Skip to content

Commit 5f4f7fa

Browse files
authored
Merge pull request #226250 from lauradolan/release-sap-architecture
In the dirty PR review, the files indicated as deleted match the output posted by the contributor. D articles/center-sap-solutions/index.yml D articles/center-sap-solutions/toc.yml D articles/virtual-machines/workloads/sap/automation-faq.yml D articles/virtual-machines/workloads/sap/automation-reference-powershell.md D articles/virtual-machines/workloads/sap/breadcrumb/toc.yml D articles/virtual-machines/workloads/sap/media/azure-monitor-sap/azure-monitor-providers-netweaver- pre-req-1.png D articles/virtual-machines/workloads/sap/media/azure-monitor-sap/azure-monitor-providers-netweaver-role-generate.png D articles/virtual-machines/workloads/sap/media/azure-monitor-sap/azure-monitor-quickstart-1.png D articles/virtual-machines/workloads/sap/media/azure-monitor-sap/azure-monitor-quickstart-3.png D articles/virtual-machines/workloads/sap/media/azure-monitor-sap/azure-monitor-quickstart-4.png D articles/virtual-machines/workloads/sap/media/azure-monitor-sap/azure-monitor-quickstart-6.png D articles/virtual-machines/workloads/sap/module/automation-new-sapautomationregion.md D articles/virtual-machines/workloads/sap/module/automation-new-sapdeployer.md D articles/virtual-machines/workloads/sap/module/automation-new-saplibrary.md D articles/virtual-machines/workloads/sap/module/automation-new-sapsystem.md D articles/virtual-machines/workloads/sap/module/automation-new-sapworkloadzone.md D articles/virtual-machines/workloads/sap/module/automation-remove-sapautomationregion.md D articles/virtual-machines/workloads/sap/module/automation-remove-sapsystem.md D articles/virtual-machines/workloads/sap/module/automation-set-sapsecrets.md D articles/virtual-machines/workloads/sap/module/automation-update-tfstate.md D articles/virtual-machines/workloads/sap/toc.yml
2 parents ae10fb0 + 007f4ff commit 5f4f7fa

File tree

165 files changed

+2556
-1720
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

165 files changed

+2556
-1720
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4416,6 +4416,11 @@
44164416
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
44174417
"redirect_document_id": false
44184418
},
4419+
{
4420+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-reports-latencies.md",
4421+
"redirect_url": "/azure/active-directory/reports-monitoring/reference-azure-ad-sla-performance",
4422+
"redirect_document_id": false
4423+
},
44194424
{
44204425
"source_path_from_root": "/articles/active-directory/customize-branding.md",
44214426
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,11 @@ sections:
119119
answer: |
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122+
- question: |
123+
Why does not proof up for registering other auth methods come up when I use single factor certificates?
124+
answer: |
125+
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
126+
122127
- question: |
123128
How can I use single-factor certificates to complete MFA?
124129
answer: |

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
24+
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
2525
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to onboard a Microsoft Azure subscription or subscriptions on Permissions Management. Onboarding a subscription creates a new authorization system to represent the Azure subscription in Permissions Management.
1818

1919
> [!NOTE]
20-
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20+
> A *global administrator* or *root user* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2121
2222
## Explanation
2323

articles/active-directory/devices/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@
9595
href: howto-hybrid-join-downlevel.md
9696
- name: Enforce TLS 1.2
9797
href: reference-device-registration-tls-1-2.md
98-
- name: Graph APIs
98+
- name: Microsoft Graph APIs
9999
href: /graph/api/resources/device
100100
- name: Resources
101101
items:
@@ -110,4 +110,4 @@
110110
- name: Stack Overflow
111111
href: https://stackoverflow.com/questions/tagged/azure-active-directory
112112
- name: Videos
113-
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory
113+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 9 additions & 2 deletions
Large diffs are not rendered by default.
Lines changed: 49 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -1,94 +1,98 @@
11
---
2-
title: Determine your security posture for external collaboration with Azure Active Directory
3-
description: Before you can execute an external access security plan, you must determine what you are trying to achieve.
2+
title: Determine your security posture for external access with Azure Active Directory
3+
description: Learn about governance of external access and assessing collaboration needs, by scenario
44
services: active-directory
5-
author: janicericketts
5+
author: jricketts
66
manager: martinco
77
ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 08/19/2022
11+
ms.date: 02/03/2023
1212
ms.author: jricketts
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Determine your security posture for external access
18+
# Determine your security posture for external access with Azure Active Directory
1919

