Skip to content

Commit 675e65d

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 5902137 + cf86d07 commit 675e65d

File tree

73 files changed

+365
-582
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+365
-582
lines changed

articles/active-directory/app-provisioning/inbound-provisioning-api-configure-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If you're configuring inbound user provisioning to on-premises Active Directory,
3636

3737
## Create your API-driven provisioning app
3838

39-
1. Log in to the [Microsoft Entra portal](<https://entra.microsoft.com>).
39+
1. Log in to the [Microsoft Entra admin center](<https://entra.microsoft.com>).
4040
2. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
4141
3. Click on **New application** to create a new provisioning application.
4242
[![Screenshot of Entra Admin Center.](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png)](media/inbound-provisioning-api-configure-app/provisioning-entra-admin-center.png#lightbox)

articles/active-directory/app-provisioning/inbound-provisioning-api-curl-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ ms.reviewer: cmmdesai
4040
4141
## Verify processing of the bulk request payload
4242
43-
1. Log in to [Microsoft Entra portal](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
43+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
4444
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
4545
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
4646
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-custom-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You have configured API-driven provisioning app. You're provisioning app is succ
2828

2929
In this step, we'll add the two attributes "HireDate" and "JobCode" that are not part of the standard SCIM schema to the provisioning app and use them in the provisioning data flow.
3030

31-
1. Log in to Microsoft Entra portal with application administrator role.
31+
1. Log in to Microsoft Entra admin center with application administrator role.
3232
1. Go to **Enterprise applications** and open your API-driven provisioning app.
3333
1. Open the **Provisioning** blade.
3434
1. Click on the **Edit Provisioning** button.
@@ -44,7 +44,7 @@ In this step, we'll add the two attributes "HireDate" and "JobCode" that are not
4444
1. **Save** your changes
4545

4646
> [!NOTE]
47-
> If you'd like to add only a few additional attributes to the provisioning app, use Microsoft Entra Portal to extend the schema. If you'd like to add more custom attributes (let's say 20+ attributes), then we recommend using the [`UpdateSchema` mode of the CSV2SCIM PowerShell script](inbound-provisioning-api-powershell.md#extending-provisioning-job-schema) which automates the above manual process.
47+
> If you'd like to add only a few additional attributes to the provisioning app, use Microsoft Entra admin center to extend the schema. If you'd like to add more custom attributes (let's say 20+ attributes), then we recommend using the [`UpdateSchema` mode of the CSV2SCIM PowerShell script](inbound-provisioning-api-powershell.md#extending-provisioning-job-schema) which automates the above manual process.
4848
4949
## Step 2 - Map the custom attributes
5050

articles/active-directory/app-provisioning/inbound-provisioning-api-grant-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Depending on how your API client authenticates with Azure AD, you can select bet
2727
## Configure a service principal
2828
This configuration registers an app in Azure AD that represents the external API client and grants it permission to invoke the inbound provisioning API. The service principal client id and client secret can be used in the OAuth client credentials grant flow.
2929

30-
1. Log in to Microsoft Entra portal (https://entra.microsoft.com) with global administrator or application administrator login credentials.
30+
1. Log in to Microsoft Entra admin center (https://entra.microsoft.com) with global administrator or application administrator login credentials.
3131
1. Browse to **Azure Active Directory** -> **Applications** -> **App registrations**.
3232
1. Click on the option **New registration**.
3333
1. Provide an app name, select the default options, and click on **Register**.

articles/active-directory/app-provisioning/inbound-provisioning-api-graph-explorer.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,10 +48,10 @@ This tutorial describes how you can quickly test [API-driven inbound provisionin
4848

4949
## Verify processing of bulk request payload
5050

51-
You can verify the processing either from the Microsoft Entra portal or using Graph Explorer.
51+
You can verify the processing either from the Microsoft Entra admin center or using Graph Explorer.
5252

53-
### Verify processing from Microsoft Entra portal
54-
1. Log in to [Microsoft Entra portal](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
53+
### Verify processing from Microsoft Entra admin center
54+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
5555
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
5656
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
5757
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,10 +62,10 @@ In this step, you'll configure the Postman app and invoke the API using the conf
6262
If the API invocation is successful, you see the message `202 Accepted.` Under Headers, the **Location** attribute points to the provisioning logs API endpoint.
6363

