Skip to content

Commit 7e53713

Browse files
authored
Merge pull request #225988 from MicrosoftDocs/main
2/01 PM Publish
2 parents db6cd44 + e61c659 commit 7e53713

File tree

142 files changed

+2339
-5477
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

142 files changed

+2339
-5477
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3867,6 +3867,21 @@
38673867
"redirect_url": "/azure/azure-monitor/alerts/alerts-metric-create-templates",
38683868
"redirect_document_id": false
38693869
},
3870+
{
3871+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric-create-templates.md",
3872+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
3873+
"redirect_document_id": false
3874+
},
3875+
{
3876+
"source_path_from_root": "/articles/azure-monitor/alerts/action-groups-create-resource-manager-template.md",
3877+
"redirect_url": "/azure/azure-monitor/alerts/action-groups",
3878+
"redirect_document_id": false
3879+
},
3880+
{
3881+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-log-create-templates.md",
3882+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
3883+
"redirect_document_id": false
3884+
},
38703885
{
38713886
"source_path_from_root": "/articles/azure-monitor/platform/alerts-metric-logs.md",
38723887
"redirect_url": "/azure/azure-monitor/alerts/alerts-metric-logs",

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ This article discusses known issues to be aware of when you work with app provis
4141

4242
An external user from the source (home) tenant can't be provisioned into another tenant. Internal guest users from the source tenant can't be provisioned into another tenant. Only internal member users from the source tenant can be provisioned into the target tenant. For more information, see [Properties of an Azure Active Directory B2B collaboration user](../external-identities/user-properties.md).
4343

44+
In addition, users that are enabled for SMS sign-in cannot be synchronized through cross-tenant synchronization.
45+
4446
### Provisioning manager attributes
4547

4648
Provisioning manager attributes isn't supported.

articles/active-directory/authentication/howto-sspr-customization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 02/01/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -58,7 +58,7 @@ If your organization doesn't want to notify administrators about password reset
5858

5959
## Customize the sign-in page and access panel
6060

61-
You can customize the sign-in page, such as to add a logo that appears along with the image that fits your company branding. For more information on how to configure company branding, see [Add company branding to your sign-in page in Azure AD](../fundamentals/customize-branding.md).
61+
You can customize the sign-in page, such as to add a logo that appears along with the image that fits your company branding. For more information on how to configure company branding, see [Add company branding to your sign-in page in Azure AD](../fundamentals/how-to-customize-branding.md).
6262

6363
The graphics you choose are shown in the following circumstances:
6464

articles/active-directory/fundamentals/8-secure-access-sensitivity-labels.md

Lines changed: 73 additions & 86 deletions
Large diffs are not rendered by default.

