Skip to content

Commit 5f4a6ee

Browse files
authored
Merge pull request #241529 from MicrosoftDocs/main
6/14/2023 10AM Publishing
2 parents 6bfd6fc + 5b00f59 commit 5f4a6ee

File tree

132 files changed

+1693
-1806
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

132 files changed

+1693
-1806
lines changed

.openpublishing.redirection.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17568,6 +17568,41 @@
1756817568
"redirect_url": "/azure/vpn-gateway/point-to-site-about",
1756917569
"redirect_document_id": false
1757017570
},
17571+
{
17572+
"source_path_from_root": "/articles/vpn-gateway/scripts/vpn-gateway-sample-vnet-vnet-powershell.md",
17573+
"redirect_url": "/azure/vpn-gateway/vpn-gateway-vnet-vnet-rm-ps",
17574+
"redirect_document_id": false
17575+
},
17576+
{
17577+
"source_path_from_root": "/articles/vpn-gateway/scripts/vpn-gateway-sample-site-to-site-powershell.md",
17578+
"redirect_url": "/azure/vpn-gateway/vpn-gateway-create-site-to-site-rm-powershell",
17579+
"redirect_document_id": false
17580+
},
17581+
{
17582+
"source_path_from_root": "/articles/vpn-gateway/scripts/vpn-gateway-sample-point-to-site-certificate-authentication-powershell.md",
17583+
"redirect_url": "/azure/vpn-gateway/vpn-gateway-howto-point-to-site-rm-ps",
17584+
"redirect_document_id": false
17585+
},
17586+
{
17587+
"source_path_from_root": "/articles/vpn-gateway/scripts/vpn-gateway-sample-point-to-site-radius-authentication-powershell.md",
17588+
"redirect_url": "/azure/vpn-gateway/point-to-site-how-to-radius-ps",
17589+
"redirect_document_id": false
17590+
},
17591+
{
17592+
"source_path_from_root": "/articles/vpn-gateway/scripts/vpn-gateway-sample-site-to-site-download-devicescript-powershell.md",
17593+
"redirect_url": "/azure/vpn-gateway/vpn-gateway-download-vpndevicescript",
17594+
"redirect_document_id": false
17595+
},
17596+
{
17597+
"source_path_from_root": "/articles/vpn-gateway/scripts/vpn-gateway-sample-create-vpn-gateway-powershell.md",
17598+
"redirect_url": "/azure/vpn-gateway/create-routebased-vpn-gateway-powershell",
17599+
"redirect_document_id": false
17600+
},
17601+
{
17602+
"source_path_from_root": "/articles/vpn-gateway/powershell-samples.md",
17603+
"redirect_url": "/azure/vpn-gateway/vpn-gateway-about-vpngateways",
17604+
"redirect_document_id": false
17605+
},
1757117606
{
1757217607
"source_path_from_root": "/articles/security/fundamentals/ddos-best-practices.md",
1757317608
"redirect_url": "/azure/ddos-protection/fundamental-best-practices",

articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Yes, a customer can detect, mitigate, and monitor the risk of 'backdoor' account
3131

3232
## Where can customers access Permissions Management?
3333

34-
Customers can access the Permissions Management interface with a link from the Azure AD extension in the Azure portal.
34+
Customers can access the Permissions Management interface from the [Microsoft Entra admin center](https://entra.microsoft.com/) .
3535

3636
## Can non-cloud customers use Permissions Management on-premises?
3737

@@ -128,7 +128,7 @@ No, Permissions Management doesn't have access to sensitive personal data.
128128

129129
## Where can I find more information about Permissions Management?
130130

131-
You can read our blog and visit our web page. You can also get in touch with your Microsoft point of contact to schedule a demo.
131+
You can read our [blog](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/bg-p/Identity) and visit our [web page](https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-permissions-management). You can also get in touch with your Microsoft point of contact to schedule a demo.
132132

133133
## What is the data destruction/decommission process?
134134

@@ -152,7 +152,7 @@ Although Permissions Management supports all resources, Microsoft only requires
152152

153153
## How do I figure out how many resources I have?
154154

155-
To find out how many resources you have across your multicloud infrastructure, view the Billable Resources tab in Permissions Management.
155+
To find out how many resources you have across your multicloud infrastructure, select Settings (gear icon) and view the Billable Resources tab in Permissions Management.
156156

157157
## What do I do if I’m using Public Preview version of Entra Permissions Management?
158158

