Skip to content

Commit 728a7d0

Browse files
authored
Merge pull request #251102 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 9/12
2 parents 7a579db + eee8a6c commit 728a7d0

File tree

275 files changed

+1607
-1413
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

275 files changed

+1607
-1413
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/active-directory/saas-apps/gainsight-tutorial",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path_from_root": "/articles/active-directory/saas-apps/planview-id-tutorial.md",
110+
"redirect_url": "/azure/active-directory/saas-apps/planview-admin-tutorial",
111+
"redirect_document_id": false
112+
},
108113
{
109114
"source_path_from_root": "/articles/active-directory/saas-apps/postman-provisioning-tutorialy.md",
110115
"redirect_url": "/azure/active-directory/saas-apps/postman-provisioning-tutorial",

.openpublishing.redirection.json

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14855,47 +14855,47 @@
1485514855
{
1485614856
"source_path_from_root": "/articles/scheduler/scheduler-intro.md",
1485714857
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14858-
"redirect_document_id": ""
14858+
"redirect_document_id": false
1485914859
},
1486014860
{
1486114861
"source_path_from_root": "/articles/scheduler/scheduler-advanced-complexity.md",
1486214862
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14863-
"redirect_document_id": ""
14863+
"redirect_document_id": false
1486414864
},
1486514865
{
1486614866
"source_path_from_root": "/articles/scheduler/scheduler-concepts-terms.md",
1486714867
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14868-
"redirect_document_id": ""
14868+
"redirect_document_id": false
1486914869
},
1487014870
{
1487114871
"source_path_from_root": "/articles/scheduler/scheduler-powershell-reference.md",
1487214872
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14873-
"redirect_document_id": ""
14873+
"redirect_document_id": false
1487414874
},
1487514875
{
1487614876
"source_path_from_root": "/articles/scheduler/scheduler-plans-billing.md",
1487714877
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14878-
"redirect_document_id": ""
14878+
"redirect_document_id": false
1487914879
},
1488014880
{
1488114881
"source_path_from_root": "/articles/scheduler/scheduler-limits-defaults-errors.md",
1488214882
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14883-
"redirect_document_id": ""
14883+
"redirect_document_id": false
1488414884
},
1488514885
{
1488614886
"source_path_from_root": "/articles/scheduler/scheduler-high-availability-reliability.md",
1488714887
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14888-
"redirect_document_id": ""
14888+
"redirect_document_id": false
1488914889
},
1489014890
{
1489114891
"source_path_from_root": "/articles/scheduler/scheduler-outbound-authentication.md",
1489214892
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14893-
"redirect_document_id": ""
14893+
"redirect_document_id": false
1489414894
},
1489514895
{
1489614896
"source_path_from_root": "/articles/scheduler/get-started-portal.md",
1489714897
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
14898-
"redirect_document_id": ""
14898+
"redirect_document_id": false
1489914899
},
1490014900
{
1490114901
"source_path_from_root": "/articles/search/semantic-ranking.md",
@@ -17100,7 +17100,7 @@
1710017100
{
1710117101
"source_path_from_root": "/articles/service-fabric/service-fabric-deploy-multiple-apps.md",
1710217102
"redirect_url": "/azure/service-fabric/service-fabric-deploy-existing-app",
17103-
"redirect_document_id": ""
17103+
"redirect_document_id": false
1710417104
},
1710517105
{
1710617106
"source_path_from_root": "/articles/service-fabric/service-fabric-automate-powershell.md",
@@ -23820,27 +23820,27 @@
2382023820
{
2382123821
"source_path_from_root": "/articles/aks/managed-cluster-snapshot.md",
2382223822
"redirect_url": "/azure/aks/intro-kubernetes",
23823-
"redirect_document_id": "false"
23823+
"redirect_document_id": false
2382423824
},
2382523825
{
2382623826
"source_path_from_root": "/articles/azure-arc/servers/onboard-group-policy-service-principal-encryption.md",
2382723827
"redirect_url": "/azure/azure-arc/servers/onboard-group-policy-powershell",
23828-
"redirect_document_id": "false"
23828+
"redirect_document_id": false
2382923829
},
2383023830
{
2383123831
"source_path_from_root": "/articles/azure-arc/servers/onboard-group-policy.md",
2383223832
"redirect_url": "/azure/azure-arc/servers/onboard-group-policy-powershell",
23833-
"redirect_document_id": "false"
23833+
"redirect_document_id": false
2383423834
},
2383523835
{
2383623836
"source_path_from_root": "/articles/azure-arc/kubernetes/plan-at-scale-deployment.md",
2383723837
"redirect_url": "/azure/azure-arc/kubernetes/overview",
23838-
"redirect_document_id": "false"
23838+
"redirect_document_id": false
2383923839
},
2384023840
{
2384123841
"source_path_from_root": "/articles/azure-arc/kubernetes/tutorial-workload-management.md",
2384223842
"redirect_url": "/azure/azure-arc/kubernetes/workload-management",
23843-
"redirect_document_id": "true"
23843+
"redirect_document_id": true
2384423844
},
2384523845
{
2384623846
"source_path": "articles/azure-cache-for-redis/redis-cache-insights-overview.md",
@@ -23850,7 +23850,7 @@
2385023850
{
2385123851
"source_path_from_root": "/articles/aks/uptime-sla.md",
2385223852
"redirect_url": "/azure/aks/free-standard-pricing-tiers",
23853-
"redirect_document_id": "false"
23853+
"redirect_document_id": false
2385423854
},
2385523855
{
2385623856
"source_path": "articles/dotnet-develop-multitenant-applications.md",

