Skip to content

Commit 67d545e

Browse files
authored
Merge pull request #182796 from MicrosoftDocs/master
12/14 AM Publish
2 parents dd3105c + 185dcfa commit 67d545e

File tree

51 files changed

+637
-359
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+637
-359
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,11 @@
2020
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",
2121
"redirect_document_id": false
2222
},
23+
{
24+
"source_path_from_root": "/articles/security-center/deploy-vulnerability-assessment-byol-vm.md",
25+
"redirect_url": "/azure/defender-for-cloud/deploy-vulnerability-assessment-byol-vm",
26+
"redirect_document_id": true
27+
},
2328
{
2429
"source_path_from_root": "/articles/defender-for-cloud/azure-defender.md",
2530
"redirect_url": "/azure/defender-for-cloud/defender-for-cloud-introduction",

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,13 +29,13 @@ When you've more than 1000 service principals, you may find extensions missing i
2929
### Create an extension attribute on a cloud only user using Microsoft Graph
3030
You can extend the schema of Azure AD users using [Microsoft Graph](/graph/overview).
3131

32-
First, list the apps in your tenant to get the ID of the app you're working on. To learn more, see [List extensionProperties](/graph/api/application-list-extensionproperty?view=graph-rest-1.0&tabs=http&preserve-view=true).
32+
First, list the apps in your tenant to get the ID of the app you're working on. To learn more, see [List extensionProperties](/graph/api/application-list-extensionproperty).
3333

3434
```json
3535
GET https://graph.microsoft.com/v1.0/applications
3636
```
3737

38-
Next, create the extension attribute. Replace the **ID** property below with the **ID** retrieved in the previous step. You'll need to use the **"ID"** attribute and not the "appId". To learn more, see [Create extensionProperty]/graph/api/application-post-extensionproperty.md?view=graph-rest-1.0&tabs=http&preserve-view=true).
38+
Next, create the extension attribute. Replace the **ID** property below with the **ID** retrieved in the previous step. You'll need to use the **"ID"** attribute and not the "appId". To learn more, see [Create extensionProperty]/graph/api/application-post-extensionproperty).
3939

4040
```json
4141
POST https://graph.microsoft.com/v1.0/applications/{id}/extensionProperties
@@ -50,7 +50,7 @@ Content-type: application/json
5050
}
5151
```
5252

53-
The previous request created an extension attribute with the format `extension_appID_extensionName`. You can now update a user with this extension attribute. To learn more, see [Update user](/graph/api/user-update?view=graph-rest-1.0&tabs=http&preserve-view=true).
53+
The previous request created an extension attribute with the format `extension_appID_extensionName`. You can now update a user with this extension attribute. To learn more, see [Update user](/graph/api/user-update).
5454
```json
5555
PATCH https://graph.microsoft.com/v1.0/users/{id}
5656
Content-type: application/json
@@ -59,7 +59,7 @@ Content-type: application/json
5959
"extension_inputAppId_extensionName": "extensionValue"
6060
}
6161
```
62-
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get?view=graph-rest-1.0&tabs=http#example-3-users-request-using-select&preserve-view=true).
62+
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get).
6363

