Skip to content

Commit 697eb7d

Browse files
authored
Merge pull request #234948 from MicrosoftDocs/main
4/18 PM Publish
2 parents f0d849a + b016245 commit 697eb7d

File tree

533 files changed

+7839
-7923
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

533 files changed

+7839
-7923
lines changed

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ ms.collection: M365-identity-device-management
1919
---
2020
# How to enable Microsoft Authenticator Lite for Outlook mobile (preview)
2121

22-
>[!NOTE]
23-
>Rollout has not yet completed across Outlook applications. If this feature is enabled in your tenant, your users may not yet be prompted for the experience. To minimize user disruption, we recommend enabling this feature when the rollout completes.
2422

2523
Microsoft Authenticator Lite is another surface for Azure Active Directory (Azure AD) users to complete multifactor authentication by using push notifications or time-based one-time passcodes (TOTP) on their Android or iOS device. With Authenticator Lite, users can satisfy a multifactor authentication requirement from the convenience of a familiar app. Authenticator Lite is currently enabled in [Outlook mobile](https://www.microsoft.com/microsoft-365/outlook-mobile-for-android-and-ios).
2624

@@ -38,8 +36,8 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
3836

3937
| Operating system | Outlook version |
4038
|:----------------:|:---------------:|
41-
|Android | 4.2309.1 |
42-
|iOS | 4.2309.0 |
39+
|Android | 4.2310.1 |
40+
|iOS | 4.2312.1 |
4341

4442
## Enable Authenticator Lite
4543

@@ -52,7 +50,8 @@ By default, Authenticator Lite is [Microsoft managed](concept-authentication-def
5250

5351
To enable Authenticator Lite in the Azure portal, complete the following steps:
5452

55-
1. In the Azure portal, click Security > Authentication methods > Microsoft Authenticator.
53+
1. In the Azure portal, click Azure Active Directory > Security > Authentication methods > Microsoft Authenticator.
54+
In the Entra admin center, on the sidebar select Azure Active Directory > Protect & Secure > Authentication methods > Microsoft Authenticator.
5655

5756
2. On the Enable and Target tab, click Yes and All users to enable the policy for everyone or add selected users and groups. Set the Authentication mode for these users/groups to Any or Push.
5857

articles/active-directory/governance/entitlement-management-logic-apps-integration.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ These triggers to Logic Apps are controlled in a tab within access package polic
7070
1. The **Extension Configuration** tab allows you to decide if your extension has “launch and continue” or “launch and wait” behavior. With “Launch and continue” the linked policy action on the access package, such as a request, triggers the Logic App attached to the custom extension. After the Logic App is triggered, the entitlement management process associated with the access package will continue. For “Launch and wait”, we'll pause the associated access package action until after the Logic App linked to the extension completes its task, and a resume action is sent by the admin to continue the process. If no response is sent back in the wait time period defined, this process would be considered a failure. This process is further described below in its own section [Configuring custom extensions that pause entitlement management processes](entitlement-management-logic-apps-integration.md#configuring-custom-extensions-that-pause-entitlement-management-processes).
7171

7272

73-
1. In the **Details** tab, choose whether you’d like to use an existing Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank Logic App that is already linked to this custom extension. Regardless, you need to provide:
73+
1. In the **Details** tab, choose whether you’d like to use an existing consumption plan Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank consumption plan Logic App that is already linked to this custom extension. Regardless, you need to provide:
7474

7575
1. An Azure subscription.
7676

@@ -161,7 +161,7 @@ A new update to the custom extensions feature is the ability to pause the access
161161

162162
This pause process allows admins to have control of workflows they’d like to run before continuing with access lifecycle tasks in entitlement management. The only exception to this is if a timeout occurs. Launch and wait processes require a timeout of up to 14 days noted in minutes, hours, or days. If a resume response isn't sent back to entitlement management by the time the “timeout” period elapses, the entitlement management request workflow process pauses.
163163

164-
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume)
164+
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume).
165165

166166
Specifically, when an access package policy has been enabled to call out a custom extension and the request processing is waiting for the callback from the customer, the customer can initiate a resume action. It's performed on an [accessPackageAssignmentRequest](/graph/api/resources/accesspackageassignmentrequest) object whose **requestStatus** is in a **WaitingForCallback** state.
167167

@@ -171,12 +171,25 @@ The resume request can be sent back for the following stages:
171171
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestCreated
172172
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestApproved
173173
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestGranted
174-
Microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
174+
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
175175
``
176176

177177
The following flow diagram shows the entitlement management callout to Logic Apps workflow:
178-
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A screenshot of the extensibility user diagram." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
178+
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A diagram of the entitlement management call to the logic apps workflow." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
179179

180+
The diagram flow diagram shows:
181+
182+
1. The user creates a custom endpoint able to receive the call from the Identity Service
183+
1. The identity service makes a test call to confirm the endpoint can be called by the Identity Service
184+
1. The User calls Graph API to request to add a user to an access package
185+
1. The Identity Service is added to the queue triggering the backend workflow
186+
1. Entitlement Management Service request processing calls the logic app with the request payload
187+
1. Workflow expects the accepted code
188+
1. The Entitlement Management Service waits for the blocking custom action to resume
189+
1. The customer system calls the request resume API to the identity service to resume processing the request
190+
1. The identity service adds the resume request message to the Entitlement Management Service queue resuming the backend workflow
191+
1. The Entitlement Management Service is resumed from the blocked state
192+
180193
An example of a resume request payload is:
181194