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,6 @@ Administrators can assign a Conditional Access policy to the following cloud app
4242
- Microsoft Application Insights Analytics
4343
- [Microsoft Azure Information Protection](/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
4444
- [Microsoft Azure Management](#microsoft-azure-management)
45-
- Microsoft Azure Subscription Management
4645
- Microsoft Defender for Cloud Apps
4746
- Microsoft Commerce Tools Access Control Portal
4847
- Microsoft Commerce Tools Authentication Service

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,9 @@ The following options are available to include when creating a Conditional Acces
5555
> [!WARNING]
5656
> Conditional Access policies do not support users assigned a directory role [scoped to an administrative unit](../roles/admin-units-assign-roles.md) or directory roles scoped directly to an object, like through [custom roles](../roles/custom-create.md).
5757
58+
> [!NOTE]
59+
> When targeting policies to B2B direct connect external users, these policies will also be applied to B2B collaboration users accessing Teams or SharePoint Online who are also eligible for B2B direct connect. The same applies for policies targeted to B2B collaboration external users, meaning users accessing Teams shared channels will have B2B collaboration policies apply if they also have a guest user presence in the tenant.
60+
5861
## Exclude users
5962

6063
When organizations both include and exclude a user or group the user or group is excluded from the policy, as an exclude action overrides an include in policy. Exclusions are commonly used for emergency access or break-glass accounts. More information about emergency access accounts and why they're important can be found in the following articles:

articles/active-directory/develop/app-objects-and-service-principals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ To access resources that are secured by an Azure AD tenant, the entity that requ
4949

5050
There are three types of service principal:
5151

52-
- **Application** - The type of service principal is the local representation, or application instance, of a global application object in a single tenant or directory. In this case, a service principal is a concrete instance created from the application object and inherits certain properties from that application object. A service principal is created in each tenant where the application is used and references the globally unique app object. The service principal object defines what the app can actually do in the specific tenant, who can access the app, and what resources the app can access.
52+
- **Application** - This type of service principal is the local representation, or application instance, of a global application object in a single tenant or directory. In this case, a service principal is a concrete instance created from the application object and inherits certain properties from that application object. A service principal is created in each tenant where the application is used and references the globally unique app object. The service principal object defines what the app can actually do in the specific tenant, who can access the app, and what resources the app can access.
5353

5454
When an application is given permission to access resources in a tenant (upon registration or consent), a service principal object is created. When you register an application using the Azure portal, a service principal is created automatically. You can also create service principal objects in a tenant using Azure PowerShell, Azure CLI, Microsoft Graph, and other tools.
5555

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -145,14 +145,19 @@ The exported list includes these device identity attributes:
145145

146146
If you want to manage device identities by using the Azure portal, the devices need to be either [registered or joined](overview.md) to Azure AD. As an administrator, you can control the process of registering and joining devices by configuring the following device settings.
147147

148-
You must be assigned one of the following roles to view or manage device settings in the Azure portal:
148+
You must be assigned one of the following roles to view device settings in the Azure portal:
149149

150150
- Global Administrator
151151
- Global Reader
152152
- Cloud Device Administrator
153-
- Intune administrator
154-
- Windows 365 administrator
155-
- Directory reviewer
153+
- Intune Administrator
154+
- Windows 365 Administrator
155+
- Directory Reviewer
156+
157+
You must be assigned one of the following roles to manage device settings in the Azure portal:
158+
159+
- Global Administrator
160+
- Cloud Device Administrator
156161

157162
![Screenshot that shows device settings related to Azure AD.](./media/device-management-azure-portal/device-settings-azure-portal.png)
158163

@@ -178,7 +183,7 @@ You must be assigned one of the following roles to view or manage device setting
178183
This option is a premium edition capability available through products like Azure AD Premium and Enterprise Mobility + Security.
179184
- **Enable Azure AD Local Administrator Password Solution (LAPS) (preview)**: LAPS is the management of local account passwords on Windows devices. LAPS provides a solution to securely manage and retrieve the built-in local admin password. With cloud version of LAPS, customers can enable storing and rotation of local admin passwords for both Azure AD and Hybrid Azure AD join devices. To learn how to manage LAPS in Azure AD, see [the overview article](howto-manage-local-admin-passwords.md).
180185

181-
- **Restrict non-admin users from recovering the BitLocker key(s) for their owned devices (preview)**: In this preview, admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices.
186+
- **Restrict non-admin users from recovering the BitLocker key(s) for their owned devices**: Admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices. You must be a Global Administrator or Privileged Role Administrator to update this setting.
182187

