how-subscriptions-associated-directory",
12949+
"redirect_document_id": false
12950+
},
12951+
{
12952+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-how-to-find-tenant.md",
12953+
"redirect_url": "/azure/active-directory/fundamentals/how-to-find-tenant.md",
12954+
"redirect_document_id": false
12955+
},
12956+
{
12957+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-users-assign-role-azure-portal.md",
12958+
"redirect_url": "/azure/active-directory/fundamentals/how-subscriptions-associated-directory",
12959+
"redirect_document_id": false
12960+
},
12961+
{
12962+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-properties-area.md",
12963+
"redirect_url": "/azure/active-directory/fundamentals/properties-area",
12964+
"redirect_document_id": false
12965+
},
12966+
{
12967+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-licensing-whatis-azure-portal.md",
12968+
"redirect_url": "/azure/active-directory/fundamentals/licensing-whatis-azure-portal",
12969+
"redirect_document_id": false
12970+
},
12971+
{
12972+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-users-reset-password-azure-portal.md",
12973+
"redirect_url": "/azure/active-directory/fundamentals/users-reset-password-azure-portal",
12974+
"redirect_document_id": false
12975+
},
12976+
{
12977+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-users-restore.md",
12978+
"redirect_url": "/azure/active-directory/fundamentals/users-restore",
12979+
"redirect_document_id": false
1289512980
}
1289612981

12982+
12983+
12984+
12985+
12986+
12987+
12988+
1289712989
]
1289812990
}

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -480,6 +480,11 @@
480480
"redirect_url": "/azure/defender-for-cloud/enable-enhanced-security",
481481
"redirect_document_id": true
482482
},
483+
{
484+
"source_path_from_root": "/articles/defender-for-cloud/enable-enhanced-security.md",
485+
"redirect_url": "/azure/defender-for-cloud/enable-all-plans",
486+
"redirect_document_id": true
487+
},
483488
{
484489
"source_path_from_root": "/articles/security-center/enhanced-security-features-overview.md",
485490
"redirect_url": "/azure/defender-for-cloud/enhanced-security-features-overview",
@@ -815,6 +820,11 @@
815820
"redirect_url": "/azure/defender-for-cloud/faq-data-collection-agents",
816821
"redirect_document_id": true
817822
},
823+
{
824+
"source_path_from_root": "/articles/defender-for-cloud/quickstart-enable-database-protections.md",
825+
"redirect_url": "/azure/defender-for-cloud/tutorial-enable-databases-plan",
826+
"redirect_document_id": true
827+
},
818828
{
819829
"source_path_from_root": "/articles/defender-for-cloud/defender-for-storage-exclude.md",
820830
"redirect_url": "/azure/defender-for-cloud/defender-for-storage-classic-enable#exclude-a-storage-account-from-a-protected-subscription-in-the-per-transaction-plan",

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -403,10 +403,7 @@
403403
displayName: create users, add users, delete users, revoke sessions
404404
- name: Migrate users
405405
href: user-migration.md
406-
displayName: bulk import
407-
- name: Manage inactive users
408-
href: user-manage-inactive.md
409-
displayName: Manage and delete inactive users
406+
displayName: bulk import
410407
- name: Partner integration
411408
items:
412409
- name: N8identity

articles/active-directory-b2c/enable-authentication-web-application-options.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@ To support a secured logout redirect in your application, first follow the steps
303303
1. In the **Startup.cs** class, parse the `id_token_hint` value and append the value to the authentication request. The following code snippet demonstrates how to pass the `id_token_hint` value to the authentication request:
304304

305305
```csharp
306-
private async Task OnRedirectToIdentityProviderFunc(RedirectContext context)
306+
private async Task OnRedirectToIdentityProviderForSignOutFunc(RedirectContext context)
307307
{
308308
var id_token_hint = context.Properties.Items.FirstOrDefault(x => x.Key == "id_token_hint").Value;
309309
if (id_token_hint != null)
@@ -324,7 +324,7 @@ To support a secured logout redirect in your application, first follow the steps
324324
{
325325
Configuration.Bind("AzureAdB2C", options);
326326
options.Events ??= new OpenIdConnectEvents();
327-
options.Events.OnRedirectToIdentityProvider += OnRedirectToIdentityProviderFunc;
327+
options.Events.OnRedirectToIdentityProviderForSignOut += OnRedirectToIdentityProviderForSignOutFunc;
328328
options.SaveTokens = true;
329329
});
330330
```

articles/active-directory-b2c/tenant-management-directory-quota.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,8 +81,4 @@ If your tenant usage is higher that 80%, you can remove inactive users or reques
8181

8282
## Request increase directory quota size
8383

84-
You can request to increase the quota size by [contacting support](find-help-open-support-ticket.md)
85-
86-
## Next steps
87-
88-
- Learn [how to manage inactive user accounts](user-manage-inactive.md).
84+
You can request to increase the quota size by [contacting support](find-help-open-support-ticket.md)

articles/active-directory-b2c/user-manage-inactive.md

Lines changed: 0 additions & 113 deletions
This file was deleted.

