Skip to content

Commit 76c825e

Browse files
authored
Merge pull request #101723 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents a0312eb + 67ae993 commit 76c825e

File tree

51 files changed

+204
-736
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+204
-736
lines changed

articles/active-directory/develop/shared-device-mode.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Shared device mode also provides Microsoft identity backed management of the dev
3434
To create a shared device mode app, developers and cloud device admins work together:
3535

3636
- Developers write a single-account app (multiple-account apps are not supported in shared device mode), add `"shared_device_mode_supported": true` to the app's configuration, and write code to handle things like shared device sign-out.
37-
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles#cloud-device-administrator) role can put a device into shared mode by using the [Authenticator app](https://www.microsoft.com/account/authenticator). You can configure the membership of your organizational roles in the Azure portal via:
37+
- Device admins prepare the device to be shared by installing the authenticator app, and setting the device to shared mode using the authenticator app. Only users who are in the [Cloud Device Administrator](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles#cloud-device-administrator) role can put a device into shared mode by using the [Authenticator app](https://docs.microsoft.com/azure/active-directory/user-help/user-help-auth-app-overview). You can configure the membership of your organizational roles in the Azure portal via:
3838
**Azure Active Directory** > **Roles and Administrators** > **Cloud Device Administrator**.
3939

4040
This article focuses primarily what developers should think about.

articles/active-directory/manage-apps/manage-consent-requests.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ After end-user consent is disabled or restricted, there are several important co
3838

3939
3. If your organization has the appropriate license:
4040

41-
* Use additional [OAuth application auditing features in Microsoft Cloud App Security](https://docs.microsoft.com/azure/cloud-app-security/investigate-risky-oauth).
41+
* Use additional [OAuth application auditing features in Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/investigate-risky-oauth).
4242
* Use [Azure Monitor Workbooks to monitor permissions and consent](../reports-monitoring/howto-use-azure-monitor-workbooks.md) related activity. The *Consent Insights* workbook provides a view of apps by number of failed consent requests. This can be helpful to prioritize applications for administrators to review and decide whether to grant them admin consent.
4343

4444
### Additional considerations for reducing friction

articles/active-directory/saas-apps/figma-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9292
`https://www.figma.com/saml/<TENANT ID>/start`
9393

9494
> [!NOTE]
95-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. You will get the `TENANT ID` from step#11 of Figma`s article [Configure Azure Active Directory SAML SSO process](https://help.figma.com/article/243-configure-azure-active-directory-saml-sso).
95+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. You will get the `TENANT ID` from step#11 of Figma`s article [Configure Azure Active Directory SAML SSO process](https://help.figma.com/hc/en-us/articles/360040532413-Configure-and-Provision-SAML-SSO-with-Azure-Active-Directory).
9696

9797
1. Figma application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9898

@@ -146,7 +146,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
146146

147147
## Configure Figma SSO
148148

149-
To configure single sign-on on Figma side, you need to follow the Figma`s article [Configure Azure Active Directory SAML SSO process](https://help.figma.com/article/243-configure-azure-active-directory-saml-sso).
149+
To configure single sign-on on Figma side, you need to follow the Figma`s article [Configure Azure Active Directory SAML SSO process](https://help.figma.com/hc/en-us/articles/360040532413-Configure-and-Provision-SAML-SSO-with-Azure-Active-Directory).
150150

151151
### Create Figma test user
152152

articles/active-directory/saas-apps/mcm-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ To configure Azure AD single sign-on with MCM, perform the following steps:
108108
`https://myaba.co.uk/<companyname>`
109109

110110
> [!NOTE]
111-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [MCM Client support team](https://mcmtechnology.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
111+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [MCM Client support team](https://mcmtechnology.com/support) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
112112

113113
4. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
114114

@@ -126,7 +126,7 @@ To configure Azure AD single sign-on with MCM, perform the following steps:
126126

127127
### Configure MCM Single Sign-On
128128

129-
To configure single sign-on on **MCM** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [MCM support team](https://mcmtechnology.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
129+
To configure single sign-on on **MCM** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [MCM support team](https://mcmtechnology.com/support). They set this setting to have the SAML SSO connection set properly on both sides.
130130

