Skip to content

Commit 57fe933

Browse files
authored
Merge branch 'MicrosoftDocs:main' into mdb-quotas
2 parents 31761bd + 9d33b25 commit 57fe933

File tree

1,427 files changed

+19914
-11171
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,427 files changed

+19914
-11171
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1091,6 +1091,7 @@
10911091
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
10921092
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
10931093
"articles/communication-services/.openpublishing.redirection.communication-services.json",
1094+
"articles/communications-gateway/.openpublishing.redirection.communications-gateway.json",
10941095
"articles/confidential-computing/.openpublishing.redirection.json",
10951096
"articles/container-apps/.openpublishing.redirection.container-apps.json",
10961097
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",

.openpublishing.redirection.json

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1775,6 +1775,11 @@
17751775
"redirect_url": "/azure/site-recovery/failover-failback-overview-modernized",
17761776
"redirect_document_id": false
17771777
},
1778+
{
1779+
"source_path": "articles/site-recovery/vmware-physical-secondary-support-matrix.md",
1780+
"redirect_url": "/azure/site-recovery/vmware-physical-secondary-architecture",
1781+
"redirect_document_id": false
1782+
},
17781783
{
17791784
"source_path": "articles/site-recovery/switch-replication-appliance-preview.md",
17801785
"redirect_url": "/azure/site-recovery/switch-replication-appliance-modernized",
@@ -23387,6 +23392,11 @@
2338723392
"redirect_url": "/azure/devtest-labs/samples-cli",
2338823393
"redirect_document_id": false
2338923394
},
23395+
{
23396+
"source_path_from_root": "/articles/devtest-labs/how-to-move-schedule-to-new-region.md",
23397+
"redirect_url": "/azure/devtest-labs/how-to-move-labs",
23398+
"redirect_document_id": false
23399+
},
2339023400
{
2339123401
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
2339223402
"redirect_url": "/azure/advisor/advisor-overview",
@@ -23787,11 +23797,6 @@
2378723797
"redirect_url": "/azure/private-5g-core/monitor-private-5g-core-with-platform-metrics",
2378823798
"redirect_document_id": false
2378923799
},
23790-
{
23791-
"source_path": "articles/communications-gateway/rotate-secrets.md",
23792-
"redirect_URL": "/azure/communications-gateway/whats-new",
23793-
"redirect_document_id": false
23794-
},
2379523800
{
2379623801
"source_path": "articles/batch/high-availability-disaster-recovery.md",
2379723802
"redirect_URL": "/azure/reliability/reliability-batch",
@@ -24261,6 +24266,11 @@
2426124266
"source_path_from_root": "/articles/reliability/reliability-postgre-flexible.md",
2426224267
"redirect_url": "/azure/reliability/reliability-postgresql-flexible-server",
2426324268
"redirect_document_id": false
24269+
},
24270+
{
24271+
"source_path_from_root": "/articles/private-link/tutorial-private-endpoint-cosmosdb-portal.md",
24272+
"redirect_url": "/azure/cosmos-db/how-to-configure-private-endpoints",
24273+
"redirect_document_id": false
2426424274
}
2426524275
]
2426624276
}