20-
As you consider governing external access, you’ll need to assess the security and collaboration needs for your organization overall, and within each scenario. At the organizational level, consider the amount of control you need your IT team to have over day-to-day collaboration. Organizations in regulated industries may require more IT control. For example, a defense contractor may be required to positively identify and document each external user, their access, and the removal of access. This requirement may be on all access, or on specific scenarios or workloads. On the other end of the spectrum, a consulting firm may generally allow end users to determine the external users they need to collaborate with, within certain IT guard rails.
20+
As you consider the governance of external access, assess your organization's security and collaboration needs, by scenario. You can start with the level of control the IT team has over the day-to-day collaboration of end users. Organizations in highly regulated industries might require more IT team control. For example, defense contractors can have a requirement to positively identify and document external users, their access, and access removal: all access, scenario-based, or workloads. Consulting agencies can use certain features to allow end users to determine the external users they collaborate with.
2121

22-
![IT versus end-user control of collaboration](media/secure-external-access/1-overall-control.png)
22+
![Bar graph of the span from full IT team control, to end-user self service.](media/secure-external-access/1-overall-control.png)
2323

24-
> [!NOTE]
25-
> Overly tight control on collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as too onerous, end users tend to go around IT provided systems to get their jobs done, by for example emailing unsecured documents.
26-
27-
## Think in terms of scenarios
24+
> [!NOTE]
25+
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels. An example is end users sending unsecured documents by email.
2826
29-
In many cases IT can delegate partner access, at least in some scenarios, while providing guard rails for security. The IT guard rails can be help ensure that intellectual property stays secure, while empowering employees to collaborate with partners to get work done.
27+
## Scenario-based planning
3028

31-
As you consider the scenarios within your organization, assess the need for employee versus business partner access to resources. A bank may have compliance needs that restrict access to certain resources, like user account information, to a small group of internal employees. Conversely, the same bank may enable delegated access for partners working on a marketing campaign.
29+
IT teams can delegate partner access to empower employees to collaborate with partners. This delegation can occur while maintaining sufficient security to protect intellectual property.
3230

33-
![continuum of governance per scenario](media\secure-external-access\1-scenarios.png)
31+
Compile and assess your organizations scenarios to help assess employee versus business partner access to resources. Financial institutions might have compliance standards that restrict employee access to resources such as account information. Conversely, the same institutions can enable delegated partner access for projects such as marketing campaigns.
3432

35-
In each scenario, consider
33+
![Diagram of a balance of IT team goverened access to partner self-service.](media/secure-external-access/1-scenarios.png)
3634

37-
* the sensitivity of the information at risk
35+
### Scenario considerations
3836

39-
* whether you need to restrict what partners can see about other users
37+
Use the following list to help measure the level of access control.
4038

41-
* the cost of a breach vs the weight of centralized control and end-user friction
39+
* Information sensitivity, and associated risk of its exposure
40+
* Partner access to information about other end users
41+
* The cost of a breach versus the overhead of centralized control and end-user friction
4242

43-
You may also start with centrally managed controls to meet compliance targets and delegate control to end users over time. All access management models may simultaneously coexist within an organization.
43+
Organizations can start with highly managed controls to meet compliance targets, and then delegate some control to end users, over time. There can be simultaneous access-management models in an organization.
4444

45-
The use of [partner managed credentials](../external-identities/what-is-b2b.md) provides your organization with an essential signal that terminates access to your resources once the external user has lost access to the resources of their own company.
45+
> [!NOTE]
46+
> Partner-managed credentials are a method to signal the termination of access to resources, when an external user loses access to resources in their own company. Learn more: [B2B collaboration overview](../external-identities/what-is-b2b.md)
4647
47-
## Goals of securing external access
48+
## External-access security goals
4849

49-
The goals of IT-governed and delegated access differ.
50+
The goals of IT-governed and delegated access differ. The primary goals of IT-governed access are:
5051

51-
**The primary goals of IT-governed access are to:**
52+
* Meet governance, regulatory, and compliance (GRC) targets
53+
* High level of control over partner access to information about end users, groups, and other partners
5254

53-
* Meet governance, regulatory, and compliance (GRC) targets.
55+
The primary goals of delegating access are:
5456

55-
* Tightly control partner access and what partners can see about member users, groups, and other partners.
57+
* Enable business owners to determine collaboration partners, with security constraints
58+
* Enable partners to request access, based on rules defined by business owners
5659