131131
### Create an Azure AD test user
132132

@@ -181,7 +181,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
181181

182182
### Create MCM test user
183183

184-
In this section, you create a user called Britta Simon in MCM. Work with [MCM support team](https://mcmtechnology.com/support/) to add the users in the MCM platform. Users must be created and activated before you use single sign-on.
184+
In this section, you create a user called Britta Simon in MCM. Work with [MCM support team](https://mcmtechnology.com/support) to add the users in the MCM platform. Users must be created and activated before you use single sign-on.
185185

186186
>[!NOTE]
187187
>You can use any other MCM user account creation tools or APIs provided by MCM to provision Azure AD user accounts.

articles/active-directory/user-help/my-account-portal-devices-page.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ After viewing your connected devices, you can:
7777

7878
- [Sign in to manage your Office product](https://support.office.com/article/sign-in-to-manage-your-office-product-959ac957-8d37-4ae4-b1b6-d6e4874e013f)
7979

80-
- [Go to the Office **My Account** page](https://portal.office.com/account/#home)
80+
- [Go to the Office **My Account** page](https://portal.office.com/account/)
8181

8282
- [Go to the Office **My installs** page](https://portal.office.com/account/#installs)
8383

articles/active-directory/user-help/my-account-portal-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ You can get to the **My Account** portal (https://myprofile.microsoft.com), from
4848

4949
- [Sign in to manage your Office product](https://support.office.com/article/sign-in-to-manage-your-office-product-959ac957-8d37-4ae4-b1b6-d6e4874e013f)
5050

51-
- [Go to the Office **My Account** page](https://portal.office.com/account/#home)
51+
- [Go to the Office **My Account** page](https://portal.office.com/account/)
5252

5353
- [Go to the Office **My installs** page](https://portal.office.com/account/#installs)
5454

articles/aks/azure-disk-customer-managed-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -187,4 +187,4 @@ Review [best practices for AKS cluster security][best-practices-security]
187187
[byok-azure-portal]: /azure/storage/common/storage-encryption-keys-portal
188188
[customer-managed-keys]: /azure/virtual-machines/windows/disk-encryption#customer-managed-keys
189189
[key-vault-generate]: /azure/key-vault/key-vault-manage-with-cli2
190-
[supported-regions]: /azure/virtual-machines/windows/disk-encryption#supported-scenarios-and-restrictions
190+
[supported-regions]: /azure/virtual-machines/windows/disk-encryption#supported-regions

articles/app-service/containers/quickstart-java.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -97,10 +97,10 @@ Navigate to `pom.xml` again to see the plugin configuration is updated, You can
9797
`<schemaVersion>` | false | Specify the version of the configuration schema. Supported values are: `v1`, `v2`. | 1.5.2
9898
`<resourceGroup>` | true | Azure Resource Group for your Web App. | 0.1.0+
9999
`<appName>` | true | The name of your Web App. | 0.1.0+
100-
[`<region>`](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme#region) | true | Specifies the region where your Web App will be hosted; the default value is **westeurope**. All valid regions at [Supported Regions](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme#region) section. | 0.1.0+
101-
[`<pricingTier>`](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme##pricingtier) | false | The pricing tier for your Web App. The default value is **P1V2**.| 0.1.0+
102-
[`<runtime>`](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme#runtimesetting) | true | The runtime environment configuration, you could see the detail [here](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme#runtimesetting). | 0.1.0+
103-
[`<deployment>`](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme#deploymentsetting) | true | The deployment configuration, you could see the details [here](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme#deploymentsetting). | 0.1.0+
100+
`<region>` | true | Specifies the region where your Web App will be hosted; the default value is **westeurope**. All valid regions at [Supported Regions](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme) section. | 0.1.0+
101+
`<pricingTier>` | false | The pricing tier for your Web App. The default value is **P1V2**.| 0.1.0+
102+
`<runtime>` | true | The runtime environment configuration, you could see the detail [here](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme). | 0.1.0+
103+
`<deployment>` | true | The deployment configuration, you could see the details [here](/java/api/overview/azure/maven/azure-webapp-maven-plugin/readme). | 0.1.0+
104104

105105
> [!div class="nextstepaction"]
106106
> [I ran into an issue](https://www.research.net/r/javae2e?tutorial=app-service-linux-quickstart&step=config)

0 commit comments

Comments
 (0)