Skip to content

Commit 59217f7

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-build-cosmosdb
2 parents 054000e + b015766 commit 59217f7

File tree

95 files changed

+1508
-380
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+1508
-380
lines changed

articles/active-directory/b2b/add-users-administrator.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 11/12/2019
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -41,9 +41,6 @@ To add B2B collaboration users to the directory, follow these steps:
4141

4242
![Shows where New guest user is in the UI](./media/add-users-administrator/new-guest-user-in-all-users.png)
4343

44-
> [!NOTE]
45-
> The **New guest user** option is also available on the **Organizational relationships** page. In **Azure Active Directory**, under **Manage**, select **Organizational relationships**.
46-
4744
5. On the **New user** page, select **Invite user** and then add the guest user's information.
4845

4946
> [!NOTE]

articles/active-directory/b2b/auditing-and-reporting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 12/14/2018
9+
ms.date: 05/11/2020
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
With guest users, you have auditing capabilities similar to with member users.
2121

2222
## Access reviews
23-
You can use access reviews to periodically verify whether guest users still need access to your resources. The **Access reviews** feature is available in **Azure Active Directory** under **Manage** > **Organizational Relationships**. (You can also search for "access reviews" from **All services** in the Azure portal.) To learn how to use access reviews, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
23+
You can use access reviews to periodically verify whether guest users still need access to your resources. The **Access reviews** feature is available in **Azure Active Directory** under **Organizational Relationships** > **Access reviews** (or **External Identities** > **Access reviews** ). You can also search for "access reviews" from **All services** in the Azure portal. To learn how to use access reviews, see [Manage guest access with Azure AD access reviews](../governance/manage-guest-access-with-access-reviews.md).
2424

2525
## Audit logs
2626

articles/active-directory/b2b/delegate-invitations.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 04/11/2019
9+
ms.date: 05/11/2020
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -34,11 +34,9 @@ By default, all users, including guests, can invite guest users.
3434
### To configure external collaboration settings:
3535

3636
1. Sign in to the [Azure portal](https://portal.azure.com) as a tenant administrator.
37-
2. Select **Azure Active Directory** > **Users** > **User settings**.
38-
3. Under **External users**, select **Manage external collaboration settings**.
39-
> [!NOTE]
40-
> The **External collaboration settings** are also available from the **Organizational relationships** page. In Azure Active Directory, under **Manage**, go to **Organizational relationships** > **Settings**.
41-
4. On the **External collaboration settings** page, choose the policies you want to enable.
37+
2. Select **Azure Active Directory**.
38+
3. Select **Organizational Relationships** > **Settings** (or select **External Identities** > **External collaboration settings**).
39+
6. On the **External collaboration settings** page, choose the policies you want to enable.
4240

4341
![External collaboration settings](./media/delegate-invitations/control-who-to-invite.png)
4442

articles/active-directory/b2b/direct-federation.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 05/07/2020
9+
ms.date: 05/11/2020
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -143,8 +143,8 @@ Next, you'll configure federation with the identity provider configured in step
143143
### To configure direct federation in the Azure AD portal
144144

145145
1. Go to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
146-
2. Select **Organizational Relationships**.
147-
3. Select **Identity providers**, and then select **New SAML/WS-Fed IdP**.
146+
2. Select **Organizational Relationships** > **All identity providers** (or **External Identities** > **All identity providers**).
147+
3. Select , and then select **New SAML/WS-Fed IdP**.
148148

149149
![Screenshot showing button for adding a new SAML or WS-Fed IdP](media/direct-federation/new-saml-wsfed-idp.png)
150150

@@ -191,8 +191,8 @@ Now test your direct federation setup by inviting a new B2B guest user. For deta
191191
## How do I edit a direct federation relationship?
192192

193193
1. Go to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
194-
2. Select **Organizational Relationships**.
195-
3. Select **Identity providers**
194+
2. Select **Organizational Relationships** (or **External Identities**).
195+
3. Select **All identity providers**
196196
4. Under **SAML/WS-Fed identity providers**, select the provider.
197197
5. In the identity provider details pane, update the values.
198198
6. Select **Save**.
@@ -203,8 +203,8 @@ You can remove your direct federation setup. If you do, direct federation guest
203203
To remove direct federation with an identity provider in the Azure AD portal:
204204