6464
## Verify processing of bulk request payload
65-
You can verify the processing either from the Microsoft Entra portal or using Postman.
65+
You can verify the processing either from the Microsoft Entra admin center or using Postman.
6666

67-
### Verify processing from Microsoft Entra portal
68-
1. Log in to [Microsoft Entra portal](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
67+
### Verify processing from Microsoft Entra admin center
68+
1. Log in to [Microsoft Entra admin center](https://entra.microsoft.com) with *global administrator* or *application administrator* login credentials.
6969
1. Browse to **Azure Active Directory -> Applications -> Enterprise applications**.
7070
1. Under all applications, use the search filter text box to find and open your API-driven provisioning application.
7171
1. Open the Provisioning blade. The landing page displays the status of the last run.

articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ To illustrate the procedure, let's use the CSV file `Samples/csv-with-2-records.
180180

181181
This section explains how to send the generated bulk request payload to your inbound provisioning API endpoint.
182182

183-
1. Log in to your Entra portal as *Application Administrator* or *Global Administrator*.
183+
1. Log in to your Microsoft Entra admin center as *Application Administrator* or *Global Administrator*.
184184
1. Copy the `ServicePrincipalId` associated with your provisioning app from **Provisioning App** > **Properties** > **Object ID**.
185185

186186
:::image type="content" border="true" source="./media/inbound-provisioning-api-powershell/object-id.png" alt-text="Screenshot of the Object ID." lightbox="./media/inbound-provisioning-api-powershell/object-id.png":::
@@ -204,7 +204,7 @@ This section explains how to send the generated bulk request payload to your inb
204204
$ThumbPrint = $ClientCertificate.ThumbPrint
205205
```
206206
The generated certificate is stored **Current User\Personal\Certificates**. You can view it using the **Control Panel** -> **Manage user certificates** option.
207-
1. To associate this certificate with a valid service principal, log in to your Entra portal as *Application Administrator*.
207+
1. To associate this certificate with a valid service principal, log in to your Microsoft Entra admin center as *Application Administrator*.
208208
1. Open [the service principal you configured](inbound-provisioning-api-grant-access.md#configure-a-service-principal) under **App Registrations**.
209209
1. Copy the **Object ID** from the **Overview** blade. Use the value to replace the string `<AppObjectId>`. Copy the **Application (client) Id**. We will use it later and it is referenced as `<AppClientId>`.
210210
1. Run the following command to upload your certificate to the registered service principal.
@@ -358,7 +358,7 @@ PS > CSV2SCIM.ps1 -Path <path-to-csv-file>
358358

359359
> [!NOTE]
360360
> The `AttributeMapping` and `ValidateAttributeMapping` command-line parameters refer to the mapping of CSV column attributes to the standard SCIM schema elements.
361-
It doesn't refer to the attribute mappings that you perform in the Entra portal provisioning app between source SCIM schema elements and target Azure AD/on-premises AD attributes.
361+
It doesn't refer to the attribute mappings that you perform in the Microsoft Entra admin center provisioning app between source SCIM schema elements and target Azure AD/on-premises AD attributes.
362362

363363
| Parameter | Description | Processing remarks |
364364
|----------|----------------|--------------------|

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To disable Authenticator Lite in the Azure portal, complete the following steps:
5858

5959
Only users who are enabled for Microsoft Authenticator here can be enabled to use Authenticator Lite for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
6060

61-
<img width="1112" alt="Entra portal Authenticator settings" src="https://user-images.githubusercontent.com/108090297/228603771-52c5933c-f95e-4f19-82db-eda2ba640b94.png">
61+
<img width="1112" alt="Microsoft Entra admin center Authenticator settings" src="https://user-images.githubusercontent.com/108090297/228603771-52c5933c-f95e-4f19-82db-eda2ba640b94.png">
6262

6363

6464
3. On the Configure tab, for **Microsoft Authenticator on companion applications**, change Status to Disabled, and click Save.

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ Based on your organizational requirements, you can customize the Azure AD smart
6666

6767
To check or modify the smart lockout values for your organization, complete the following steps:
6868

69-
1. Sign in to the [Entra portal](https://entra.microsoft.com/#home).
69+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