.openpublishing.redirection.sentinel.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,36 @@
179179
"source_path": "articles/sentinel/store-logs-in-azure-data-explorer.md",
180180
"redirect_url": "/azure/azure-monitor/logs/data-retention-archive",
181181
"redirect_document_id": true
182+
},
183+
{
184+
"source_path": "articles/sentinel/data-connectors/box-using-azure-function.md",
185+
"redirect_url": "/azure/sentinel/data-connectors/box-using-azure-functions",
186+
"redirect_document_id": true
187+
},
188+
{
189+
"source_path": "articles/sentinel/data-connectors/office-365.md",
190+
"redirect_url": "/azure/sentinel/data-connectors/microsoft-365",
191+
"redirect_document_id": true
192+
},
193+
{
194+
"source_path": "articles/sentinel/data-connectors/sophos-endpoint-protection-using-azure-function.md",
195+
"redirect_url": "/azure/sentinel/data-connectors/sophos-endpoint-protection-using-azure-functions",
196+
"redirect_document_id": true
197+
},
198+
{
199+
"source_path": "articles/sentinel/data-connectors/palo-alto-prisma-cloud-cspm-using-azure-function.md",
200+
"redirect_url": "/azure/sentinel/data-connectors/palo-alto-prisma-cloud-cspm-using-azure-functions",
201+
"redirect_document_id": true
202+
},
203+
{
204+
"source_path": "articles/sentinel/data-connectors/proofpoint-tap-using-azure-function.md",
205+
"redirect_url": "/azure/sentinel/data-connectors/proofpoint-tap-using-azure-functions",
206+
"redirect_document_id": true
207+
},
208+
{
209+
"source_path": "articles/sentinel/data-connectors/rubrik-security-cloud-data-connector-using-azure-function.md",
210+
"redirect_url": "/azure/sentinel/data-connectors/rubrik-security-cloud-data-connector-using-azure-functions",
211+
"redirect_document_id": true
182212
}
183213
]
184214
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,11 @@
194194
"source_path_from_root": "/articles/virtual-desktop/app-attach-glossary.md",
195195
"redirect_url": "/azure/virtual-desktop/what-is-app-attach",
196196
"redirect_document_id": false
197+
},
198+
{
199+
"source_path_from_root": "/articles/virtual-desktop/windows-10-multisession-faq.yml",
200+
"redirect_url": "/azure/virtual-desktop/windows-multisession-faq",
201+
"redirect_document_id": true
197202
}
198203
]
199204
}

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/25/2023
4+
ms.date: 08/30/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ items:
3535
href: on-premises-web-services-connector.md
3636
- name: Provisioning with custom connectors
3737
href: on-premises-custom-connector.md
38-
- name: Provisioning to SAP ECC 7.0
38+
- name: Provisioning to SAP ECC (formerly SAP R/3)
3939
href: on-premises-sap-connector-configure.md
4040
- name: API-driven inbound provisioning tutorials
4141
items:

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Next, if one or more of the users that will need access to the application do no
4343
The following sections outline how to create extension attributes for a tenant with cloud only users, and for a tenant with Active Directory users.
4444

4545
## Create an extension attribute in a tenant with cloud only users
46-
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you do not have any users who need that attribute and originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
46+
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you have any users who need that attribute and do not originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
4747

4848
Once schema extensions are created, these extension attributes are automatically discovered when you next visit the provisioning page in the Azure portal, in most cases.
4949

@@ -82,7 +82,7 @@ Content-type: application/json
8282
"extension_inputAppId_extensionName": "extensionValue"
8383
}
8484
```
85-
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get).
85+
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get). Note that the Graph v1.0 does not by default return any of a user's directory extension attributes, unless the attributes are specified in the request as one of the properties to return.
8686

8787
```json
8888
GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_inputAppId_extensionName