articles/active-directory/fundamentals/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,8 @@ items:
8787
items:
8888
- name: What's new in Azure Active Directory
8989
href: whats-new.md
90+
- name: What's deprecated in Azure Active Directory?
91+
href: whats-deprecated-azure-ad.md
9092
- name: What's new in sovereign clouds?
9193
href: whats-new-sovereign-clouds.md
9294
- name: Archive for What's new? in Azure AD
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
---
2+
title: What's deprecated in Azure Active Directory?
3+
description: Learn about features being deprecated in Azure Active Directory
4+
author: jricketts
5+
manager: martinco
6+
ms.service: active-directory
7+
ms.subservice: fundamentals
8+
ms.workload: identity
9+
ms.topic: conceptual
10+
ms.date: 01/27/2023
11+
ms.author: jricketts
12+
ms.reviewer: ramical
13+
ms.custom: it-pro
14+
15+
---
16+
17+
# What's deprecated in Azure Active Directory?
18+
19+
The lifecycle of functionality, features, and services are governed by policy, support timelines, data, also leadership and engineering team decisions. Lifecycle information allows customers to predictably plan long-term deployment aspects, transition from outdated to new technology, and help improve business outcomes. Use the definitions below to understand the following table with change information about Azure Active Directory (Azure AD) features, services, and functionality.
20+
21+
Get notified about when to revisit this page for updates by copying and pasting this URL: `https://learn.microsoft.com/api/search/rss?search=%22What's+deprecated+in+Azure+Active+Directory%22&locale=en-us` into your ![RSS feed reader icon](./media/whats-new/feed-icon-16x16.png) feed reader.
22+
23+
## Upcoming changes
24+
25+
Use the following table to learn about changes including deprecations, retirements, breaking changes and rebranding. Also find key dates and recommendations.
26+
27+
> [!NOTE]
28+
> Dates and times are United States Pacific Standard Time, and are subject to change.
29+
30+
|Functionality, feature, or service|Change|New tenant change date |Current tenant change date|
31+
|---|---|---|---|
32+
|[Azure AD Graph API](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Deprecation|Jun 30, 2022|Jun 30, 2022|
33+
|Microsoft Authenticator app [Number matching](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/defend-your-users-from-mfa-fatigue-attacks/ba-p/2365677)|Feature change|Feb 27, 2023|Feb 27, 2023|
34+
|Azure AD DS [virtual network deployments](../../active-directory-domain-services/migrate-from-classic-vnet.md)|Retirement|Mar 1, 2023|Mar 1, 2023|
35+
|[License management API, PowerShell](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/migrate-your-apps-to-access-the-license-managements-apis-from/ba-p/2464366)|Retirement|Nov 1, 2022|Mar 31, 2023|
36+
|[Azure AD Authentication Library (ADAL)](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Jun 2023|Jun 2023|
37+
|[Azure AD PowerShell](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Jun 30, 2023|Jun 30, 2023|
38+
|[Azure AD MFA Server](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454)|Retirement|Sep 30, 2024|Sep 30, 2024|
39+
40+
41+
> [!IMPORTANT]
42+
> Later versions of functionality, features, and services might not meet current security requirements. Microsoft may be unable to provide security updates for older products.
43+
44+
See the following two sections for definitions of categories, change state, etc.
45+
46+
## Deprecation, retirement, breaking change, feature change, and rebranding
47+
48+
Use the definitions in this section help clarify the state, availability, and support of features, services, and functionality.
49+
50+
|Category|Definition|Communication schedule|
51+
|---|---|---|
52+
|Deprecation|The state of a feature, functionality, or service no longer in active development. A deprecated feature might be retired and removed from future releases.|2 times per year: March and September|
53+
|Retirement|Signals retirement in a specified period. Customers can’t adopt the service or feature, and engineering investments are reduced. Later, the feature reaches end-of-life and is unavailable to any customer.|2 times per year: March and September|
54+
|Breaking change|A change that might break the customer or partner experience if action isn’t taken, or a change made, for continued operation.|4 times per year: March, June, September, and December|
55+
|Feature change|Change to an IDNA feature that requires no customer action, but is noticeable to them. Typically, these changes are in the user interface/user experperience (UI/UX).|4 times per year: March, June, September, and December|
56+
|Rebranding|A new name, term, symbol, design, concept or combination thereof for an established brand to develop a differentiated experience.|As scheduled or announced|
57+
58+
### Terminology
59+
60+
* **End-of-life** - engineering investments have ended, and the feature is unavailable to any customer
61+
* **Current tenant change date** - the change date goes into effect for tenants created before the new tenant change date
62+
* **New tenant change date** - the change date goes into effect for tenants created after the change date
63+
64+
## Next steps
65+
[What's new in Azure Active Directory?](../../active-directory/fundamentals/whats-new.md)
66+
67+
## Resources
68+
* [Microsoft Entra Change Announcement blog](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-november-2022-train/ba-p/2967452)
69+
* Devices: [End-of-life management and recycling](https://www.microsoft.com/legal/compliance/recycling)

articles/active-directory/managed-identities-azure-resources/known-issues.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,18 @@ Workaround for managed identities in a subscription that has been moved to anoth
5555

5656
For more information, see [Transfer an Azure subscription to a different Azure AD directory](../../role-based-access-control/transfer-subscription.md).
5757

