Skip to content

Commit 636c6be

Browse files
authored
Merge pull request #249565 from MicrosoftDocs/repo_sync_working_branch
Resolve syncing conflicts from repo_sync_working_branch to main
2 parents cdc31dd + 0cede65 commit 636c6be

File tree

17 files changed

+148
-20
lines changed

17 files changed

+148
-20
lines changed

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ This setting has an effect on access attempts made from the following mobile app
176176
| Outlook mobile app | Exchange Online | Android, iOS |
177177
| Power BI app | Power BI service | Windows 10, Windows 8.1, Windows 7, Android, and iOS |
178178
| Skype for Business | Exchange Online| Android, iOS |
179-
| Visual Studio Team Services app | Visual Studio Team Services | Windows 10, Windows 8.1, Windows 7, iOS, and Android |
179+
| Azure DevOps Services (formerly Visual Studio Team Services, or VSTS) app | Azure DevOps Services (formerly Visual Studio Team Services, or VSTS) | Windows 10, Windows 8.1, Windows 7, iOS, and Android |
180180

181181
### Exchange ActiveSync clients
182182

articles/active-directory/develop/msal-android-single-sign-on.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,6 +179,9 @@ If the application uses a `WebView` strategy without integrating Microsoft Authe
179179

180180
If the application uses MSAL with a broker like Microsoft Authenticator or Intune Company Portal, then users can have SSO experience across applications if they have an active sign-in with one of the apps.
181181

182+
> [!NOTE]
183+
> MSAL with broker utilizes WebViews instead of Custom Tabs. As a result, the Single Sign-On (SSO) state is not extended to other apps that use Custom Tabs.
184+
182185
### WebView
183186

184187
To use the in-app WebView, put the following line in the app configuration JSON that is passed to MSAL:

articles/active-directory/devices/concept-primary-refresh-token.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,9 @@ The following diagrams illustrate the underlying details in issuing, renewing, a
158158
> [!NOTE]
159159
> In Azure AD joined devices, Azure AD PRT issuance (steps A-F) happens synchronously before the user can logon to Windows. In hybrid Azure AD joined devices, on-premises Active Directory is the primary authority. So, the user is able to login hybrid Azure AD joined Windows after they can acquire a TGT to login, while the PRT issuance happens asynchronously. This scenario does not apply to Azure AD registered devices as logon does not use Azure AD credentials.
160160
161+
> [!NOTE]
162+
> In a Hybrid Azure AD joined Windows environment, the issuance of the PRT occurs asynchronously. The issuance of the PRT may fail due to issues with the federation provider. This failure can result in sign on issues when users try to access cloud resources. It is important to troubleshoot this scenario with the federation provider.
163+
161164
| Step | Description |
162165
| :---: | --- |
163166
| A | User enters their password in the sign in UI. LogonUI passes the credentials in an auth buffer to LSA, which in turns passes it internally to CloudAP. CloudAP forwards this request to the CloudAP plugin. |

articles/active-directory/fundamentals/security-defaults.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -147,6 +147,7 @@ It's important to verify the identity of users who want to access Azure Resource
147147
After you enable security defaults in your tenant, any user accessing the following services must complete multifactor authentication:
148148

149149
- Azure portal
150+
- Microsoft Entra admin center
150151
- Azure PowerShell
151152
- Azure CLI
152153

