Skip to content

Commit 747f69e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into app-articles-batch-14
2 parents 31978d7 + 69f4511 commit 747f69e

File tree

140 files changed

+1557
-827
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+1557
-827
lines changed

.openpublishing.redirection.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27757,7 +27757,72 @@
2775727757
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sapase.md",
2775827758
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapase",
2775927759
"redirect_document_id": false
27760+
},
27761+
{
27762+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_general.md",
27763+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-general",
27764+
"redirect_document_id": false
2776027765
},
27766+
{
27767+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_ibm.md",
27768+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-ibm",
27769+
"redirect_document_id": false
27770+
},
27771+
{
27772+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_maxdb.md",
27773+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-maxdb",
27774+
"redirect_document_id": false
27775+
},
27776+
{
27777+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_oracle.md",
27778+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-oracle",
27779+
"redirect_document_id": false
27780+
},
27781+
{
27782+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/dbms_guide_sqlserver.md",
27783+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sqlserver",
27784+
"redirect_document_id": false
27785+
},
27786+
{
27787+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-supported-product-on-azure.md",
27788+
"redirect_url": "/azure/virtual-machines/workloads/sap/supported-product-on-azure",
27789+
"redirect_document_id": false
27790+
},
27791+
{
27792+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-rise-integration.md",
27793+
"redirect_url": "/azure/virtual-machines/workloads/sap/rise-integration",
27794+
"redirect_document_id": false
27795+
},
27796+
{
27797+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-proximity-placement-scenarios.md",
27798+
"redirect_url": "/azure/virtual-machines/workloads/sap/proximity-placement-scenarios",
27799+
"redirect_document_id": false
27800+
},
27801+
{
27802+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-planning-supported-configurations.md",
27803+
"redirect_url": "/azure/virtual-machines/workloads/sap/planning-supported-configurations",
27804+
"redirect_document_id": false
27805+
},
27806+
{
27807+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-iq-deployment-guide.md",
27808+
"redirect_url": "/azure/virtual-machines/workloads/sap/dbms-guide-sapiq",
27809+
"redirect_document_id": false
27810+
},
27811+
{
27812+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-certifications.md",
27813+
"redirect_url": "/azure/virtual-machines/workloads/sap/certifications",
27814+
"redirect_document_id": false
27815+
},
27816+
{
27817+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-ha-availability-zones.md",
27818+
"redirect_url": "/azure/virtual-machines/workloads/sap/high-availability-zones",
27819+
"redirect_document_id": false
27820+
},
27821+
{
27822+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-deployment-checklist.md",
27823+
"redirect_url": "/azure/virtual-machines/workloads/sap/deployment-checklist",
27824+
"redirect_document_id": false
27825+
},
2776127826
{
2776227827
"source_path_from_root": "/articles/migrate/how-to-scale-assessment.md",
2776327828
"redirect_url": "scale-hyper-v-assessment",

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 3 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/29/2022
9+
ms.date: 12/13/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ Cloud-based Azure AD multifactor authentication and MFA Server process and store
2424

2525
The Azure AD multifactor authentication service has datacenters in the United States, Europe, and Asia Pacific. The following activities originate from the regional datacenters except where noted:
2626

27-
* Multifactor authentication phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
27+
* Multifactor authentication SMS and phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
2828
* General purpose user authentication requests from other regions are currently processed based on the user's location.
2929
* Push notifications that use the Microsoft Authenticator app are currently processed in regional datacenters based on the user's location. Vendor-specific device services, such as Apple Push Notification Service or Google Firebase Cloud Messaging, might be outside the user's location.
3030

@@ -102,22 +102,12 @@ Standard voice calls may failover to a different region.
102102
>[!NOTE]
103103
>The multifactor authentication activity reports contain personal data such as User Principal Name (UPN) and complete phone number.
104104
105-
### NPS extension and AD FS adapter
106-
107-
| Authentication method | Customer region | Activity report location | Service log location |
108-
|-----------------------------------------------------------------------------------|--------------------------------------|--------------------------|----------------------|
109-
| OATH software and hardware tokens | Australia and New Zealand | Australia/New Zealand | Cloud in-region |
110-
| OATH software and hardware tokens | Outside of Australia and New Zealand | United States | Cloud in-region |
111-
| Voice calls without custom greetings and all other authentication methods except OATH software and hardware tokens | Any | United States | Cloud in-region |
112-
| Voice calls with custom greetings | Any | United States | MFA backend in United States |
113-
114105
### MFA server and cloud-based MFA
115106

