Skip to content

Commit 6649afc

Browse files
committed
Merge branch 'main' into release-ga-ddos-ip
2 parents b4fd204 + 9d02b46 commit 6649afc

File tree

250 files changed

+3259
-1837
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

250 files changed

+3259
-1837
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -996,7 +996,7 @@
996996
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",
997997
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
998998
"articles/iot-edge/.openpublishing.redirection.iot-edge.json",
999-
"articles/iot-fundamentals/.openpublishing.redirection.iot-fundamentals.json",
999+
"articles/iot/.openpublishing.redirection.iot.json",
10001000
"articles/iot-hub/.openpublishing.redirection.iot-hub.json",
10011001
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
10021002
"articles/logic-apps/.openpublishing.redirection.logic-apps.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,11 @@
4545
"redirect_url": "/azure/azure-monitor/app/app-insights-overview",
4646
"redirect_document_id": false
4747
},
48+
{
49+
"source_path_from_root": "/articles/azure-monitor/app/console.md",
50+
"redirect_url": "/previous-versions/azure/azure-monitor/app/console",
51+
"redirect_document_id": false
52+
},
4853
{
4954
"source_path_from_root": "/articles/azure-monitor/app/resource-manager-web-app.md",
5055
"redirect_url": "/previous-versions/azure/azure-monitor/app/resource-manager-web-app",

.openpublishing.redirection.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12510,12 +12510,12 @@
1251012510
},
1251112511
{
1251212512
"source_path_from_root": "/articles/security/fundamentals/iot-overview.md",
12513-
"redirect_url": "/azure/iot-fundamentals/iot-security-architecture",
12513+
"redirect_url": "/azure/iot/iot-security-architecture",
1251412514
"redirect_document_id": false
1251512515
},
1251612516
{
1251712517
"source_path_from_root": "/articles/security/fundamentals/iot-best-practices.md",
12518-
"redirect_url": "/azure/iot-fundamentals/iot-security-best-practices",
12518+
"redirect_url": "/azure/iot/iot-security-best-practices",
1251912519
"redirect_document_id": false
1252012520
},
1252112521
{

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2525
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2626

2727
## Deploying Azure AD provisioning agent
28-
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a seperate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or seperate hosts, again as long as each SCIM endpoint is reachable by the agent.
28+
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a separate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or separate hosts, again as long as each SCIM endpoint is reachable by the agent.
2929

3030
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM application endpoint is hosted on.
3131
2. Run the provisioning agent installer, agree to the terms of service, and select **Install**.

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,7 @@ There are currently a few known limitations to on-demand provisioning. Post your
173173
* Restoring a previously soft-deleted user in the target tenant with on-demand provisioning isn't supported. If you try to soft delete a user with on-demand provisioning and then restore the user, it can result in duplicate users.
174174
* On-demand provisioning of roles isn't supported.
175175
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users won't appear when you search for a user.
176+
* On-demand provisioning does not support nested groups that are not directly assigned to the application.
176177

177178
## Next steps
178179

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 03/23/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: jsimmons
14+
ms.reviewer: mimanans
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -95,6 +95,7 @@ The following core requirements apply:
9595

9696
> [!NOTE]
9797
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
98+
>In addition, other endpoints are required for Azure portal authentication. For more information, see [Azure portal URLs for proxy bypass](/azure/azure-portal/azure-portal-safelist-urls?tabs=public-cloud#azure-portal-urls-for-proxy-bypass).
9899
99100
### Azure AD Password Protection DC agent
100101

@@ -248,6 +249,8 @@ To install the Azure AD Password Protection proxy service, complete the followin
248249

249250
Registration of the Azure AD Password Protection proxy service is necessary only once in the lifetime of the service. After that, the Azure AD Password Protection proxy service will automatically perform any other necessary maintenance.
250251

252+
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionDCAgentHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
253+
251254
1. Now register the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet.
252255

253256
> [!NOTE]
@@ -301,6 +304,8 @@ To install the Azure AD Password Protection proxy service, complete the followin
301304
302305
For `Register-AzureADPasswordProtectionForest` to succeed, at least one DC running Windows Server 2012 or later must be available in the Azure AD Password Protection proxy server's domain. The Azure AD Password Protection DC agent software doesn't have to be installed on any domain controllers prior to this step.
303306

307+
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionDCAgentHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
308+
304309
### Configure the proxy service to communicate through an HTTP proxy
305310

306311
If your environment requires the use of a specific HTTP proxy to communicate with Azure, use the following steps to configure the Azure AD Password Protection service.
Loading
-119 KB
Loading

articles/active-directory/develop/troubleshoot-required-resource-access-limits.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer: phsignor, jawoods
1414

1515
# Troubleshooting the configured permissions limits
1616

17-
The `RequiredResourceAccess` collection (RRA) on an application object contains all the configured API permissions that an app requires for its default consent request. This collection has various limits depending on which types of identities the app supports, For more information on the limits for supported account types, see [Validation differences by supported account types](supported-accounts-validation.md).
17+
The `RequiredResourceAccess` collection (RRA) on an application object contains all the configured API permissions that an app requires for its default consent request. This collection has various limits depending on which types of identities the app supports. For more information on the limits for supported account types, see [Validation differences by supported account types](supported-accounts-validation.md).
1818