articles/active-directory/architecture/auth-sync-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following table presents authentication Azure AD integration with legacy aut
4242
| [LDAP authentication](auth-ldap.md)| ![check mark](./media/authentication-patterns/check.png)| | | |
4343
| [OAuth 2.0 authentication](auth-oauth2.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4444
| [OIDC authentication](auth-oidc.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
45-
| [Password based SSO authentication](auth-password-based-sso.md )| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
45+
| [Password based SSO authentication](auth-password-based-sso.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4646
| [RADIUS authentication]( auth-radius.md)| ![check mark](./media/authentication-patterns/check.png)| | ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4747
| [Remote Desktop Gateway services](auth-remote-desktop-gateway.md)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |
4848
| [Secure Shell (SSH)](auth-ssh.md) | ![check mark](./media/authentication-patterns/check.png)| | ![check mark](./media/authentication-patterns/check.png)| ![check mark](./media/authentication-patterns/check.png) |

articles/active-directory/external-identities/customers/samples-ciam-all.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ These samples and how-to guides demonstrate how to write a browserless applicati
6161
> [!div class="mx-tdCol2BreakAll"]
6262
> | Language/<br/>Platform | Code sample guide | Build and integrate guide |
6363
> | ------- | -------- | ------------- |
64-
> | JavaScript, Node | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md ) |
64+
> | JavaScript, Node | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md) |
6565
> | .NET | &#8226; [Sign in users](./sample-browserless-app-dotnet-sign-in.md) | &#8226; [Sign in users](./tutorial-browserless-app-dotnet-sign-in-prepare-tenant.md) |
6666
6767

@@ -149,7 +149,7 @@ These samples and how-to guides demonstrate how to write a daemon application th
149149
> [!div class="mx-tdCol2BreakAll"]
150150
> | App type | Code sample guide | Build and integrate guide |
151151
> | ------- | -------- | ------------- |
152-
> | Browserless | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md ) |
152+
> | Browserless | &#8226; [Sign in users](./sample-browserless-app-node-sign-in.md) | &#8226; [Sign in users](how-to-browserless-app-node-sign-in-overview.md) |
153153
> | Daemon | &#8226; [Call an API](./sample-daemon-node-call-api.md) | &#8226; [Call an API](./tutorial-daemon-node-call-api-prepare-tenant.md) |
154154
155155

articles/active-directory/external-identities/tenant-restrictions-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ While [tenant restrictions v1](../manage-apps/tenant-restrictions.md) provide au
4646

4747
In your organization's [cross-tenant access settings](cross-tenant-access-overview.md), you can configure a tenant restrictions v2 policy. After you create the policy, there are three ways to apply the policy in your organization.
4848