116107
| Component | Authentication method | Customer region | Activity report location | Service log location |
117108
|------------|------------------------------------------------|--------------------------------------|---------------------------------|------------------------------|
118109
| MFA server | All methods | Any | United States | MFA backend in United States |
119-
| Cloud MFA | Standard voice calls and all other methods | Any | Azure AD Sign-in logs in region | Cloud in-region |
120-
| Cloud MFA | Voice calls with custom greetings | Any | Azure AD Sign-in logs in region | MFA backend in United States |
110+
| Cloud MFA | All methods | Any | Azure AD Sign-in logs in region | Cloud in-region |
121111

122112
## Multifactor authentication activity reports for sovereign clouds
123113

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 12/06/2022
10+
ms.date: 12/28/2022
1111

1212

1313
ms.author: justinha
@@ -32,17 +32,14 @@ People who enabled phone sign-in from Microsoft Authenticator see a message that
3232
1. Choose **Approve**.
3333
1. Provide their PIN or biometric.
3434

35-
## Multiple accounts on iOS (preview)
35+
## Multiple accounts on iOS
3636

3737
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
3838

3939
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
4040

4141
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-ins from one device.
4242

43-
>[!NOTE]
44-
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45-
4643
## Prerequisites
4744

4845
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,8 @@
8989
- name: Manage users, roles, and their access levels
9090
expanded: false
9191
items:
92+
- name: Add or remove a user in Permissions Management
93+
href: how-to-add-remove-user-to-group.md
9294
- name: Manage users and groups
9395
href: ui-user-management.md
9496
# - name: Define and manage users, roles, and access levels
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Add or remove a user in Permissions Management through the Microsoft Entra admin center
3+
description: How to add or remove a user in Permissions Management through Azure Active Directory (AD).
4+
services: active-directory
5+
author: jenniferf-skc
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: ciem
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 12/28/2022
12+
ms.author: jfields
13+
---
14+
15+
# Add or remove a user in Permissions Management
16+
17+
This article describes how you can add or remove a new user for a group in Permissions Management.
18+
19+
> [!NOTE]
20+
> Permissions Management entitlements work through group-based access. To add a new user, you must add a user to a group through Azure Active Directory (AD).
21+
22+
## Add a user
23+
24+
1. Navigate to the [Microsoft Entra admin center](https://entr.microsoft.com/#home).
25+
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
26+
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
27+
1. Select the group name for the group you want to add the user to.
28+
1. From the group's **Manage** menu, click **Members**.
29+
1. Click **+ Add members**, then search for the user you want to add from the list.
30+
> [!NOTE]
31+
> In order to add a user to a group, you must be the group owner. If you're not the owner of the
32+
selected group, please reach out to the group owner. If you don't know who the owner of the group is,
33+
select **Owners** under the group's **Manage** menu.
34+
7. Click **Select**. Your user has been added.
35+
8. Click the **Refresh** button to refresh your screen and view the user you've added.
36+
37+
38+
## Remove a user
39+
40+
1. Navigate to the Microsoft [Entra admin center](https://entr.microsoft.com/#home).
41+
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
42+
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
43+
1. Select the group name for the group you want to remove the user from.
44+
1. From the groups **Manage** menu, click **Members**.
45+
1. Search for the user you want to remove from the list, then check the box next to their name.
46+
> [!NOTE]
47+
> In order to remove a user from a group, you must be the group owner. If you're not the owner of the
48+
selected group, please reach out to the group owner. If you don't know who the owner of the group is,
49+
select **Owners** under the group's **Manage** menu.
50+
7. Click **X Remove**, then click **Yes**. The user is removed from the group.
51+
52+
53+
## Next steps
54+
55+
- For more information on managing users and groups, see [Manage users and groups with the User management dashboard](ui-user-management.md).
56+
- For more information on setting group permissions, see [Select group-based permissions settings](how-to-create-group-based-permissions.md).