58+
## Error during managed identity assignment operations
59+
In rare cases, you may see error messages indicating errors related to assignment of managed identities with Azure resources. Some of the example error messages are as follows:
60+
- Azure resource ‘azure-resource-id' does not have access to identity 'managed-identity-id'.
61+
- No managed service identities are associated with resource ‘azure-resource-id'
62+
- Managed service identities referenced with URL 'https://control-....virtualMachineScaleSets/<vmss_name>/credentials/v2/systemassigned' are not valid. Ensure all assigned identities associated with the resource are valid.
63+
64+
**Workaround**
65+
In these rare cases the best next steps are
66+
67+
1. For identities no longer needed to be assigned to the resource, remove them from the resource.
68+
2. For User Assigned Managed Identity, reassign the identity to the Azure resource.
69+
3. For System Assigned Managed Identity, disable the identity and enable it again.
5870

5971
## Next steps
6072

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure-graph.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: multi-tenant-organizations
1010
ms.topic: how-to
11-
ms.date: 01/31/2023
11+
ms.date: 02/01/2023
1212
ms.author: rolyon
1313
ms.custom: it-pro
1414

@@ -21,7 +21,7 @@ ms.custom: it-pro
2121
> Cross-tenant synchronization is currently in PREVIEW.
2222
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
2323
24-
This article describes the keys steps to configure cross-tenant synchronization using Microsoft Graph API. When configured, Azure AD automatically provisions and de-provisions B2B users in your target tenant. For detailed steps using the Azure portal, see [Configure cross-tenant synchronization](cross-tenant-synchronization-configure.md).
24+
This article describes the key steps to configure cross-tenant synchronization using Microsoft Graph API. When configured, Azure AD automatically provisions and de-provisions B2B users in your target tenant. For detailed steps using the Azure portal, see [Configure cross-tenant synchronization](cross-tenant-synchronization-configure.md).
2525

2626
:::image type="content" source="./media/common/configure-diagram.png" alt-text="Diagram that shows cross-tenant synchronization between source tenant and target tenant." lightbox="./media/common/configure-diagram.png":::
2727