1919
The limits on maximum permissions were updated in May 2022, so some apps may have more permissions in their RRA than are now allowed. In addition, apps that change their supported account types after configuring permissions may exceed the limits of the new setting. When apps exceed the configured permissions limit, no new permissions may be added until the number of permissions in the `RequiredResourceAccess` collection is brought back under the limits.
2020

@@ -35,7 +35,6 @@ If you still need the application or are unsure, the following steps will help y
3535
1. **Remove duplicate permissions.** In some cases, the same permission is listed multiple times. Review the required permissions and remove permissions that are listed two or more times. See the related PowerShell script on the [additional resources](#additional-resources) section of this article.
3636
2. **Remove unused permissions.** Review the permissions required by the application and compare them to what the application or service does. Remove permissions that are configured in the app registration, but which the application or service doesn’t require. For more information on how to review permissions, see [Review application permissions](../manage-apps/manage-application-permissions.md)
3737
3. **Remove redundant permissions.** In many APIs, including Microsoft Graph, some permissions aren't necessary when other more privileged permissions are included. For example, the Microsoft Graph permission User.Read.All (read all users) isn't needed when an application also has User.ReadWrite.All (read, create and update all users). To learn more about Microsoft Graph permissions, see [Microsoft Graph permissions reference](/graph/permissions-reference).
38-
4. **Use multiple app registrations.** If a single app or service requires more than 400 permissions in the required permissions list, the app will need to be configured to use two (or more) different app registrations, each one with 400 or fewer permissions configured on the app registration.
3938

4039
## Frequently asked questions (FAQ)
4140

@@ -147,4 +146,4 @@ process {
147146

148147
- Learn about API permissions and the Microsoft identity platform: [Overview of permissions and consent in the Microsoft identity platform](permissions-consent-overview.md)
149148
- Understand the permissions available for Microsoft Graph: [Microsoft Graph permissions reference](/graph/permissions-reference)
150-
- Review the limitations to application configurations: [Validation differences by supported account types](supported-accounts-validation.md)
149+
- Review the limitations to application configurations: [Validation differences by supported account types](supported-accounts-validation.md)

articles/active-directory/manage-apps/add-application-portal-assign-users.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,50 +8,51 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: quickstart
1010
ms.workload: identity
11-
ms.date: 03/24/2022
11+
ms.date: 03/23/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
14-
ms.custom: mode-other
14+
ms.custom: mode-other, enterprise-apps
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to assign a user to an enterprise application.
1616
---
1717

1818
# Quickstart: Create and assign a user account
1919

2020
In this quickstart, you use the Azure portal to create a user account in your Azure Active Directory (Azure AD) tenant. After you create the account, you can assign it to the enterprise application that you added to your tenant.
2121

22-
It is recommended that you use a non-production environment to test the steps in this quickstart.
22+
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
2323

2424
## Prerequisites
2525

2626
To create a user account and assign it to an enterprise application, you need:
2727

2828
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
29+
- One of the following roles: Global Administrator, or owner of the service principal.
3030
- Completion of the steps in [Quickstart: Add an enterprise application](add-application-portal.md).
3131

3232
## Create a user account
3333

3434
To create a user account in your Azure AD tenant:
3535

3636
1. Go to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
37-
1. Browse to **Azure Active Directory** > **Users**.
37+
1. Browse to **Azure Active Directory** and select **Users**.
3838
1. Select **New user** at the top of the pane.
3939

4040
:::image type="content" source="media/add-application-portal-assign-users/new-user.png" alt-text="Add a new user account to your Azure AD tenant.":::
4141

4242
1. In the **User name** field, enter the username of the user account. For example, `[email protected]`. Be sure to change `contoso.com` to the name of your tenant domain.
4343
1. In the **Name** field, enter the name of the user of the account. For example, `contosouser1`.
44-
1. Leave **Auto-generate password** selected, and then select **Show password**. Write down the value that's displayed in the Password box.
44+
1. Enter the details required for the user under the **Groups and roles**, **Settings**, and **Job info** sections.
4545
1. Select **Create**.
4646

4747
## Assign a user account to an enterprise application
4848

4949
To assign a user account to an enterprise application:
5050

51-
1. In the [Azure portal](https://portal.azure.com), browse to **Azure Active Directory** > **Enterprise applications**, and then search for and select the application to which you want to assign the user account. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
51+
1. In the [Azure portal](https://portal.azure.com), browse to **Azure Active Directory** and select **Enterprise applications**.
52+
1. Search for and select the application to which you want to assign the user account. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
5253
1. In the left pane, select **Users and groups**, and then select **Add user/group**.
5354

54-
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to zn application in your Azure AD tenant.":::
55+
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to an application in your Azure AD tenant.":::
5556

5657
1. On the **Add Assignment** pane, select **None Selected** under **Users and groups**.
5758
1. Search for and select the user that you want to assign to the application. For example, `[email protected]`.
@@ -60,7 +61,7 @@ To assign a user account to an enterprise application:
6061

6162
## Clean up resources
6263

63-
If you are planning to complete the next quickstart, keep the application that you created. Otherwise, you can consider deleting it to clean up your tenant.
64+
If you're planning to complete the next quickstart, keep the application that you created. Otherwise, you can consider deleting it to clean up your tenant.
6465

6566
## Next steps
6667

0 commit comments

Comments
 (0)