182195
``` http
128 KB
Loading

articles/aks/TOC.yml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@
1414
- name: Getting started
1515
items:
1616
- name: Well-architected considerations
17-
href: /azure/architecture/framework/services/compute/azure-kubernetes-service/azure-kubernetes-service?bc=/azure/aks/breadcrumb/toc.json&toc=/azure/aks/toc.json?WT.mc_id=AKSDOCSTOC
17+
href: /azure/architecture/framework/services/compute/azure-kubernetes-service/azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
1818
- name: Plan your implementation
19-
href: /azure/architecture/reference-architectures/containers/aks-start-here?bc=/azure/aks/breadcrumb/toc.json&toc=/azure/aks/toc.json?WT.mc_id=AKSDOCSTOC
19+
href: /azure/architecture/reference-architectures/containers/aks-start-here?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
2020
- name: Optimize costs
2121
href: best-practices-cost.md
2222
- name: Quickstarts
@@ -86,7 +86,7 @@
8686
- name: Vulnerability management
8787
href: concepts-vulnerability-management.md
8888
- name: Security Baseline
89-
href: /security/benchmark/azure/baselines/aks-security-baseline?context=/azure/aks/context/aks-context
89+
href: /security/benchmark/azure/baselines/aks-security-baseline?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
9090
- name: Container Security
9191
href: concepts-security.md
9292
- name: Security controls by Azure Policy
@@ -127,7 +127,7 @@
127127
- name: Overview
128128
href: best-practices.md
129129
- name: Baseline architecture for an AKS cluster
130-
href: /azure/architecture/reference-architectures/containers/aks/secure-baseline-aks
130+
href: /azure/architecture/reference-architectures/containers/aks/secure-baseline-aks?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
131131
maintainContext: True
132132
- name: Security
133133
items:
@@ -164,22 +164,22 @@
164164
- name: Plan and execute a migration
165165
href: aks-migration.md
166166
- name: Spring Boot
167-
href: /azure/developer/java/migration/migrate-spring-boot-to-azure-kubernetes-service
167+
href: /azure/developer/java/migration/migrate-spring-boot-to-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
168168
maintainContext: false
169169
- name: Tomcat
170-
href: /azure/developer/java/migration/migrate-tomcat-to-containers-on-azure-kubernetes-service
170+
href: /azure/developer/java/migration/migrate-tomcat-to-containers-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
171171
maintainContext: false
172172
- name: Wildfly
173-
href: /azure/developer/java/migration/migrate-wildfly-to-wildfly-on-azure-kubernetes-service
173+
href: /azure/developer/java/migration/migrate-wildfly-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
174174
maintainContext: false
175175
- name: WebLogic
176-
href: /azure/developer/java/migration/migrate-weblogic-to-wildfly-on-azure-kubernetes-service
176+
href: /azure/developer/java/migration/migrate-weblogic-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
177177
maintainContext: false
178178
- name: WebSphere
179-
href: /azure/developer/java/migration/migrate-websphere-to-wildfly-on-azure-kubernetes-service
179+
href: /azure/developer/java/migration/migrate-websphere-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
180180
maintainContext: false
181181
- name: JBoss EAP
182-
href: /azure/developer/java/migration/migrate-jboss-eap-to-wildfly-on-azure-kubernetes-service
182+
href: /azure/developer/java/migration/migrate-jboss-eap-to-wildfly-on-azure-kubernetes-service?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
183183
maintainContext: false
184184
- name: Java web app containerization and migration
185185
href: ../migrate/tutorial-app-containerization-java-kubernetes.md
@@ -341,7 +341,7 @@
341341
- name: Use Azure Policy
342342
href: use-azure-policy.md
343343
- name: Control deployments with Azure Policy
344-
href: ../governance/policy/concepts/policy-for-kubernetes.md?toc=/azure/aks/toc.json
344+
href: ../governance/policy/concepts/policy-for-kubernetes.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
345345
maintainContext: true
346346
- name: Node security
347347
items:
@@ -598,7 +598,7 @@
598598
- name: Kubernetes Event-driven Autoscaler (KEDA) integrations
599599
href: keda-integrations.md
600600
- name: Troubleshoot Kubernetes Event-driven Autoscaler (KEDA)
601-
href: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context
601+
href: /troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
602602
- name: Use cluster extensions
603603
href: cluster-extensions.md
604604
- name: DevOps
@@ -607,7 +607,7 @@
607607
href: /azure/developer/ansible/aks-configure-clusters
608608
maintainContext: true
609609
- name: Jenkins continuous deployment
610-
href: /azure/developer/jenkins/deploy-from-github-to-aks
610+
href: /azure/developer/jenkins/deploy-from-github-to-aks?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
611611
- name: Azure DevOps Project
612612
href: ../devops-project/azure-devops-project-aks.md
613613
maintainContext: true

0 commit comments

Comments
 (0)