articles/active-directory/hybrid/connect/reference-connect-adsynctools.md

Lines changed: 120 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -333,6 +333,7 @@ Accept wildcard characters: False
333333
```
334334
#### CommonParameters
335335
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](/powershell/module/microsoft.powershell.core/about/about_commonparameters).
336+
336337
## Export-ADSyncToolsAadDisconnectors
337338
### SYNOPSIS
338339
Export Azure AD Disconnector objects
@@ -373,9 +374,57 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
373374
Use ObjectType argument in case you want to export Disconnectors for a given object type only
374375
### OUTPUTS
375376
Exports a CSV file with Disconnector objects containing:
376-
377377
UserPrincipalName, Mail, SourceAnchor, DistinguishedName, CsObjectId, ObjectType, ConnectorId and CloudAnchor
378378
379+
## Export-ADSyncToolsAadPublicFolders
380+
### SYNOPSIS
381+
Exports all synchronized Mail-Enabled Public Folder objects from AzureAD to a CSV file
382+
### SYNTAX
383+
```
384+
Export-ADSyncToolsAadPublicFolders [-Credential] <PSCredential> [-Path] <Object> [<CommonParameters>]
385+
```
386+
### DESCRIPTION
387+
This function exports to a CSV file all the synchronized Mail-Enabled Public Folders (MEPF) present in Azure AD.
388+
It can be used in conjunction with Remove-ADSyncToolsAadPublicFolders to identify and remove orphaned Mail-Enabled Public Folders in Azure AD.
389+
This function requires the credentials of a Global Administrator in Azure AD and authentication with MFA is not supported.
390+
NOTE: If DirSync has been disabled on the tenant, you will need to temporarily re-enabled DirSync in order to remove orphaned Mail Enabled Public Folders from Azure AD.
391+
### EXAMPLES
392+
#### EXAMPLE 1
393+
```
394+
Export-ADSyncToolsAadPublicFolders -Credential $(Get-Credential) -Path <file_name>
395+
```
396+
### PARAMETERS
397+
#### -Credential
398+
Azure AD Global Admin Credential
399+
```yaml
400+
Type: PSCredential
401+
Parameter Sets: (All)
402+
Aliases:
403+
Required: true
404+
Position: 1
405+
Default value: None
406+
Accept pipeline input: True (ByPropertyName)
407+
Accept wildcard characters: False
408+
```
409+
#### -Path
410+
Path for output file
411+
```yaml
412+
Type: String
413+
Parameter Sets: (All)
414+
Aliases:
415+
Required: true
416+
Position: 2
417+
Default value: None
418+
Accept pipeline input: false (ByPropertyName)
419+
Accept wildcard characters: false
420+
```
421+
#### CommonParameters
422+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](/powershell/module/microsoft.powershell.core/about/about_commonparameters).
423+
### INPUTS
424+
425+
### OUTPUTS
426+
This cmdlet creates the <filename> containing all synced Mail-Enabled PublicFolder objects in CSV format.
427+
379428
## Export-ADSyncToolsHybridAadJoinReport
380429
### SYNOPSIS
381430
Generates a report of certificates stored in Active Directory Computer objects, specifically,
@@ -1150,6 +1199,76 @@ InputCsvFilename must point to a CSV file with at least 2 columns: SourceAnchor,
11501199
### OUTPUTS
11511200
Shows results from ExportDeletions operation
11521201
DISCLAIMER: Other than User objects that have a Recycle Bin, any other object types DELETED with this function cannot be RECOVERED!
1202+
1203+
## Remove-ADSyncToolsAadPublicFolders
1204+
### SYNOPSIS
1205+
Removes synchronized Mail-Enabled Public Folders (MEPF) present from AzureAD.
1206+
You can specify one SourceAnchor/ImmutableID for the target MEPF object to delete, or provide a CSV list with a batch of objects to delete when used in conjunction with Export-ADSyncToolsAadPublicFolders.
1207+
This function requires the credentials of a Global Administrator in Azure AD and authentication with MFA is not supported.
1208+
NOTE: If DirSync has been disabled on the tenant, you'll need to temporary re-enabled DirSync in order to remove orphaned Mail Enabled Public Folders from Azure AD.
1209+
### SYNTAX
1210+
```
1211+
Export-ADSyncToolsAadPublicFolders [-Credential] <PSCredential> [-Path] <Object> [<CommonParameters>]
1212+
```
1213+
### DESCRIPTION
1214+
This function exports to a CSV file all the synchronized Mail-Enabled Public Folders (MEPF) present in Azure AD.
1215+
It can be used in conjunction with Remove-ADSyncToolsAadPublicFolders to identify and remove orphaned Mail-Enabled Public Folders in Azure AD.
1216+
This function requires the credentials of a Global Administrator in Azure AD and authentication with MFA is not supported.
1217+
NOTE: If DirSync has been disabled on the tenant, you will need to temporarily re-enabled DirSync in order to remove orphaned Mail Enabled Public Folders from Azure AD.
1218+
### EXAMPLES
1219+
#### EXAMPLE 1
1220+
```
1221+
Remove-ADSyncToolsAadPublicFolders [-Credential] <PSCredential> [-InputCsvFilename] <Object> [-WhatIf] [-Confirm] [<CommonParameters>]
1222+
```
1223+
#### EXAMPLE 2
1224+
```
1225+
Remove-ADSyncToolsAadPublicFolders [-Credential] <PSCredential> [-SourceAnchor] <Object> [-WhatIf] [-Confirm] [<CommonParameters>]
1226+
```
1227+
### PARAMETERS
1228+
#### -Credential
1229+
Azure AD Global Admin Credential
1230+
```yaml
1231+
Type: PSCredential
1232+
Parameter Sets: (All)
1233+
Aliases:
1234+
Required: true
1235+
Position: 1
1236+
Default value: None
1237+
Accept pipeline input: True (ByPropertyName)
1238+
Accept wildcard characters: False
1239+
```
1240+
#### -InputCsvFilename
1241+
Path for input CSV file
1242+
```yaml
1243+
Type: String
1244+
Parameter Sets: InputCsv
1245+
Aliases:
1246+
Required: true
1247+
Position: 2
1248+
Default value: None
1249+
Accept pipeline input: true (ByPropertyName)
1250+
Accept wildcard characters: false
1251+
```
1252+
#### -SourceAnchor
1253+
Target SourceAnchor/ImmutableID
1254+
```yaml
1255+
Type: String
1256+
Parameter Sets: SourceAnchor
1257+
Aliases:
1258+
Required: true
1259+
Position: 2
1260+
Default value: None
1261+
Accept pipeline input: true (ByPropertyName)
1262+
Accept wildcard characters: false
1263+
```
1264+
#### CommonParameters
1265+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](/powershell/module/microsoft.powershell.core/about/about_commonparameters).
1266+
### INPUTS
1267+
The CSV input file can be generated using Export-ADSyncToolsAadPublicFolders.
1268+
Path parameters must point to a CSV file with at least 2 columns: SourceAnchor, SyncObjectType.
1269+
### OUTPUTS
1270+
Shows results from ExportDeletions operation.
1271+
11531272
## Remove-ADSyncToolsExpiredCertificates
11541273
### SYNOPSIS
11551274
Script to Remove Expired Certificates from UserCertificate Attribute

articles/active-directory/managed-identities-azure-resources/tutorial-windows-vm-access-sql.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,8 @@ SQL DB requires unique Azure AD display names. With this, the Azure AD accounts
9090
9191
> [!NOTE]
9292
> `VMName` in the following command is the name of the VM that you enabled system assigned identity on in the prerequisites section.
93+
>
94+
> If you encounter the error "Principal `VMName` has a duplicate display name", append the CREATE USER statement with WITH OBJECT_ID='xxx'.
9395
9496
```sql
9597
ALTER ROLE db_datareader ADD MEMBER [VMName]