205205
1. Go to the [Azure portal](https://portal.azure.com/). In the left pane, select **Azure Active Directory**.
206-
2. Select **Organizational Relationships**.
207-
3. Select **Identity providers**.
206+
2. Select **Organizational Relationships** (or **External Identities**).
207+
3. Select **All identity providers**.
208208
4. Select the identity provider, and then select **Delete**.
209209
5. Select **Yes** to confirm deletion.
210210

articles/active-directory/b2b/google-federation.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 03/05/2020
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -88,8 +88,8 @@ Now you'll set the Google client ID and client secret, either by entering it in
8888

8989
#### To configure Google federation in the Azure AD portal
9090
1. Go to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
91-
2. Select **Organizational Relationships**.
92-
3. Select **Identity providers**, and then click the **Google** button.
91+
2. Select **Organizational Relationships** (or **External Identities**).
92+
3. Select **All identity providers**, and then click the **Google** button.
9393
4. Enter a name. Then enter the client ID and client secret you obtained earlier. Select **Save**.
9494

9595
![Screenshot showing the Add Google identity provider page](media/google-federation/google-identity-provider.png)
@@ -111,8 +111,8 @@ You can delete your Google federation setup. If you do so, Google guest users wh
111111

112112
### To delete Google federation in the Azure AD portal:
113113
1. Go to the [Azure portal](https://portal.azure.com). In the left pane, select **Azure Active Directory**.
114-
2. Select **Organizational Relationships**.
115-
3. Select **Identity providers**.
114+
2. Select **Organizational Relationships** (or **External Identities**).
115+
3. Select **All identity providers**.
116116
4. On the **Google** line, select the context menu (**...**) and then select **Delete**.
117117

118118
![Screenshot showing the Delete option for the social identity provider](media/google-federation/google-social-identity-providers.png)

articles/active-directory/b2b/one-time-passcode.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 04/08/2019
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -54,7 +54,7 @@ When a guest user redeems an invitation or uses a link to a resource that has be
5454

5555
At the time of invitation, there's no indication that the user you're inviting will use one-time passcode authentication. But when the guest user signs in, one-time passcode authentication will be the fallback method if no other authentication methods can be used.
5656

57-
You can view guest users who authenticate with one-time passcodes in the Azure portal by going to **Azure Active Directory** > **Organizational relationships** > **Users from other organizations**.
57+
You can view guest users who authenticate with one-time passcodes in the Azure portal by going to **Azure Active Directory** > **Users**.
5858

5959
![Screenshot showing a one-time passcode user with Source value of OTP](media/one-time-passcode/otp-users.png)
6060

@@ -70,8 +70,7 @@ It might take a few minutes for the opt-in action to take effect. After that, on
7070
### To opt in using the Azure AD portal
7171
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD global administrator.
7272
2. In the navigation pane, select **Azure Active Directory**.
73-
3. Under **Manage**, select **Organizational Relationships**.
74-
4. Select **Settings**.
73+
3. Select **Organizational Relationships** > **Settings** (or select **External Identities** > **External collaboration settings**).
7574
5. Under **Enable Email One-Time Passcode for guests (Preview)**, select **Yes**.
7675

7776
### To opt in using PowerShell
@@ -137,8 +136,7 @@ It may take a few minutes for the opt-out action to take effect. If you turn off
137136
### To turn off the preview using the Azure AD portal
138137
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD global administrator.
139138
2. In the navigation pane, select **Azure Active Directory**.
140-
3. Under **Manage**, select **Organizational Relationships**.
141-
4. Select **Settings**.
139+
3. Select **Organizational Relationships** > **Settings** (or select **External Identities** > **External collaboration settings**).
142140
5. Under **Enable Email One-Time Passcode for guests (Preview)**, select **No**.
143141