6464
```json
6565
GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_inputAppId_extensionName

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ Passwords are written back in all the following situations:
140140
* Any administrator self-service force change password operation, for example, password expiration.
141141
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com).
142142
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com).
143-
* Any administrator-initiated end-user password reset from the [Microsoft Graph API](/graph/api/passwordauthenticationmethod-resetpassword?tabs=http).
143+
* Any administrator-initiated end-user password reset from the [Microsoft Graph API](/graph/api/passwordauthenticationmethod-resetpassword).
144144

145145
## Unsupported writeback operations
146146

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -160,8 +160,8 @@ If you receive an error when you try to set a phone number for a user account in
160160
[concepts-passwordless]: concept-authentication-passwordless.md
161161
[tutorial-azure-mfa]: tutorial-enable-azure-mfa.md
162162
[tutorial-sspr]: tutorial-enable-sspr.md
163-
[rest-enable]: /graph/api/phoneauthenticationmethod-enablesmssignin?tabs=http
164-
[rest-disable]: /graph/api/phoneauthenticationmethod-disablesmssignin?tabs=http
163+
[rest-enable]: /graph/api/phoneauthenticationmethod-enablesmssignin
164+
[rest-disable]: /graph/api/phoneauthenticationmethod-disablesmssignin
165165

166166
<!-- EXTERNAL LINKS -->
167167
[azure-portal]: https://portal.azure.com

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Email as an alternate login ID applies to [Azure AD business-to-business (B2B) c
129129
## Enable user sign-in with an email address
130130

131131
> [!NOTE]
132-
> This configuration option uses HRD policy. For more information, see [homeRealmDiscoveryPolicy resource type](/graph/api/resources/homeRealmDiscoveryPolicy?view=graph-rest-1.0&preserve-view=true).
132+
> This configuration option uses HRD policy. For more information, see [homeRealmDiscoveryPolicy resource type](/graph/api/resources/homeRealmDiscoveryPolicy).
133133
134134
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
135135

@@ -241,7 +241,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
241241
## Enable staged rollout to test user sign-in with an email address
242242
243243
> [!NOTE]
244-
>This configuration option uses staged rollout policy. For more information, see [featureRolloutPolicy resource type](/graph/api/resources/featurerolloutpolicy?preserve-view=true&view=graph-rest-1.0).
244+
>This configuration option uses staged rollout policy. For more information, see [featureRolloutPolicy resource type](/graph/api/resources/featurerolloutpolicy).
245245
246246
Staged rollout policy allows tenant administrators to enable features for specific Azure AD groups. It is recommended that tenant administrators use staged rollout to test user sign-in with an email address. When administrators are ready to deploy this feature to their entire tenant, they should use [HRD policy](#enable-user-sign-in-with-an-email-address).
247247

articles/active-directory/develop/app-objects-and-service-principals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Learn how to create a service principal:
100100
- [Using the Azure portal](howto-create-service-principal-portal.md)
101101
- [Using Azure PowerShell](howto-authenticate-service-principal-powershell.md)
102102
- [Using Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli)
103-
- [Using Microsoft Graph](/graph/api/serviceprincipal-post-serviceprincipals?tabs=http) and then use [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) to query both the application and service principal objects.
103+
- [Using Microsoft Graph](/graph/api/serviceprincipal-post-serviceprincipals) and then use [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) to query both the application and service principal objects.
104104

105105
<!--Reference style links -->
106106
[MS-Graph-App-Entity]: /graph/api/resources/application

articles/active-directory/develop/reference-app-manifest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.reviewer: sureshja
1919

2020
The application manifest contains a definition of all the attributes of an application object in the Microsoft identity platform. It also serves as a mechanism for updating the application object. For more info on the Application entity and its schema, see the [Graph API Application entity documentation](/graph/api/resources/application).
2121

22-
You can configure an app's attributes through the Azure portal or programmatically using [REST API](/graph/api/resources/application) or [PowerShell](/powershell/module/azuread#applications). However, there are some scenarios where you'll need to edit the app manifest to configure an app's attribute. These scenarios include:
22+
You can configure an app's attributes through the Azure portal or programmatically using [Microsoft Graph API](/graph/api/resources/application) or [Microsoft Graph PowerShell SDK](/powershell/module/microsoft.graph.applications/?view=graph-powershell-1.0&preserve-view=true). However, there are some scenarios where you'll need to edit the app manifest to configure an app's attribute. These scenarios include:
2323

2424