49-
- **Universal tenant restrictions v2**. This option provides both authentication plane and data plane protection without a corporate proxy. [Universal tenant restrictions](https://learn.microsoft.com/azure/global-secure-access/how-to-universal-tenant-restrictions) use Global Secure Access (preview) to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity.
49+
- **Universal tenant restrictions v2**. This option provides both authentication plane and data plane protection without a corporate proxy. [Universal tenant restrictions](/azure/global-secure-access/how-to-universal-tenant-restrictions) use Global Secure Access (preview) to tag all traffic no matter the operating system, browser, or device form factor. It allows support for both client and remote network connectivity.
5050
- **Authentication plane tenant restrictions v2**. You can deploy a corporate proxy in your organization and [configure the proxy to set tenant restrictions v2 signals](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy) on all traffic to Microsoft Entra and Microsoft Accounts (MSA).
5151
- **Windows tenant restrictions v2**. For your corporate-owned Windows devices, you can enforce both authentication plane and data plane protection by enforcing tenant restrictions directly on devices. Tenant restrictions are enforced upon resource access, providing data path coverage and protection against token infiltration. A corporate proxy isn't required for policy enforcement. Devices can be Azure AD managed or domain-joined devices that are managed via Group Policy.
5252

@@ -341,7 +341,7 @@ There are three options for enforcing tenant restrictions v2 for clients:
341341

342342
### Option 1: Universal tenant restrictions v2 as part of Microsoft Entra Global Secure Access (preview)
343343

344-
Universal tenant restrictions v2 as part of [Microsoft Entra Global Secure Access](https://learn.microsoft.com/azure/global-secure-access/overview-what-is-global-secure-access) is recommended because it provides authentication and data plane protection for all devices and platforms. This option provides more protection against sophisticated attempts to bypasses authentication. For example, attackers might try to allow anonymous access to a malicious tenant’s apps, such as anonymous meeting join in Teams. Or, attackers might attempt to import to your organizational device an access token lifted from a device in the malicious tenant. Universal tenant restrictions v2 prevents these attacks by sending tenant restrictions v2 signals on the authentication plane (Microsoft Entra and Microsoft Account) and data plane (Microsoft cloud applications).
344+
Universal tenant restrictions v2 as part of [Microsoft Entra Global Secure Access](/azure/global-secure-access/overview-what-is-global-secure-access) is recommended because it provides authentication and data plane protection for all devices and platforms. This option provides more protection against sophisticated attempts to bypasses authentication. For example, attackers might try to allow anonymous access to a malicious tenant’s apps, such as anonymous meeting join in Teams. Or, attackers might attempt to import to your organizational device an access token lifted from a device in the malicious tenant. Universal tenant restrictions v2 prevents these attacks by sending tenant restrictions v2 signals on the authentication plane (Microsoft Entra and Microsoft Account) and data plane (Microsoft cloud applications).
345345

346346
### Option 2: Set up tenant restrictions v2 on your corporate proxy
347347

articles/active-directory/governance/entitlement-management-access-package-request-policy.md

Lines changed: 32 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,7 @@ In addition to policies for users to request access, you can also have policies
4848
| I want some users to request access and other users to be assigned access by an administrator | Two |
4949
| I want some users in my organization to receive access automatically, other users in my organization to be able to request, and other users to be assigned access by an administrator | Three |
5050

51-
For information about the priority logic that is used when multiple policies apply, see [Multiple policies](entitlement-management-troubleshoot.md#multiple-policies
52-
).
51+
For information about the priority logic that is used when multiple policies apply, see [Multiple policies](entitlement-management-troubleshoot.md#multiple-policies).
5352

5453
## Open an existing access package and add a new policy with different request settings
5554

@@ -131,7 +130,7 @@ Follow these steps if you want to allow users not in your directory to request t
131130
| --- | --- |
132131
| **Specific connected organizations** | Choose this option if you want to select from a list of organizations that your administrator previously added. All users from the selected organizations can request this access package. |
133132
| **All configured connected organizations** | Choose this option if all users from all your configured connected organizations can request this access package. Only users from configured connected organizations can request access packages, so if a user is not from an Azure AD tenant, domain or identity provider associated with an existing connected organization, they will not be able to request. |
134-
| **All users (All connected organizations + any new external users)** | Choose this option if any user on the internet should be able to request this access package. If they dont belong to a connected organization in your directory, a connected organization will automatically be created for them when they request the package. The automatically created connected organization will be in a **proposed** state. For more information about the proposed state, see [State property of connected organizations](entitlement-management-organization.md#state-property-of-connected-organizations). |
133+
| **All users (All connected organizations + any new external users)** | Choose this option if any user on the internet should be able to request this access package. If they don't belong to a connected organization in your directory, a connected organization will automatically be created for them when they request the package. The automatically created connected organization will be in a **proposed** state. For more information about the proposed state, see [State property of connected organizations](entitlement-management-organization.md#state-property-of-connected-organizations). |
135134