articles/active-directory/app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md

Lines changed: 12 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 05/04/2023
11+
ms.date: 06/29/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -61,16 +61,16 @@ The time it takes for a given user to be provisioned depends mainly on whether y
6161
The following table summarizes synchronization times for common provisioning scenarios. In these scenarios, the source system is Azure AD and the target system is a SaaS application. The sync times are derived from a statistical analysis of sync jobs for the SaaS applications ServiceNow, Workplace, Salesforce, and G Suite.
6262

6363

64-
| Scope configuration | Users, groups, and members in scope | Initial cycle time | Incremental cycle time |
65-
| -------- | -------- | -------- | -------- |
66-
| Sync assigned users and groups only | < 1,000 | < 30 minutes | < 30 minutes |
67-
| Sync assigned users and groups only | 1,000 - 10,000 | 142 - 708 minutes | < 30 minutes |
68-
| Sync assigned users and groups only | 10,000 - 100,000 | 1,170 - 2,340 minutes | < 30 minutes |
69-
| Sync all users and groups in Azure AD | < 1,000 | < 30 minutes | < 30 minutes |
70-
| Sync all users and groups in Azure AD | 1,000 - 10,000 | < 30 - 120 minutes | < 30 minutes |
71-
| Sync all users and groups in Azure AD | 10,000 - 100,000 | 713 - 1,425 minutes | < 30 minutes |
72-
| Sync all users in Azure AD| < 1,000 | < 30 minutes | < 30 minutes |
73-
| Sync all users in Azure AD | 1,000 - 10,000 | 43 - 86 minutes | < 30 minutes |
64+
| Scope configuration | Users, groups, and members in scope | Initial cycle time |
65+
| -------- | -------- | -------- |
66+
| Sync assigned users and groups only | < 1,000 | < 30 minutes |
67+
| Sync assigned users and groups only | 1,000 - 10,000 | 142 - 708 minutes |
68+
| Sync assigned users and groups only | 10,000 - 100,000 | 1,170 - 2,340 minutes |
69+
| Sync all users and groups in Azure AD | < 1,000 | < 30 minutes |
70+
| Sync all users and groups in Azure AD | 1,000 - 10,000 | < 30 - 120 minutes |
71+
| Sync all users and groups in Azure AD | 10,000 - 100,000 | 713 - 1,425 minutes |
72+
| Sync all users in Azure AD| < 1,000 | < 30 minutes |
73+
| Sync all users in Azure AD | 1,000 - 10,000 | 43 - 86 minutes |
7474

7575
For the configuration **Sync assigned user and groups only**, you can use the following formulas to determine the approximate minimum and maximum expected **initial cycle** times:
7676

@@ -93,12 +93,7 @@ Summary of factors that influence the time it takes to complete an **initial cyc
9393

9494
- If performance becomes an issue, and you're attempting to provision most users and groups in your tenant, then use scoping filters. Scoping filters allow you to fine tune the data that the provisioning service extracts from Azure AD by filtering out users based on specific attribute values. For more information on scoping filters, see [Attribute-based application provisioning with scoping filters](define-conditional-rules-for-provisioning-user-accounts.md).
9595

96-
The **incremental cycle** may also take longer than the duration we have documented above. Some of the factors that influence this duration are:
97-
98-
- The number of changes on the individual objects properties.
99-
- The number of changes on the groups memberships.
100-
- The scope of assignment configured for the app. Configuration of **sync assigned users and groups only** is recommended where possible.
101-
96+
In most cases, the **incremental cycle** completes in 30 minutes. However, when there are hundreds or thousands of user changes or group membership changes, the incremental cycle time will increase proportionally with the number of changes to process and can take several hours. Using **sync assigned users and groups** and minimizing the number of users / groups in scope for provisioning will help to reduce the sync time.
10297

10398
## Next steps
10499
[Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](user-provisioning.md)
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Azure AD Provisioning to SAP ERP Central Component (SAP ECC) 7.0
3+
description: This document describes how to configure Azure AD to provision users into SAP ECC 7.
4+
services: active-directory
5+
author: billmath
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: app-provisioning
9+
ms.topic: how-to
10+
ms.workload: identity
11+
ms.date: 06/30/2023
12+
ms.author: billmath
13+
ms.reviewer: arvinh
14+
---
15+
16+
# Configuring Azure AD to provision users into SAP ECC 7.0
17+
The following documentation provides configuration and tutorial information demonstrating how to provision users from Azure AD into SAP ERP Central Component (SAP ECC) 7.0.
18+
19+
20+
[!INCLUDE [active-directory-app-provisioning-sap.md](../../../includes/active-directory-app-provisioning-sap.md)]
21+
22+
## Next steps
23+
24+
- [App provisioning](user-provisioning.md)
25+
- [Tutorial: ECMA Connector Host generic SQL connector](tutorial-ecma-sql-connector.md)

0 commit comments

Comments
 (0)