* If you registered the app as Azure AD multi-tenant and personal Microsoft accounts, you can't change the supported Microsoft accounts in the UI. Instead, you must use the application manifest editor to change the supported account type.
2525
* To define permissions and roles that your app supports, you must modify the application manifest.

articles/active-directory/devices/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# What is a device identity?
1919

20-
A [device identity](/graph/api/resources/device?view=graph-rest-1.0&preserve-view=true) is an object in Azure Active Directory (Azure AD). This device object is similar to users, groups, or applications. A device identity gives administrators information they can use when making access or configuration decisions.
20+
A [device identity](/graph/api/resources/device) is an object in Azure Active Directory (Azure AD). This device object is similar to users, groups, or applications. A device identity gives administrators information they can use when making access or configuration decisions.
2121

2222
![Devices displayed in Azure AD Devices blade](./media/overview/azure-active-directory-devices-all-devices.png)
2323

articles/active-directory/external-identities/redemption-experience.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,12 +61,12 @@ When you add a guest user to your directory by [using the Azure portal](./b2b-qu
6161
4. The guest is guided through the [consent experience](#consent-experience-for-the-guest) described below.
6262

6363
## Redemption limitation with conflicting Contact object
64-
Sometimes the invited external guest user's email may conflict with an existing [Contact object](/graph/api/resources/contact?view=graph-rest-1.0&preserve-view=true), resulting in the guest user being created without a proxyAddress. This is a known limitation that prevents guest users from:
64+
Sometimes the invited external guest user's email may conflict with an existing [Contact object](/graph/api/resources/contact), resulting in the guest user being created without a proxyAddress. This is a known limitation that prevents guest users from:
6565
- Redeeming an invitation through a direct link using [SAML/WS-Fed IdP](./direct-federation.md), [Microsoft Accounts](./microsoft-account.md), [Google Federation](./google-federation.md), or [Email One-Time Passcode](./one-time-passcode.md) accounts.
6666
- Redeeming an invitation through an invitation email redemption link using [SAML/WS-Fed IdP](./direct-federation.md) and [Email One-Time Passcode](./one-time-passcode.md) accounts.
6767
- Signing back into an application after redemption using [SAML/WS-Fed IdP](./direct-federation.md) and [Google Federation](./google-federation.md) accounts.
6868

69-
To unblock users who can't redeem an invitation due to a conflicting [Contact object](/graph/api/resources/contact?view=graph-rest-1.0&preserve-view=true), follow these steps:
69+
To unblock users who can't redeem an invitation due to a conflicting [Contact object](/graph/api/resources/contact), follow these steps:
7070
1. Delete the conflicting Contact object.
7171
2. Delete the guest user in the Azure portal (the user's "Invitation accepted" property should be in a pending state).
7272
3. Re-invite the guest user.

articles/active-directory/external-identities/troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,11 +66,11 @@ When we check whether a user is able to be invited to your tenant, one of the th
6666

6767
## I can't invite an email address because of a conflict in proxyAddresses
6868

69-
This happens when another object in the directory has the same invited email address as one of its proxyAddresses. To fix this conflict, remove the email from the [user](/graph/api/resources/user?view=graph-rest-1.0&preserve-view=true) object, and also delete the associated [contact](/graph/api/resources/contact?view=graph-rest-1.0&preserve-view=true) object before trying to invite this email again.
69+
This happens when another object in the directory has the same invited email address as one of its proxyAddresses. To fix this conflict, remove the email from the [user](/graph/api/resources/user) object, and also delete the associated [contact](/graph/api/resources/contact) object before trying to invite this email again.
7070

7171
## The guest user object doesn't have a proxyAddress
7272

73-
When inviting an external guest user, sometimes this will conflict with an existing [Contact object](/graph/api/resources/contact?view=graph-rest-1.0&preserve-view=true). When this occurs, the guest user is created without a proxyAddress. This means that the user will not be able to redeem this account using [just-in-time redemption](redemption-experience.md#redemption-through-a-direct-link) or [email one-time passcode authentication](one-time-passcode.md#user-experience-for-one-time-passcode-guest-users).
73+
When inviting an external guest user, sometimes this will conflict with an existing [Contact object](/graph/api/resources/contact). When this occurs, the guest user is created without a proxyAddress. This means that the user will not be able to redeem this account using [just-in-time redemption](redemption-experience.md#redemption-through-a-direct-link) or [email one-time passcode authentication](one-time-passcode.md#user-experience-for-one-time-passcode-guest-users).
7474

7575
## How does ‘\#’, which is not normally a valid character, sync with Azure AD?
7676

0 commit comments

Comments
 (0)