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,9 @@ The following device attributes can be used with the filter for devices conditio
128128
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -eq "ServerAD") |
129129
| extensionAttribute1-15 | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | extensionAttributes1-15 are attributes that customers can use for device objects. Customers can update any of the extensionAttributes1 through 15 with custom values and use them in the filter for devices condition in Conditional Access. Any string value can be used. | (device.extensionAttribute1 -eq "SAW") |
130130

131+
> [!NOTE]
132+
> When building complex rules or using too many individual identifiers like deviceid for device identities, keep in mind "The maximum length for the filter rule is 3072 characters".
133+
131134
> [!NOTE]
132135
> The `Contains` and the `NotContains` operators work differently depending on attribute types. For string attributes such as `operatingSystem` and `model`, the `Contains` operator indicates whether a specified substring occurs within the attribute. For string collection attributes such as `physicalIds` and `systemLabels`, the `Contains` operator indicates whether a specified string matches one of the whole strings in the collection.
133136

articles/active-directory/devices/concept-azure-ad-register.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Azure AD registration can be accomplished when accessing a work application for
5353

5454
## Scenarios
5555

56-
A user in your organization wants to access your benefits enrollment tool from their home PC. Your organization requires that anyone accesses this tool from an Intune compliant device. The user registers their home PC with Azure AD and the required Intune policies are enforced giving the user access to their resources.
56+
A user in your organization wants to access your benefits enrollment tool from their home PC. Your organization requires that anyone accesses this tool from an Intune compliant device. The user registers their home PC with Azure AD and Enrolls the device in Intune, then the required Intune policies are enforced giving the user access to their resources.
5757

5858
Another user wants to access their organizational email on their personal Android phone that has been rooted. Your company requires a compliant device and has created an Intune compliance policy to block any rooted devices. The employee is stopped from accessing organizational resources on this device.
5959

articles/aks/node-access.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,7 @@ aks-nodepool1-12345678-vmss000001 Ready agent 13m v1.19.9 10.240.0.
3939
aksnpwin000000 Ready agent 87s v1.19.9 10.240.0.67 <none> Windows Server 2019 Datacenter 10.0.17763.1935 docker://19.3.1
4040
```
4141

42-
Us the `kubectl debug` command to run a container image on the node to connect to it.
43-
44-
```bash
45-
kubectl debug node/aks-nodepool1-12345678-vmss000000 -it --image=mcr.microsoft.com/dotnet/runtime-deps:6.0
46-
```
47-
48-
The following command starts a privileged container on your node and connects to it.
42+
Use the `kubectl debug` command to run a container image on the node to connect to it. The following command starts a privileged container on your node and connects to it.
4943

5044
```bash
5145
kubectl debug node/aks-nodepool1-12345678-vmss000000 -it --image=mcr.microsoft.com/dotnet/runtime-deps:6.0

articles/application-gateway/application-gateway-autoscaling-zone-redundant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: fasttrack-edit, references_regions
1414

1515
Application Gateway and WAF can be configured to scale in two modes:
1616

17-
- **Autoscaling** - With autoscaling enabled, the Application Gateway and WAF v2 SKUs scale out or in based on application traffic requirements. This mode offers better elasticity to your application and eliminates the need to guess the application gateway size or instance count. This mode also allows you to save cost by not requiring the gateway to run at peak-provisioned capacity for expected maximum traffic load. You must specify a minimum and optionally maximum instance count. Minimum capacity ensures that Application Gateway and WAF v2 don't fall below the minimum instance count specified, even without traffic. Each instance is roughly equivalent to 10 more reserved Capacity Units. Zero signifies no reserved capacity and is purely autoscaling in nature. You can also optionally specify a maximum instance count, which ensures that the Application Gateway doesn't scale beyond the specified number of instances. You'll only be billed for the amount of traffic served by the Gateway. The instance counts can range from 0 to 125. The default value for maximum instance count is 20 if not specified.
17+
- **Autoscaling** - With autoscaling enabled, the Application Gateway and WAF v2 SKUs scale out or in based on application traffic requirements. This mode offers better elasticity to your application and eliminates the need to guess the application gateway size or instance count. This mode also allows you to save cost by not requiring the gateway to run at peak-provisioned capacity for expected maximum traffic load. You must specify a minimum and optionally maximum instance count. Minimum capacity ensures that Application Gateway and WAF v2 don't fall below the minimum instance count specified, even without traffic. Each instance is roughly equivalent to 10 more reserved Capacity Units. Zero signifies no reserved capacity and is purely autoscaling in nature. You can also optionally specify a maximum instance count, which ensures that the Application Gateway doesn't scale beyond the specified number of instances. You'll only be billed for the amount of traffic served by the Gateway. The instance counts can range from 0 to 125. The default value for maximum instance count is 10 if not specified.
1818
- **Manual** - You can also choose Manual mode where the gateway won't autoscale. In this mode, if there's more traffic than what Application Gateway or WAF can handle, it could result in traffic loss. With manual mode, specifying instance count is mandatory. Instance count can vary from 1 to 125 instances.
1919

2020
## Autoscaling and High Availability

0 commit comments

Comments
 (0)