You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Autotask Endpoint Backup Client support team](https://backup.autotask.net/help/Content/0_HOME/_AutotaskCustomerSupport.htm) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105
+
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Autotask Endpoint Backup Client support team](https://backup.autotask.net/help/Content/0_HOME/Support_for_End_Clients.htm) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
106
106
107
107
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
108
108
@@ -120,7 +120,7 @@ To configure Azure AD single sign-on with Autotask Endpoint Backup, perform the
120
120
121
121
### Configure Autotask Endpoint Backup Single Sign-On
122
122
123
-
To configure single sign-on on **Autotask Endpoint Backup** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/_AutotaskCustomerSupport.htm). They set this setting to have the SAML SSO connection set properly on both sides.
123
+
To configure single sign-on on **Autotask Endpoint Backup** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/Support_for_End_Clients.htm). They set this setting to have the SAML SSO connection set properly on both sides.
124
124
125
125
### Create an Azure AD test user
126
126
@@ -175,7 +175,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
175
175
176
176
### Create Autotask Endpoint Backup test user
177
177
178
-
In this section, you create a user called Britta Simon in Autotask Endpoint Backup. Work with [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/_AutotaskCustomerSupport.htm) to add the users in the Autotask Endpoint Backup platform. Users must be created and activated before you use single sign-on.
178
+
In this section, you create a user called Britta Simon in Autotask Endpoint Backup. Work with [Autotask Endpoint Backup support team](https://backup.autotask.net/help/Content/0_HOME/Support_for_End_Clients.htm) to add the users in the Autotask Endpoint Backup platform. Users must be created and activated before you use single sign-on.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/carlsonwagonlit-tutorial.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ To configure Azure AD single sign-on with Carlson Wagonlit Travel, perform the f
114
114
115
115
### Configure Carlson Wagonlit Travel Single Sign-On
116
116
117
-
To configure single sign-on on **Carlson Wagonlit Travel** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Carlson Wagonlit Travel support team](http://www.carlsonwagonlit.in/content/cwt/in/en/technical-assistance.html). They set this setting to have the SAML SSO connection set properly on both sides.
117
+
To configure single sign-on on **Carlson Wagonlit Travel** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Carlson Wagonlit Travel support team](https://www.mycwt.com/traveler-help/). They set this setting to have the SAML SSO connection set properly on both sides.
118
118
119
119
### Create an Azure AD test user
120
120
@@ -169,7 +169,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
169
169
170
170
### Create Carlson Wagonlit Travel test user
171
171
172
-
In this section, you create a user called Britta Simon in Carlson Wagonlit Travel. Work with [Carlson Wagonlit Travel support team](http://www.carlsonwagonlit.in/content/cwt/in/en/technical-assistance.html) to add the users in the Carlson Wagonlit Travel platform. Users must be created and activated before you use single sign-on.
172
+
In this section, you create a user called Britta Simon in Carlson Wagonlit Travel. Work with [Carlson Wagonlit Travel support team](https://www.mycwt.com/traveler-help/) to add the users in the Carlson Wagonlit Travel platform. Users must be created and activated before you use single sign-on.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/wikispaces-tutorial.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,7 @@ To configure Azure AD single sign-on with Wikispaces, perform the following step
102
102
`https://session.wikispaces.net/<instancename>`
103
103
104
104
> [!NOTE]
105
-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Wikispaces Client support team](https://www.wikispaces.com/site/help) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
105
+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Wikispaces Client support team](https://wikispaces.psu.edu/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
106
106
107
107
5. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
108
108
@@ -120,7 +120,7 @@ To configure Azure AD single sign-on with Wikispaces, perform the following step
120
120
121
121
### Configure Wikispaces Single Sign-On
122
122
123
-
To configure single sign-on on **Wikispaces** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Wikispaces support team](https://www.wikispaces.com/site/help). They set this setting to have the SAML SSO connection set properly on both sides.
123
+
To configure single sign-on on **Wikispaces** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [Wikispaces support team](https://wikispaces.psu.edu/). They set this setting to have the SAML SSO connection set properly on both sides.
