Skip to content

Commit 7f2a0c9

Browse files
committed
Merge branch 'main' into release-preview-mswb
2 parents fc830f5 + ad5590b commit 7f2a0c9

File tree

121 files changed

+1039
-669
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

121 files changed

+1039
-669
lines changed

articles/active-directory/develop/multi-service-web-app-authentication-app-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ You now have an app that's secured by the App Service authentication and authori
8080
8181
## Verify limited access to the web app
8282

83-
When you enabled the App Service authentication/authorization module, an app registration was created in your Azure AD tenant. The app registration has the same display name as your web app. To check the settings, select **Azure Active Directory** from the portal menu, and select **App registrations**. Select the app registration that was created. In the overview, verify that **Supported account types** is set to **My organization only**.
83+
When you enabled the App Service authentication/authorization module, an app registration was created in your Azure AD tenant. The app registration has the same display name as your web app. To check the settings, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer) and browse to **Identity** > **Applications** > **App registrations**. Select the app registration that was created. In the overview, verify that **Supported account types** is set to **My organization only**.
8484

8585
:::image type="content" alt-text="Screenshot that shows verifying access." source="./media/multi-service-web-app-authentication-app-service/verify-access.png":::
8686

articles/active-directory/develop/multi-service-web-app-clean-up-resources.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@ This command might take several minutes to run.
3838

3939
## Delete the app registration
4040

41-
From the portal menu, select **Azure Active Directory** > **App registrations**. Then select the application you created.
42-
:::image type="content" alt-text="Screenshot that shows selecting app registration." source="./media/multi-service-web-app-clean-up-resources/select-app-registration.png":::
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Developer](../roles/permissions-reference.md#application-developer).
42+
1. Browse to **Identity** > **Applications** > **App registrations**.
43+
1. Select the application you created.
44+
1. In the app registration overview, select **Delete**.
4345

44-
In the app registration overview, select **Delete**.
45-
:::image type="content" alt-text="Screenshot that shows deleting the app registration." source="./media/multi-service-web-app-clean-up-resources/delete-app-registration.png":::
4646

articles/active-directory/develop/quickstart-create-new-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,21 +47,21 @@ Many developers already have tenants through services or subscriptions that are
4747

4848
To check the tenant:
4949

50-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>. Use the account you'll use to manage your application.
50+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Tenant Creator](../roles/permissions-reference.md#tenant-creator).
5151
1. Check the upper-right corner. If you have a tenant, you'll automatically be signed in. You see the tenant name directly under your account name.
5252
* Hover over your account name to see your name, email address, directory or tenant ID (a GUID), and domain.
5353
* If your account is associated with multiple tenants, you can select your account name to open a menu where you can switch between tenants. Each tenant has its own tenant ID.
5454

5555
> [!TIP]
5656
> To find the tenant ID, you can:
5757
> * Hover over your account name to get the directory or tenant ID.
58-
> * Search and select **Azure Active Directory** > **Overview** > **Tenant ID** in the Azure portal.
58+
> * Select **Identity** > **Overview** and look for **Tenant ID**.
5959
6060
If you don't have a tenant associated with your account, you'll see a GUID under your account name. You won't be able to do actions like registering apps until you create an Azure AD tenant.
6161

6262
### Create a new Azure AD tenant
6363

64-
If you don't already have an Azure AD tenant or if you want to create a new one for development, see [Create a new tenant in Azure AD](../fundamentals/create-new-tenant.md) or use the [directory creation experience](https://portal.azure.com/#create/Microsoft.AzureActiveDirectory) in the Azure portal. If you want to create a tenant for app testing, see [build a test environment](test-setup-environment.md).
64+
If you don't already have an Azure AD tenant or if you want to create a new one for development, see [Create a new tenant in Azure AD](../fundamentals/create-new-tenant.md). If you want to create a tenant for app testing, see [build a test environment](test-setup-environment.md).
6565