7070
1. Search for and select *Azure Active Directory*, then select **Security** > **Authentication methods** > **Password protection**.
7171
1. Set the **Lockout threshold**, based on how many failed sign-ins are allowed on an account before its first lockout.
7272

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ For more information on how to enable this feature, see: [Cloud Sync directory e
124124
**Service category:** Audit
125125
**Product capability:** Monitoring & Reporting
126126

127-
This feature analyzes uploaded client-side logs, also known as diagnostic logs, from a Windows 10+ device that is having an issue(s) and suggests remediation steps to resolve the issue(s). Admins can work with end user to collect client-side logs, and then upload them to this troubleshooter in the Entra Portal. For more information, see: [Troubleshooting Windows devices in Azure AD](../devices/troubleshoot-device-windows-joined.md).
127+
This feature analyzes uploaded client-side logs, also known as diagnostic logs, from a Windows 10+ device that is having an issue(s) and suggests remediation steps to resolve the issue(s). Admins can work with end user to collect client-side logs, and then upload them to this troubleshooter in the Microsoft Entra admin center. For more information, see: [Troubleshooting Windows devices in Azure AD](../devices/troubleshoot-device-windows-joined.md).
128128

129129

130130
---
@@ -188,7 +188,7 @@ The ability for users to create tenants from the Manage Tenant overview has been
188188
**Service category:** My Apps
189189
**Product capability:** End User Experiences
190190

191-
We have consolidated relevant app launcher settings in a new App launchers section in the Azure and Entra portals. The entry point can be found under Enterprise applications, where Collections used to be. You can find the Collections option by selecting App launchers. In addition, we've added a new App launchers Settings option. This option has some settings you may already be familiar with like the Microsoft 365 settings. The new Settings options also have controls for previews. As an admin, you can choose to try out new app launcher features while they are in preview. Enabling a preview feature means that the feature turns on for your organization. This enabled feature reflects in the My Apps portal, and other app launchers for all of your users. To learn more about the preview settings, see: [End-user experiences for applications](../manage-apps/end-user-experiences.md).
191+
We have consolidated relevant app launcher settings in a new App launchers section in the Azure and Microsoft Entra admin centers. The entry point can be found under Enterprise applications, where Collections used to be. You can find the Collections option by selecting App launchers. In addition, we've added a new App launchers Settings option. This option has some settings you may already be familiar with like the Microsoft 365 settings. The new Settings options also have controls for previews. As an admin, you can choose to try out new app launcher features while they are in preview. Enabling a preview feature means that the feature turns on for your organization. This enabled feature reflects in the My Apps portal, and other app launchers for all of your users. To learn more about the preview settings, see: [End-user experiences for applications](../manage-apps/end-user-experiences.md).
192192

193193

194194
---
@@ -895,7 +895,7 @@ Customers can now meet their complex audit and recertification requirements thro
895895

896896
Currently, users can self-service leave for an organization without the visibility of their IT administrators. Some organizations may want more control over this self-service process.
897897

898-
With this feature, IT administrators can now allow or restrict external identities to leave an organization by Microsoft provided self-service controls via Azure Active Directory in the Microsoft Entra portal. In order to restrict users to leave an organization, customers need to include "Global privacy contact" and "Privacy statement URL" under tenant properties.
898+
With this feature, IT administrators can now allow or restrict external identities to leave an organization by Microsoft provided self-service controls via Azure Active Directory in the Microsoft Entra admin center. In order to restrict users to leave an organization, customers need to include "Global privacy contact" and "Privacy statement URL" under tenant properties.
899899

900900
A new policy API is available for the administrators to control tenant wide policy:
901901
[externalIdentitiesPolicy resource type](/graph/api/resources/externalidentitiespolicy?view=graph-rest-beta&preserve-view=true)

0 commit comments

Comments
 (0)