@@ -158,7 +158,7 @@ These steps describe how to use Microsoft Graph Explorer (recommended), but you
158158
Content-Type: application/json
159159
160160
{
161-
"tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14",
161+
"tenantId": "376a1f89-b02f-4a85-8252-2974d1984d14"
162162
}
163163
```
164164

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: multi-tenant-organizations
1010
ms.topic: how-to
11-
ms.date: 01/23/2023
11+
ms.date: 02/01/2023
1212
ms.author: rolyon
1313
ms.custom: it-pro
1414

@@ -82,7 +82,7 @@ By the end of this article, you'll be able to:
8282

8383
In this step, you automatically redeem invitations so users from the source tenant don't have to accept the consent prompt. This setting must be checked in both the source tenant (outbound) and target tenant (inbound). For more information, see [Automatic redemption setting](cross-tenant-synchronization-overview.md#automatic-redemption-setting).
8484

85-
1. Select the **Trust settings** tab.
85+
1. In the target tenant, on the same **Inbound access settings** page, select the **Trust settings** tab.
8686

8787
1. Check the **Suppress consent prompts for users from the other tenant when they access apps and resources in my tenant** check box.
8888

@@ -96,7 +96,7 @@ In this step, you automatically redeem invitations so users from the source tena
9696

9797
In this step, you automatically redeem invitations in the source tenant.
9898

99-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator of the target tenant.
99+
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator of the source tenant.
100100

101101
1. Select **Azure Active Directory** > **External Identities**.
102102

@@ -122,7 +122,7 @@ In this step, you automatically redeem invitations in the source tenant.
122122

123123
![Icon for the source tenant.](./media/common/icon-tenant-source.png)<br/>**Source tenant**
124124

125-
1. Select **Azure Active Directory** > **Cross-tenant synchronization (Preview)**.
125+
1. In the source tenant, select **Azure Active Directory** > **Cross-tenant synchronization (Preview)**.
126126

127127
:::image type="content" source="./media/cross-tenant-synchronization-configure/azure-ad-overview.png" alt-text="Screenshot that shows the Azure Active Directory Overview page." lightbox="./media/cross-tenant-synchronization-configure/azure-ad-overview.png":::
128128

@@ -140,7 +140,7 @@ In this step, you automatically redeem invitations in the source tenant.
140140

141141
![Icon for the source tenant.](./media/common/icon-tenant-source.png)<br/>**Source tenant**
142142

143-
1. In the configuration list, select your configuration.
143+
1. In the source tenant, in the configuration list, select your configuration.
144144

145145
:::image type="content" source="./media/cross-tenant-synchronization-configure/configuration-select.png" alt-text="Screenshot that shows the Cross-tenant synchronization Configurations page and a new configuration." lightbox="./media/cross-tenant-synchronization-configure/configuration-select.png":::
146146

@@ -177,7 +177,7 @@ The Azure AD provisioning service allows you to define who will be provisioned i
177177

178178
Start small. Test with a small set of users before rolling out to everyone. When the scope for provisioning is set to assigned users and groups, you can control it by assigning one or two users to the configuration. You can further refine who is in scope for provisioning by creating attribute-based scoping filters, described in the [next step](#step-8-optional-define-who-is-in-scope-for-provisioning-with-scoping-filters).
179179

180-
1. Select **Provisioning** and expand the **Settings** section.
180+
1. In the source tenant, select **Provisioning** and expand the **Settings** section.
181181

182182
:::image type="content" source="./media/cross-tenant-synchronization-configure/provisioning-settings-edit.png" alt-text="Screenshot of the Provisioning page that shows the Settings section with the Scope and Provisioning Status options." lightbox="./media/cross-tenant-synchronization-configure/provisioning-settings-edit.png":::
183183

@@ -214,7 +214,7 @@ Start small. Test with a small set of users before rolling out to everyone. When
214214

215215
Regardless of the value you selected for **Scope** in the previous step, you can further limit which users are synchronized by creating attribute-based scoping filters.
216216

217-
1. Select **Provisioning** and expand the **Mappings** section.
217+
1. In the source tenant, select **Provisioning** and expand the **Mappings** section.
218218

219219
1. Select **Provision Azure Active Directory Users**.
220220

@@ -244,7 +244,7 @@ Regardless of the value you selected for **Scope** in the previous step, you can
244244

245245
Attribute mappings allow you to define how data should flow between the source tenant and target tenant. For information on how to customize the default attribute mappings, see [Tutorial - Customize user provisioning attribute-mappings for SaaS applications in Azure Active Directory](../app-provisioning/customize-application-attributes.md).
246246

247-
1. Select **Provisioning** and expand the **Mappings** section.
247+
1. In the source tenant, select **Provisioning** and expand the **Mappings** section.
248248

249249
1. Select **Provision Azure Active Directory Users**.
250250

@@ -296,7 +296,7 @@ Attribute mappings allow you to define how data should flow between the source t
296296

297297
![Icon for the source tenant.](./media/common/icon-tenant-source.png)<br/>**Source tenant**
298298

299-
1. Select **Provisioning** and expand the **Settings** section.
299+
1. In the source tenant, select **Provisioning** and expand the **Settings** section.
300300

301301
:::image type="content" source="./media/cross-tenant-synchronization-configure/provisioning-settings-edit.png" alt-text="Screenshot of the Provisioning page that shows the Settings section with the Scope and Provisioning Status options." lightbox="./media/cross-tenant-synchronization-configure/provisioning-settings-edit.png":::
302302

articles/active-directory/privileged-identity-management/pim-email-notifications.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,9 +59,9 @@ Who receives these emails for Azure AD roles depends on your role, the event, an
5959

6060
| User | Role activation is pending approval | Role activation request is completed | PIM is enabled |
6161
| --- | --- | --- | --- |
62-
| Privileged Role Administrator</br>(Activated/Eligible) | Yes</br>(only if no explicit approvers are specified) | Yes* | Yes |
63-
| Security Administrator</br>(Activated/Eligible) | No | Yes* | Yes |
64-
| Global Administrator</br>(Activated/Eligible) | No | Yes* | Yes |
62+
| Privileged Role Administrator</br>(Activated) | Yes</br>(only if no explicit approvers are specified) | Yes* | Yes |
63+
| Security Administrator</br>(Activated) | No | Yes* | Yes |
64+
| Global Administrator</br>(Activated) | No | Yes* | Yes |
6565

6666
\* If the [**Notifications** setting](pim-how-to-change-default-settings.md) is set to **Enable**.
6767

0 commit comments

Comments
 (0)