Copy file name to clipboardExpand all lines: articles/advisor/security-baseline.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ Note that some Azure services support local users and roles which are not manage
142
142
143
143
-[Create an access review of Azure resource roles in Privileged Identity Management (PIM)](../active-directory/privileged-identity-management/pim-resource-roles-start-access-review.md)
144
144
145
-
-[How to use Azure AD identity and access reviews](/azure/active-directory/governance/access-reviews-overvie)
145
+
-[How to use Azure AD identity and access reviews](/azure/active-directory/governance/access-reviews-overview)
146
146
147
147
**Azure Security Center monitoring**: Not applicable
148
148
@@ -218,7 +218,7 @@ Use Azure Conditional Access to limit a user's ability to interact with Azure Re
218
218
219
219
## Logging and Threat Detection
220
220
221
-
*For more information, see the [Azure Security Benchmark: Logging and Threat Detection](/azure/security/benchmarks/security-controls-v2-logging-threat-protection).*
221
+
*For more information, see the [Azure Security Benchmark: Logging and Threat Detection](/azure/security/benchmarks/security-controls-v2-logging-threat-detection).*
222
222
223
223
### LT-4: Enable logging for Azure resources
224
224
@@ -370,7 +370,7 @@ Use workflow automation features in Azure Security Center and Azure Sentinel to
370
370
371
371
## Posture and Vulnerability Management
372
372
373
-
*For more information, see the [Azure Security Benchmark: Posture and Vulnerability Management](/azure/security/benchmarks/security-controls-v2-vulnerability-management).*
373
+
*For more information, see the [Azure Security Benchmark: Posture and Vulnerability Management](/azure/security/benchmarks/security-controls-v2-posture-vulnerability-management).*
374
374
375
375
### PV-8: Conduct regular attack simulation
376
376
@@ -420,9 +420,9 @@ For more information, see the following references:
420
420
421
421
-[Cloud Adoption Framework - Azure data security and encryption best practices](../security/fundamentals/data-encryption-best-practices.md?amp;bc=%2fazure%2fcloud-adoption-framework%2f_bread%2ftoc.json&toc=%2fazure%2fcloud-adoption-framework%2ftoc.json)
-[Azure Security Benchmark - Data Protection](/azure/security/benchmarks/security-benchmark-v2-data-protection)
425
+
-[Azure Security Benchmark - Data Protection](/azure/security/benchmarks/security-controls-v2-data-protection)
426
426
427
427
**Azure Security Center monitoring**: Not applicable
428
428
@@ -450,7 +450,7 @@ Ensure that the segmentation strategy is implemented consistently across control
450
450
451
451
**Guidance**: Continuously measure and mitigate risks to your individual assets and the environment they are hosted in. Prioritize high value assets and highly-exposed attack surfaces, such as published applications, network ingress and egress points, user and administrator endpoints, etc.
452
452
453
-
-[Azure Security Benchmark - Posture and vulnerability management](/azure/security/benchmarks/security-benchmark-v2-posture-vulnerability-management)
453
+
-[Azure Security Benchmark - Posture and vulnerability management](/azure/security/benchmarks/security-controls-v2-posture-vulnerability-management)
454
454
455
455
**Azure Security Center monitoring**: Not applicable
456
456
@@ -491,7 +491,7 @@ This strategy should include documented guidance, policy, and standards for the
491
491
For more information, see the following references:
492
492
-[Azure Security Best Practice 11 - Architecture. Single unified security strategy](/azure/cloud-adoption-framework/security/security-top-10#11-architecture-establish-a-single-unified-security-strategy)
-[Azure Security Best Practice 11 - Architecture. Single unified security strategy](/azure/cloud-adoption-framework/security/security-top-10#11-architecture-establish-a-single-unified-security-strategy)
527
527
@@ -553,9 +553,9 @@ This strategy should include documented guidance, policy, and standards for the
553
553
554
554
For more information, see the following references:
555
555
556
-
-[Azure Security Benchmark - Logging and threat detection](/azure/security/benchmarks/security-benchmark-v2-logging-threat-detection)
556
+
-[Azure Security Benchmark - Logging and threat detection](/azure/security/benchmarks/security-controls-v2-logging-threat-detection)
-[Azure Security Best Practice 4 - Process. Update Incident Response Processes for Cloud](/azure/cloud-adoption-framework/security/security-top-10#4-process-update-incident-response-ir-processes-for-cloud)
Copy file name to clipboardExpand all lines: articles/app-service/app-service-authentication-how-to.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,7 +167,7 @@ When your provider's access token (not the [session token](#extend-session-token
167
167
168
168
-**Google**: Append an `access_type=offline` query string parameter to your `/.auth/login/google` API call. If using the Mobile Apps SDK, you can add the parameter to one of the `LogicAsync` overloads (see [Google Refresh Tokens](https://developers.google.com/identity/protocols/OpenIDConnect#refresh-tokens)).