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,7 @@ The following providers offer FIDO2 security keys of different form factors that
122122
| [Feitian](https://shop.ftsafe.us/pages/microsoft) | ![y] | ![y]| ![y]| ![y]| ![y] |
123123
| [Fortinet](https://www.fortinet.com/) | ![n] | ![y]| ![n]| ![n]| ![n] |
124124
| [Giesecke + Devrient (G+D)](https://www.gi-de.com/en/identities/enterprise-security/hardware-based-authentication) | ![y] | ![y]| ![y]| ![y]| ![n] |
125+
| [Google](https://store.google.com/us/product/titan_security_key) | ![n] | ![y]| ![y]| ![n]| ![n] |
125126
| [GoTrustID Inc.](https://www.gotrustid.com/idem-key) | ![n] | ![y]| ![y]| ![y]| ![n] |
126127
| [HID](https://www.hidglobal.com/products/crescendo-key) | ![n] | ![y]| ![y]| ![n]| ![n] |
127128
| [HIDEEZ](https://hideez.com/products/hideez-key-4) | ![n] | ![y]| ![y]| ![y]| ![n] |
@@ -135,6 +136,7 @@ The following providers offer FIDO2 security keys of different form factors that
135136
| [Nymi](https://www.nymi.com/nymi-band) | ![y] | ![n]| ![y]| ![n]| ![n] |
136137
| [Octatco](https://octatco.com/) | ![y] | ![y]| ![n]| ![n]| ![n] |
137138
| [OneSpan Inc.](https://www.onespan.com/products/fido) | ![n] | ![y]| ![n]| ![y]| ![n] |
139+
| [PONE Biometrics](https://ponebiometrics.com/) | ![y] | ![n]| ![n]| ![y]| ![n] |
138140
| [Precision Biometric](https://www.innait.com/product/fido/) | ![n] | ![y]| ![n]| ![n]| ![n] |
139141
| [RSA](https://www.rsa.com/products/securid/) | ![n] | ![y]| ![n]| ![n]| ![n] |
140142
| [Sentry](https://sentryenterprises.com/) | ![n] | ![n]| ![y]| ![n]| ![n] |

articles/active-directory/authentication/concept-fido2-hardware-vendor.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ The following table lists partners who are Microsoft-compatible FIDO2 security k
4343
| [Feitian](https://shop.ftsafe.us/pages/microsoft) | ![y] | ![y]| ![y]| ![y]| ![y] |
4444
| [Fortinet](https://www.fortinet.com/) | ![n] | ![y]| ![n]| ![n]| ![n] |
4545
| [Giesecke + Devrient (G+D)](https://www.gi-de.com/en/identities/enterprise-security/hardware-based-authentication) | ![y] | ![y]| ![y]| ![y]| ![n] |
46+
| [Google](https://store.google.com/us/product/titan_security_key) | ![n] | ![y]| ![y]| ![n]| ![n] |
4647
| [GoTrustID Inc.](https://www.gotrustid.com/idem-key) | ![n] | ![y]| ![y]| ![y]| ![n] |
4748
| [HID](https://www.hidglobal.com/products/crescendo-key) | ![n] | ![y]| ![y]| ![n]| ![n] |
4849
| [HIDEEZ](https://hideez.com/products/hideez-key-4) | ![n] | ![y]| ![y]| ![y]| ![n] |
@@ -56,6 +57,7 @@ The following table lists partners who are Microsoft-compatible FIDO2 security k
5657
| [Nymi](https://www.nymi.com/nymi-band) | ![y] | ![n]| ![y]| ![n]| ![n] |
5758
| [Octatco](https://octatco.com/) | ![y] | ![y]| ![n]| ![n]| ![n] |
5859
| [OneSpan Inc.](https://www.onespan.com/products/fido) | ![n] | ![y]| ![n]| ![y]| ![n] |
60+
| [PONE Biometrics](https://ponebiometrics.com/) | ![y] | ![n]| ![n]| ![y]| ![n] |
5961
| [Precision Biometric](https://www.innait.com/product/fido/) | ![n] | ![y]| ![n]| ![n]| ![n] |
6062
| [RSA](https://www.rsa.com/products/securid/) | ![n] | ![y]| ![n]| ![n]| ![n] |
6163
| [Sentry](https://sentryenterprises.com/) | ![n] | ![n]| ![y]| ![n]| ![n] |

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/22/2023
10+
ms.date: 08/31/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -99,7 +99,7 @@ This setting allows configuration of lifetime for token issued by Azure Active D
9999

100100
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
101101

102-
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-in-log-activity-details.md#authentication-details).
102+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see the [Learn about the sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md) article.
103103

104104
![Screenshot of authentication details.](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/details.png)
105105

0 commit comments

Comments
 (0)