6666
You'll provide the following information to create your new tenant:
6767

articles/active-directory/governance/apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Microsoft Entra identity governance can be integrated with many other applicatio
6767
| [Atmos](../../active-directory/saas-apps/atmos-provisioning-tutorial.md) || |
6868
| [AuditBoard](../../active-directory/saas-apps/auditboard-provisioning-tutorial.md) || |
6969
| [Autodesk SSO](../../active-directory/saas-apps/autodesk-sso-provisioning-tutorial.md) |||
70-
| [Azure Databricks SCIM Connector](https://learn.microsoft.com/azure/databricks/administration-guide/users-groups/scim/aad) || |
70+
| [Azure Databricks SCIM Connector](/azure/databricks/administration-guide/users-groups/scim/aad) || |
7171
| [AWS IAM Identity Center](../../active-directory/saas-apps/aws-single-sign-on-provisioning-tutorial.md) |||
7272
| [BambooHR](../../active-directory/saas-apps/bamboo-hr-tutorial.md) | ||
7373
| [BenQ IAM](../../active-directory/saas-apps/benq-iam-provisioning-tutorial.md) |||

articles/active-directory/governance/create-access-review.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
Access to groups and applications for employees and guests changes over time. To reduce the risk associated with stale access assignments, administrators can use Azure Active Directory (Azure AD) to create access reviews for group members or application access.
2222

23-
Microsoft 365 and Security group owners can also use Azure AD to create access reviews for group members as long as the Global or User administrator enables the setting via the **Access Reviews Settings** pane. For more information about these scenarios, see [Manage access reviews](manage-access-review.md).
23+
Microsoft 365 and Security group owners can also use Azure AD to create access reviews for group members as long as the Global or Identity Governance Administrator enables the setting via the **Access Reviews Settings** pane. For more information about these scenarios, see [Manage access reviews](manage-access-review.md).
2424

2525
Watch a short video that talks about enabling access reviews.
2626

@@ -32,7 +32,7 @@ This article describes how to create one or more access reviews for group member
3232

3333
- Microsoft Azure AD Premium P2 or Microsoft Entra ID Governance licenses.
3434
- Creating a review on inactive users and with [user-to-group affiliation](review-recommendations-access-reviews.md#user-to-group-affiliation) recommendations requires a Microsoft Entra ID Governance license.
35-
- Global administrator, User administrator, or Identity Governance administrator to create reviews on groups or applications.
35+
- Global administrator or Identity Governance administrator to create reviews on groups or applications.
3636
- Global administrators and Privileged Role administrators can create reviews on role-assignable groups. For more information, see [Use Azure AD groups to manage role assignments](../roles/groups-concept.md).
3737
- Microsoft 365 and Security group owner.
3838

@@ -267,7 +267,7 @@ Use the following instructions to create an access review on a team with shared
267267

268268
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
269269

270-
The prerequisite role is a Global or User administrator.
270+
The prerequisite role is a Global or Identity Governance Administrator.
271271

272272
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
273273

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ For a demonstration of how to add a multi-stage approval to a request policy, wa
5252

5353
Follow these steps to specify the approval settings for requests for the access package through a policy:
5454

55-
**Prerequisite role:** Global administrator, Identity Governance Administrator, User Administrator, Catalog owner, or Access package manager
55+
**Prerequisite role:** Global administrator, Identity Governance Administrator, Catalog owner, or Access package manager
5656

5757
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
5858

articles/active-directory/governance/entitlement-management-access-package-assignments.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To use entitlement management and assign users to access packages, you must have
3737

3838
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3939

40-
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
40+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
4141

4242
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
4343

@@ -78,7 +78,7 @@ $assignments | ft Id,state,{$_.Target.id},{$_.Target.displayName}
7878

7979
In some cases, you might want to directly assign specific users to an access package so that users don't have to go through the process of requesting the access package. To directly assign users, the access package must have a policy that allows administrator direct assignments.
8080

81-
**Prerequisite role:** Global Administrator, User Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
81+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
8282

8383
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
8484

@@ -120,7 +120,7 @@ In some cases, you might want to directly assign specific users to an access pac
120120

121121
Entitlement management also allows you to directly assign external users to an access package to make collaborating with partners easier. To do this, the access package must have a policy that allows users not yet in your directory to request access.
122122

123-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
123+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
124124

125125
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
126126

@@ -204,7 +204,7 @@ $req = New-MgBetaEntitlementManagementAccessPackageAssignmentRequest -AccessPack
204204