136135

137136
1. If you selected **Specific connected organizations**, click **Add directories** to select from a list of connected organizations that your administrator previously added.
@@ -234,36 +233,36 @@ Connect-MgGraph -Scopes "EntitlementManagement.ReadWrite.All"
234233
$apid = "cdd5f06b-752a-4c9f-97a6-82f4eda6c76d"
235234
236235
$params = @{
237-
displayName = "New Policy"
238-
description = "policy for assignment"
239-
allowedTargetScope = "notSpecified"
240-
specificAllowedTargets = @(
241-
)
242-
expiration = @{
243-
endDateTime = $null
244-
duration = $null
245-
type = "noExpiration"
246-
}
247-
requestorSettings = @{
248-
enableTargetsToSelfAddAccess = $false
249-
enableTargetsToSelfUpdateAccess = $false
250-
enableTargetsToSelfRemoveAccess = $false
251-
allowCustomAssignmentSchedule = $true
252-
enableOnBehalfRequestorsToAddAccess = $false
253-
enableOnBehalfRequestorsToUpdateAccess = $false
254-
enableOnBehalfRequestorsToRemoveAccess = $false
255-
onBehalfRequestors = @(
256-
)
257-
}
258-
requestApprovalSettings = @{
259-
isApprovalRequiredForAdd = $false
260-
isApprovalRequiredForUpdate = $false
261-
stages = @(
262-
)
263-
}
264-
accessPackage = @{
265-
id = $apid
266-
}
236+
displayName = "New Policy"
237+
description = "policy for assignment"
238+
allowedTargetScope = "notSpecified"
239+
specificAllowedTargets = @(
240+
)
241+
expiration = @{
242+
endDateTime = $null
243+
duration = $null
244+
type = "noExpiration"
245+
}
246+
requestorSettings = @{
247+
enableTargetsToSelfAddAccess = $false
248+
enableTargetsToSelfUpdateAccess = $false
249+
enableTargetsToSelfRemoveAccess = $false
250+
allowCustomAssignmentSchedule = $true
251+
enableOnBehalfRequestorsToAddAccess = $false
252+
enableOnBehalfRequestorsToUpdateAccess = $false
253+
enableOnBehalfRequestorsToRemoveAccess = $false
254+
onBehalfRequestors = @(
255+
)
256+
}
257+
requestApprovalSettings = @{
258+
isApprovalRequiredForAdd = $false
259+
isApprovalRequiredForUpdate = $false
260+
stages = @(
261+
)
262+
}
263+
accessPackage = @{
264+
id = $apid
265+
}
267266
}
268267
269268
New-MgEntitlementManagementAssignmentPolicy -BodyParameter $params

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,8 +123,7 @@ Make sure you, the user or service principal that will authenticate to Azure AD,
123123
124124
To set the role assignment and create a query, do the following steps:
125125
126-
1. In the Azure portal, locate the [Log Analytics workspace](https://portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/Microsoft.OperationalInsights%2Fworkspaces
127-
).
126+
1. In the Azure portal, locate the [Log Analytics workspace](https://portal.azure.com/#blade/HubsExtension/BrowseResourceBlade/resourceType/Microsoft.OperationalInsights%2Fworkspaces).
128127
129128
1. Select **Access Control (IAM)**.
130129

articles/active-directory/governance/identity-governance-organizational-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ You can [extend the Azure AD schema](../app-provisioning/user-provisioning-sync-
8080

8181
### Create catalogs for delegation
8282

83-
If the ongoing maintenance of roles is delegated, then you can delegate the administration of access packages by [creating a catalog](entitlement-management-catalog-create.md ) for each part of the organization you'll be delegating to.
83+
If the ongoing maintenance of roles is delegated, then you can delegate the administration of access packages by [creating a catalog](entitlement-management-catalog-create.md) for each part of the organization you'll be delegating to.
8484

8585
If you have multiple catalogs to create, you can use a PowerShell script to [create each catalog](entitlement-management-catalog-create.md#create-a-catalog-with-powershell).
8686

0 commit comments

Comments
 (0)