57-
**The primary goals of delegating access are to:**
60+
### Common goals
5861

59-
* Enable business owners to govern who they collaborate with, within IT constraints.
62+
#### Control access to applications, data, and content
6063

61-
* Enable business partners to request access based on rules defined by business owners.
64+
Levels of control can be accomplished through various methods, depending on your version of Azure AD and Microsoft 365.
6265

63-
Whichever you enact for your organization and scenarios you'll need to:
66+
* [Azure AD plans and pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing)
67+
* [Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
6468

65-
* **Control access to applications, data, and content**. This can be accomplished through a variety of methods, depending on your versions of [Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing) and [Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
69+
#### Reduce attack surface
6670

67-
* **Reduce the attack surface**. [Privileged identity management](../privileged-identity-management/pim-configure.md), [data loss prevention (DLP),](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) and [encryption capabilities](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) reduce the attack surface.
71+
* [What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md) - manage, control, and monitor access to resources in Azure AD, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune
72+
* [Data loss prevention in Exchange Server](/exchange/policy-and-compliance/data-loss-prevention/data-loss-prevention?view=exchserver-2019&preserve-view=true)
6873

69-
* **Regularly review activity and audit log to confirm compliance**. IT can delegate access decisions to business owners through entitlement management while access reviews provide a way to periodically confirm continued access. Automated data classification with sensitivity labels helps to automate encryption of sensitive content making it easy for employee end users to comply.
74+
#### Confirm compliance with activity and audit log reviews
7075

71-
## Next steps
76+
IT teams can delegate access decisions to business owners through entitlement management, while access reviews help confirm continued access. You can use automated data classification with sensitivity labels to automate the encryption of sensitive content, easing compliance for end users.
7277

73-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
78+
## Next steps
7479

75-
1. [Determine your security posture for external access](1-secure-access-posture.md) (You are here.)
80+
See the following articles to learn more about securing external access to resources. We recommend you follow the listed order.
7681

77-
2. [Discover your current state](2-secure-access-current-state.md)
82+
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md) (You're here)
7883

79-
3. [Create a governance plan](3-secure-access-plan.md)
84+
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
8085

81-
4. [Use groups for security](4-secure-access-groups.md)
86+
3. [Create a security plan for external access](3-secure-access-plan.md)
8287

83-
5. [Transition to Azure AD B2B](5-secure-access-b2b.md)
88+
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
8489

85-
6. [Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
90+
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
8691

87-
7. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
92+
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
8893

89-
8. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
94+
7. [Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
9095

91-
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
92-
96+
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
9397

94-
98+
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive with Azure AD](9-secure-access-teams-sharepoint.md)

articles/active-directory/fundamentals/whats-deprecated-azure-ad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: What's deprecated in Azure Active Directory?
33
description: Learn about features being deprecated in Azure Active Directory
4-
author: jricketts
4+
author: janicericketts
55
manager: martinco
66
ms.service: active-directory
77
ms.subservice: fundamentals

articles/active-directory/hybrid/deprecated-azure-ad-connect.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ ms.collection: M365-identity-device-management
2020

2121
You may have received a notification email that says that your [Azure AD Connect version is deprecated](whatis-azure-ad-connect-v2.md) and no longer supported. Or, you may have read a portal recommendation about upgrading your Azure AD Connect version. What is next?
2222

23+
[!INCLUDE [Choose cloud sync](../../../includes/choose-cloud-sync.md)]
24+
2325
Using a deprecated and unsupported version of Azure AD Connect isn't recommended and not supported. Deprecated and unsupported versions of Azure AD Connect may **unexpectedly stop working**. In these instances, you may need to install the latest version of Azure AD Connect as your only remedy to restore your sync process.
2426

2527
We regularly update Azure AD Connect with [newer versions](reference-connect-version-history.md). The new versions have bug fixes, performance improvements, new functionality, and security fixes, so it's important to stay up to date.

articles/active-directory/hybrid/how-to-upgrade-previous-version.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ ms.author: billmath
1919
ms.collection: M365-identity-device-management
2020
---
2121
# Azure AD Connect: Upgrade from a previous version to the latest
22+
23+
[!INCLUDE [Choose cloud sync](../../../includes/choose-cloud-sync.md)]
24+
2225
This topic describes the different methods that you can use to upgrade your Azure Active Directory (Azure AD) Connect installation to the latest release. Microsoft recommends using the steps in the [Swing migration](#swing-migration) section when you make a substantial configuration change or upgrade from older 1.x versions.
2326

2427
>[!NOTE]

0 commit comments

Comments
 (0)