169
169
-**Facebook**: Doesn't provide refresh tokens. Long-lived tokens expire in 60 days (see [Facebook Expiration and Extension of Access Tokens](https://developers.facebook.com/docs/facebook-login/access-tokens/expiration-and-extension)).
170
-
-**Twitter**: Access tokens don't expire (see [Twitter OAuth FAQ](https://developer.twitter.com/en/docs/basics/authentication/FAQ)).
170
+
-**Twitter**: Access tokens don't expire (see [Twitter OAuth FAQ](https://developer.twitter.com/en/docs/authentication/faq)).
171
171
-**Microsoft Account**: When [configuring Microsoft Account Authentication Settings](configure-authentication-provider-microsoft.md), select the `wl.offline_access` scope.
172
172
-**Azure Active Directory**: In [https://resources.azure.com](https://resources.azure.com), do the following steps:
Copy file name to clipboardExpand all lines: articles/app-service/security-baseline.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,7 +167,7 @@ Review the referenced links for additional information.
167
167
168
168
-[How to configure end-to-end TLS by using Application Gateway with the portal](../application-gateway/end-to-end-ssl-portal.md)
169
169
170
-
-[Secure the ASE as described in Locking down an App Service](https://review.docs.microsoft.com/azure/app-service/environment/firewall-integrationEnvironment:)
170
+
-[Secure the ASE as described in Locking down an App Service](/azure/app-service/environment/firewall-integration)
171
171
172
172
**Azure Security Center monitoring**: Yes
173
173
@@ -204,7 +204,7 @@ Review the referenced links for additional information.
204
204
205
205
-[How to configure end-to-end TLS by using Application Gateway with the portal](../application-gateway/end-to-end-ssl-portal.md)
206
206
207
-
-[Secure the ASE as described in Locking down an App Service](https://review.docs.microsoft.com/azure/app-service/environment/firewall-integrationEnvironment:)
207
+
-[Secure the ASE as described in Locking down an App Service](/azure/app-service/environment/firewall-integration)
208
208
209
209
**Azure Security Center monitoring**: Not applicable
210
210
@@ -220,7 +220,7 @@ Apply any of the built-in Azure Policy definitions related to tagging effects, s
220
220
221
221
-[How to create and use tags](../azure-resource-manager/management/tag-resources.md)
222
222
223
-
-[Azure App Service Access Restrictions](/azure/app-service/app-service-ip-restriction)
223
+
-[Azure App Service Access Restrictions](/azure/app-service/app-service-ip-restrictions)
224
224
225
225
**Azure Security Center monitoring**: Not applicable
Copy file name to clipboardExpand all lines: articles/automation/automation-hrw-run-runbooks.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ When you author a runbook to run on a Hybrid Runbook Worker, you should edit and
17
17
18
18
Azure Automation handles jobs on Hybrid Runbook Workers differently from jobs run in Azure sandboxes. If you have a long-running runbook, make sure that it's resilient to possible restart. For details of the job behavior, see [Hybrid Runbook Worker jobs](automation-hybrid-runbook-worker.md#hybrid-runbook-worker-jobs).
19
19
20
-
Jobs for Hybrid Runbook Workers run under the local **System** account on Windows, or the **nxautomation** account on Linux. For Linux, verify the **nxautomation** account has access to the location where the runbook modules are stored. When you use the [Install-Module](/powershell/module/powershellget/install-module) cmdlet, be sure to specify AllUsers for the `Scope` parameter to ensure that the **nxautomation** account has access. For more information on PowerShell on Linux, see [Known Issues for PowerShell on Non-Windows Platforms](/powershell/scripting/whats-new/known-issues-ps6#known-issues-for-powershell-on-non-windows-platforms).
20
+
Jobs for Hybrid Runbook Workers run under the local **System** account on Windows, or the **nxautomation** account on Linux. For Linux, verify the **nxautomation** account has access to the location where the runbook modules are stored. When you use the [Install-Module](/powershell/module/powershellget/install-module) cmdlet, be sure to specify AllUsers for the `Scope` parameter to ensure that the **nxautomation** account has access. For more information on PowerShell on Linux, see [Known Issues for PowerShell on Non-Windows Platforms](/powershell/scripting/whats-new/what-s-new-in-powershell-70?view=powershell-7.1).
0 commit comments