205205
You can remove an assignment that a user or an administrator had previously requested.
206206

207-
**Prerequisite role:** Global administrator, User administrator, Catalog owner, Access package manager or Access package assignment manager
207+
**Prerequisite role:** Global Administrator, Identity Governance Administrator, Catalog owner, Access package manager or Access package assignment manager
208208

209209
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
210210

articles/active-directory/governance/entitlement-management-access-package-create.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Then once the access package is created, you can [change the hidden setting](ent
5454

5555
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
5656

57-
To complete the following steps, you need a role of global administrator, Identity Governance administrator, user administrator, catalog owner, or access package manager.
57+
To complete the following steps, you need a role of global Administrator, Identity Governance Administrator, catalog owner, or access package manager.
5858

5959
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
6060

@@ -72,11 +72,11 @@ On the **Basics** tab, you give the access package a name and specify which cata
7272

7373
1. In the **Catalog** dropdown list, select the catalog where you want to put the access package. For example, you might have a catalog owner who manages all the marketing resources that can be requested. In this case, you could select the marketing catalog.
7474

75-
You see only catalogs that you have permission to create access packages in. To create an access package in an existing catalog, you must be a global administrator, Identity Governance administrator, or user administrator. Or you must be a catalog owner or access package manager in that catalog.
75+
You see only catalogs that you have permission to create access packages in. To create an access package in an existing catalog, you must be a Global Administrator or Identity Governance Administrator. Or you must be a catalog owner or access package manager in that catalog.
7676

7777
![Screenshot that shows basic information for a new access package.](./media/entitlement-management-access-package-create/basics.png)
7878

79-
If you're a global administrator, an Identity Governance administrator, a user administrator, or catalog creator, and you want to create your access package in a new catalog that's not listed, select **Create new catalog**. Enter the catalog name and description, and then select **Create**.
79+
If you're a global Administrator, an Identity Governance Administrator, or catalog creator, and you want to create your access package in a new catalog that's not listed, select **Create new catalog**. Enter the catalog name and description, and then select **Create**.
8080

8181
The access package that you're creating, and any resources included in it, are added to the new catalog. Later, you can add more catalog owners or add attributes to the resources that you put in the catalog. To learn more about how to edit the attributes list for a specific catalog resource and the prerequisite roles, read [Add resource attributes in the catalog](entitlement-management-catalog-create.md#add-resource-attributes-in-the-catalog).
8282

@@ -94,11 +94,11 @@ If you're not sure which resource roles to include, you can skip adding them whi
9494

9595
![Screenshot that shows the panel for selecting applications for resource roles in a new access package.](./media/entitlement-management-access-package-create/resource-roles.png)
9696

97-
If you're creating the access package in the general catalog or a new catalog, you can choose any resource from the directory that you own. You must be at least a global administrator, a user administrator, or catalog creator.
97+
If you're creating the access package in the general catalog or a new catalog, you can choose any resource from the directory that you own. You must be at least a global administrator, an Identity Governance Administrator, or catalog creator.
9898

9999
If you're creating the access package in an existing catalog, you can select any resource that's already in the catalog without owning it.
100100

101-
If you're a global administrator, a user administrator, or catalog owner, you have the additional option of selecting resources that you own but that aren't yet in the catalog. If you select resources not currently in the selected catalog, these resources are also added to the catalog for other catalog administrators to build access packages with. To see all the resources that can be added to the catalog, select the **See all** checkbox at the top of the panel. If you want to select only resources that are currently in the selected catalog, leave the **See all** checkbox cleared (the default state).
101+
If you're a global administrator, an Identity Governance Administrator, or catalog owner, you have the additional option of selecting resources that you own but that aren't yet in the catalog. If you select resources not currently in the selected catalog, these resources are also added to the catalog for other catalog administrators to build access packages with. To see all the resources that can be added to the catalog, select the **See all** checkbox at the top of the panel. If you want to select only resources that are currently in the selected catalog, leave the **See all** checkbox cleared (the default state).
102102

103103
1. In the **Role** list, select the role that you want users to be assigned for the resource. For more information on selecting the appropriate roles for a resource, read [Add resource roles](entitlement-management-access-package-resources.md#add-resource-roles).
104104

0 commit comments

Comments
 (0)