articles/app-service/scripts/cli-continuous-deployment-vsts.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,11 +35,11 @@ This sample script creates an app in App Service with its related resources, and
3535
Create the following variables containing your GitHub information.
3636

3737
```azurecli
38-
gitrepo=<Replace with your Visual Studio Team Services repo URL>
39-
token=<Replace with a Visual Studio Team Services personal access token>
38+
gitrepo=<Replace with your Azure DevOps Services (formerly Visual Studio Team Services, or VSTS) repo URL>
39+
token=<Replace with a Azure DevOps Services (formerly Visual Studio Team Services, or VSTS) personal access token>
4040
```
4141

42-
Configure continuous deployment from Visual Studio Team Services. The `--git-token` parameter is required only once per Azure account (Azure remembers token).
42+
Configure continuous deployment from Azure DevOps Services (formerly Visual Studio Team Services, or VSTS). The `--git-token` parameter is required only once per Azure account (Azure remembers token).
4343

4444
```azurecli
4545
az webapp deployment source config --name $webapp --resource-group $resourceGroup \

articles/azure-monitor/logs/daily-cap.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Until September 18, 2023, the following is true. If a workspace enabled the [Mic
8686
To set or change the daily cap for a Log Analytics workspace in the Azure portal:
8787

8888
1. From the **Log Analytics workspaces** menu, select your workspace, and then **Usage and estimated costs**.
89-
2. Select **Data Cap** at the top of the page.
89+
2. Select **Daily Cap** at the top of the page.
9090
3. Select **ON** and then set the data volume limit in GB/day.
9191

9292
:::image type="content" source="media/manage-cost-storage/set-daily-volume-cap-01.png" lightbox="media/manage-cost-storage/set-daily-volume-cap-01.png" alt-text="Log Analytics configure data limit":::

articles/batch/batch-automatic-scaling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ $TargetDedicatedNodes=min(maxNumberofVMs, pendingTaskSamples);
5959
$NodeDeallocationOption = taskcompletion;
6060
```
6161
> [!IMPORTANT]
62-
> Currently, Batch Service has limitaion with the resolution of the pending tasks. When a task is added to the job, it's also added into a internal queue used by Batch service for scheduling. If the task is deleted before it can be scheduled, the task might persist within the queue, causing it to still be counted in `$PendingTasks`. This deleted task will eventually be cleared from the queue when Batch gets chance to pull tasks from the queue to schedule with idle nodes in the Batch pool.
62+
> Currently, Batch Service has limitations with the resolution of the pending tasks. When a task is added to the job, it's also added into a internal queue used by Batch service for scheduling. If the task is deleted before it can be scheduled, the task might persist within the queue, causing it to still be counted in `$PendingTasks`. This deleted task will eventually be cleared from the queue when Batch gets chance to pull tasks from the queue to schedule with idle nodes in the Batch pool.
6363
6464
#### Preempted nodes
6565

articles/communication-services/concepts/numbers/phone-number-management-for-united-kingdom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Use the below tables to find all the relevant information on number availability
2121

2222
| Number Type | Send SMS | Receive SMS | Make Calls | Receive Calls |
2323
| :---------- | :------------------- | :------------------- | :------------------- | :--------------------- |
24-
| Toll-Free |General Availability | General Availability | General Availability | General Availability\* |
24+
| Toll-Free | - | - | General Availability | General Availability\* |
2525
| Local | - | - | General Availability | General Availability\* |
2626
|Alphanumeric Sender ID\**|Public Preview|-|-|-|
2727

0 commit comments

Comments
 (0)