144142
### To turn off the preview using PowerShell

articles/active-directory/b2b/redemption-experience.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 03/19/2020
10+
ms.date: 05/11/2020
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -98,7 +98,7 @@ When a guest signs in to access resources in a partner organization for the firs
9898

9999
![Screenshot showing new terms of use](media/redemption-experience/terms-of-use-accept.png)
100100

101-
You can configure see [terms of use](../governance/active-directory-tou.md) in **Manage** > **Organizational relationships** > **Terms of use**.
101+
You can configure [terms of use](../governance/active-directory-tou.md) in **Organizational relationships** (or **External Identities**) > **Terms of use**.
102102

103103
3. Unless otherwise specified, the guest is redirected to the Apps access panel, which lists the applications the guest can access.
104104

articles/active-directory/develop/tutorial-v2-angular.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,6 @@ If a back-end API doesn't require a scope (not recommended), you can use *client
339339
340340
## Next steps
341341
342-
Next, learn how to sign in a user and acquire tokens in the Angular tutorial:
342+
If you're new to identity and access management, we have several articles to help you learn modern authentication concepts, starting with [authentication vs. authorization](authentication-vs-authorization.md).
343343

344-
> [!div class="nextstepaction"]
345-
> [Angular tutorial](https://docs.microsoft.com/azure/active-directory/develop/tutorial-v2-angular)
344+
If you'd like to dive deeper into single-page application development on the Microsoft identity platform, the multi-part [Scenario: Single-page application](scenario-spa-overview.md) series of articles can help you get started.

articles/active-directory/privileged-identity-management/powershell-for-azure-ad-roles.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 04/28/2020
16+
ms.date: 05/11/2020
1717
ms.author: curtand
1818
ms.custom: pim
1919
ms.collection: M365-identity-device-management
@@ -119,11 +119,10 @@ There are four main objects in the setting. Only three of these objects are curr
119119

120120
[![](media/powershell-for-azure-ad-roles/get-update-role-settings-result.png "Get and update role settings")](media/powershell-for-azure-ad-roles/get-update-role-settings-result.png#lightbox)
121121

122-
To update the role setting, you will need to first define a setting object as follows:
122+
To update the role setting, you must get the existing setting object for a particular role and make changes to it:
123123

124-
$setting = New-Object Microsoft.Open.MSGraph.Model.AzureADMSPrivilegedRuleSetting
125-
$setting.RuleIdentifier = "JustificationRule"
126-
$setting.Setting = "{'required':false}"
124+
$setting = Get-AzureADMSPrivilegedRoleSetting -ProviderId 'aadRoles' -Filter "roleDefinitionId eq 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx'"
125+
$setting.UserMemberSetting.justificationRule = '{"required":false}'
127126

128127
You can then go ahead and apply the setting to one of the objects for a particular role as shown below. The ID here is the role setting ID that can be retrieved from the result of the list role settings cmdlet.
129128

articles/active-directory/user-help/multi-factor-authentication-end-user-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ App passwords replace your normal password for older desktop applications that d
9797

9898
If you're using two-factor verification with your work or school account (for example, [email protected]), it most likely means that your organization has decided you must use this added security feature. Because your organization has decided you must use this feature, there is no way for you to individually turn it off. If, however, you're using two-factor verification with a personal account, like [email protected], you have the ability to turn the feature on and off. For instructions about how to control two-factor verification for your personal accounts, see [Turning two-factor verification on or off for your Microsoft account](https://support.microsoft.com/help/4028586/microsoft-account-turning-two-step-verification-on-or-off).
9999

100-
If you can't turn off two-factor verification, it could also be because of the security defaults that have been applied at the organization level. For more information about security defaults, see [What are security defulta?](../fundamentals/concept-fundamentals-security-defaults.md)
100+
If you can't turn off two-factor verification, it could also be because of the security defaults that have been applied at the organization level. For more information about security defaults, see [What are security defaults?](../fundamentals/concept-fundamentals-security-defaults.md)
101101

102102
## I didn't find an answer to my problem
103103

0 commit comments

Comments
 (0)