Skip to content

Commit 602181a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tutorial-hybrid-portal-ps
2 parents bf6fe7c + bd577d6 commit 602181a

File tree

718 files changed

+5872
-3352
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

718 files changed

+5872
-3352
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1185,6 +1185,11 @@
11851185
"redirect_url": "/azure/role-based-access-control/change-history-report",
11861186
"redirect_document_id": true
11871187
},
1188+
{
1189+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-mfa-get-started.md",
1190+
"redirect_url": "/azure/active-directory/authentication/concept-mfa-licensing",
1191+
"redirect_document_id": true
1192+
},
11881193
{
11891194
"source_path_from_root": "/articles/active-directory/conditional-access-azure-management.md",
11901195
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8767,6 +8767,11 @@
87678767
"redirect_url": "/azure/developer/mobile-apps/azure-maps",
87688768
"redirect_document_id": false
87698769
},
8770+
{
8771+
"source_path_from_root": "/articles/azure-maps/choose-pricing-tier.md",
8772+
"redirect_url": "/azure/azure-maps/how-to-manage-pricing-tier",
8773+
"redirect_document_id": true
8774+
},
87708775
{
87718776
"source_path_from_root": "/articles/azure-maps/how-to-request-real-time-data.md",
87728777
"redirect_url": "/azure/azure-maps",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/managed-grafana/how-to-sync-teams-with-aad-groups.md",
5+
"redirect_url": "/azure/managed-grafana/how-to-sync-teams-with-azure-ad-groups",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/06/2023
4+
ms.date: 09/13/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/inbound-provisioning-api-issues.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,13 @@ This document covers commonly encountered errors and issues with inbound provisi
4040

4141
**Probable causes**
4242
1. Your API-driven provisioning app is paused.
43-
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
43+
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
44+
2. Your On-premises provisioning agent status is inactive (If you are running the [/API-driven inbound user provisioning to on-premises Active Directory](https://go.microsoft.com/fwlink/?linkid=2245182)).
45+
4446

4547
**Resolution:**
4648
1. Verify that your provisioning app is running. If it isn't running, select the menu option **Start provisioning** to process the data.
49+
2. Turn your On-premises provisioning agent status to active by restarting the On-premise agent.
4750
1. Expect 5 to 10-minute delay between processing the request and writing to the provisioning logs. If your API client is sending data to the provisioning /bulkUpload API endpoint, then introduce a time delay between the request invocation and provisioning logs query.
4851

4952
### Forbidden 403 response code

articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this step, you'll configure the Postman app and invoke the API using the conf
3131
1. From the **Workspaces** menu, select **Create Workspace** to create a new Workspace called **Microsoft Entra ID Provisioning API**.
3232
1. Download the following Postman collections and save it in your local directory.
3333
- [Entra ID Inbound Provisioning.postman_collection.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Entra%20ID%20Inbound%20Provisioning.postman_collection.json) (Request collection)
34-
- [Test-API2AAD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AAD.postman_environment.json) (Environment collection for API-driven provisioning to on-premises AD)-
34+
- [Test-API2AAD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AAD.postman_environment.json) (Environment collection for API-driven provisioning to Azure AD)-
3535
- [Test-API2AD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AD.postman_environment.json) (Environment collection for API-driven provisioning to on-premises AD)
3636
1. Use the **Import** option in Postman to import both of these files into your Workspace.
3737
:::image type="content" source="media/inbound-provisioning-api-postman/postman-import-elements.png" alt-text="Screenshot of Postman Import elements." lightbox="media/inbound-provisioning-api-postman/postman-import-elements.png":::

articles/active-directory/app-proxy/app-proxy-protect-ndes.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/19/2023
11+
ms.date: 09/13/2023
1212
ms.author: kenwith
1313
---
1414

@@ -28,10 +28,9 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
2828

2929
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3030

31-
1. Sign in to the [Azure portal](https://portal.azure.com) as an application administrator of the directory that uses Application Proxy. For example, if the tenant domain is contoso.com, the admin should be [email protected] or any other admin alias on that domain.
31+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
3232
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
33-
1. In left navigation panel, select **Azure Active Directory**.
34-
1. Under **Manage**, select **Application proxy**.
33+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
3534
1. Select **Download connector service**.
3635

3736
![Download connector service to see the Terms of Service](./media/app-proxy-protect-ndes/application-proxy-download-connector-service.png)

0 commit comments

Comments
 (0)