183188
- **Enterprise State Roaming**: For information about this setting, see [the overview article](enterprise-state-roaming-overview.md).
184189

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,10 @@ Azure China 21Vianet:
7878
- `https://login.chinacloudapi.cn`: For authentication flows.
7979
- `https://pas.chinacloudapi.cn`: For Azure RBAC flows.
8080

81+
### Authentication requirements
82+
83+
[Azure AD Guest accounts](https://learn.microsoft.com/azure/active-directory/external-identities/what-is-b2b) cannot connect to Azure Bastion via Azure AD authentication.
84+
8185
## Enable Azure AD login for a Windows VM in Azure
8286

8387
To use Azure AD login for a Windows VM in Azure, you must:

articles/active-directory/external-identities/customers/how-to-add-attributes-to-token.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: ciam
1010
ms.topic: how-to
11-
ms.date: 05/08/2023
11+
ms.date: 06/14/2023
1212
ms.author: mimart
1313
ms.custom: it-pro
1414

@@ -45,7 +45,7 @@ You can specify which built-in or custom attributes you want to include as claim
4545

4646
### To add a built-in attribute to the token as a claim
4747

48-
1. On the **Manage claim** page, select **Add new claim**.
48+
1. On the **Attributes & Claims** page, select **Add new claim**.
4949
1. Enter a **Name**.
5050
1. Next to **Source**, select **Attribute**. Then use the drop down list to select the built-in attribute.
5151

@@ -55,7 +55,7 @@ You can specify which built-in or custom attributes you want to include as claim
5555

5656
### To add a custom attribute to the token as a claim
5757

58-
1. On the **Manage claim** page, select **Add new claim**.
58+
1. On the **Attributes & Claims** page, select **Add new claim**.
5959
1. Enter a **Name**.
6060
1. Next to **Source**, select **Directory schema extension (Preview)**.
6161

@@ -71,11 +71,13 @@ You can specify which built-in or custom attributes you want to include as claim
7171

7272
### Update the application manifest to accept mapped claims
7373

74-
Ensure that **"allowPublicClient": true** is set in the application manifest.
75-
76-
1. In the left menu, under **Manage**, select **Manifest** to open application manifest.
77-
78-
1. Find the **acceptMappedClaims** key and ensure its value is set to **true**.
74+
1. In the [Microsoft Entra admin center](https://entra.microsoft.com/), select **Azure Active Directory**.
75+
1. Select **Applications** > **App registrations**.
76+
1. Select your application in the list to open the application's **Overview** page.
77+
1. In the left menu, under **Manage**, select **Manifest** to open the application manifest.
78+
1. Find the **acceptMappedClaims** key and set its value to **true**.
79+
1. Find the **allowPublicClient** key and set its value to **true**.
80+
1. Select **Save**.
7981

8082
## Next steps
8183

articles/active-directory/external-identities/customers/how-to-facebook-federation-customers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,10 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
4545
1. From the menu, select **Facebook Login**, select **Settings**.
4646
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
4747
- `https://login.microsoftonline.com/te/<tenant-ID>/oauth2/authresp`
48-
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oidc/www.facebook.com`
49-
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oidc/www.facebook.com`
50-
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oauth2`
51-
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oauth2`
48+
- `https://<tenant-name>.ciamlogin.com/<tenant-ID>/federation/oidc/www.facebook.com`
49+
- `https://<tenant-name>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oidc/www.facebook.com`
50+
- `https://<tenant-name>.ciamlogin.com/<tenant-ID>/federation/oauth2`
51+
- `https://<tenant-name>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oauth2`
5252
> [!NOTE]
5353
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
5454
1. Select **Save Changes** at the bottom of the page.
@@ -65,8 +65,8 @@ After you create the Facebook application, in this step you set the Facebook cli
6565
<!-- ![Screenshot that shows how to add Facebook identity provider in Azure AD.](./media/sign-in-with-facebook/configure-facebook-idp.png)-->
6666

6767
1. Enter a **Name**. For example, *Facebook*.
68-
1. For the **Client ID**, enter the Client ID of the Facebook application that you created earlier.
69-
1. For the **Client secret**, enter the Client Secret that you recorded.
68+
1. For the **Client ID**, enter the App ID of the Facebook application that you created earlier.
69+
1. For the **Client secret**, enter the App Secret that you recorded.
7070
1. Select **Save**.
7171

7272
To configure Facebook federation by using PowerShell, follow these steps:

0 commit comments

Comments
 (0)