Skip to content

Commit 7f52c8f

Browse files
authored
Merge pull request #238 from MicrosoftDocs/master
rmerge
2 parents 18b2690 + dc41660 commit 7f52c8f

File tree

257 files changed

+4086
-1697
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

257 files changed

+4086
-1697
lines changed

CODEOWNERS

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,9 @@ articles/security/benchmarks/ @msmbaldwin @mgblythe
4242

4343
articles/ddos-protection @aletheatoh @anupamvi
4444

45+
# Lighthouse
46+
articles/lighthouse/ @JnHs
47+
4548
# Configuration
4649
*.json @SyntaxC4 @snoviking @martinekuan
4750
.acrolinx-config.edn @MonicaRush @martinekuan

articles/active-directory-b2c/service-limits.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ The following table lists the administrative configuration limits in the Azure A
3535

3636
|Category |Limit |
3737
|---------|---------|
38-
|Number of applications per Azure AD B2C tenant |250 |
3938
|Number of scopes per application  |1000 |
4039
|Number of [custom attributes](user-profile-attributes.md#extension-attributes) per user <sup>1</sup> |100 |
4140
|Number of redirect URLs per application |100 |

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To request an automatic Azure AD provisioning connector for an app that doesn't
3838

3939
## Authorization
4040

41-
Credentials are required for Azure AD to connect to the application's user management API. While you're configuring automatic user provisioning for an application, you'll need to enter valid credentials. For gallery applications, you can find credential types and requirements for the application by referring to the app tutorial. For non-gallery applications, you can refer to the [SCIM](./use-scim-to-provision-users-and-groups.md#authorization-for-provisioning-connectors-in-the-application-gallery) documentation to understand the credential types and requirements. In the Azure portal, you'll be able to test the credentials by having Azure AD attempt to connect to the app's provisioning app using the supplied credentials.
41+
Credentials are required for Azure AD to connect to the application's user management API. While you're configuring automatic user provisioning for an application, you'll need to enter valid credentials. For gallery applications, you can find credential types and requirements for the application by referring to the app tutorial. For non-gallery applications, you can refer to the [SCIM](./use-scim-to-provision-users-and-groups.md#authorization-to-provisioning-connectors-in-the-application-gallery) documentation to understand the credential types and requirements. In the Azure portal, you'll be able to test the credentials by having Azure AD attempt to connect to the app's provisioning app using the supplied credentials.
4242

4343
## Mapping attributes
4444

@@ -213,4 +213,4 @@ When developing an application, always support both soft deletes and hard delete
213213

214214
[Build a SCIM endpoint and configure provisioning when creating your own app](../app-provisioning/use-scim-to-provision-users-and-groups.md)
215215

216-
[Troubleshoot problems with configuring and provisioning users to an application](./application-provisioning-config-problem.md).
216+
[Troubleshoot problems with configuring and provisioning users to an application](./application-provisioning-config-problem.md).

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 281 additions & 231 deletions
Large diffs are not rendered by default.

articles/active-directory/develop/tutorial-blazor-webassembly.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Next, add the following to your project's *.csproj* file in the netstandard2.1 *
9999

100100
Then modify the code as specified in the next few steps. These changes will add [access tokens](access-tokens.md) to the outgoing requests sent to the Microsoft Graph API. This pattern is discussed in more detail in [ASP.NET Core Blazor WebAssembly additional security scenarios](/aspnet/core/blazor/security/webassembly/additional-scenarios).
101101

102-
First, create a new file named *GraphAuthorizationMessageHandler.cs* with the following code. This handler will be user to add an access token for the `User.Read` and `Mail.Read` scopes to outgoing requests to the Microsoft Graph API.
102+
First, create a new file named *GraphAPIAuthorizationMessageHandler.cs* with the following code. This handler will be user to add an access token for the `User.Read` and `Mail.Read` scopes to outgoing requests to the Microsoft Graph API.
103103

104104
```csharp
105105
using Microsoft.AspNetCore.Components;
@@ -243,4 +243,4 @@ After granting consent, navigate to the "Fetch data" page to read some email.
243243
## Next steps
244244

245245
> [!div class="nextstepaction"]
246-
> [Microsoft identity platform best practices and recommendations](./identity-platform-integration-checklist.md)
246+
> [Microsoft identity platform best practices and recommendations](./identity-platform-integration-checklist.md)

articles/active-directory/develop/v2-howto-app-gallery-listing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ You will need an Azure AD tenant in order to test your app. To set up your devel
181181

182182
Alternatively, an Azure AD tenant comes with every Microsoft 365 subscription. To set up a free Microsoft 365 development environment, see [Join the Microsoft 365 Developer Program](/office/developer-program/microsoft-365-developer-program).
183183

184-
Once you have a tenant, test single-sign on and [provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md#step-4-integrate-your-scim-endpoint-with-the-azure-ad-scim-client).
184+
Once you have a tenant, test single-sign on and [provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md#integrate-your-scim-endpoint-with-the-aad-scim-client).
185185

186186
**For OIDC or Oath applications**, [Register your application](quickstart-register-app.md) as a multi-tenant application. ‎Select the Accounts in any organizational directory and personal Microsoft accounts option in Supported Account types.
187187

@@ -314,4 +314,4 @@ The Microsoft Partner Network provides instant access to exclusive resources, pr
314314

315315
## Next steps
316316
* [Build a SCIM endpoint and configure user provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md)
317-
* [Authentication scenarios for Azure AD](authentication-flows-app-scenarios.md)
317+
* [Authentication scenarios for Azure AD](authentication-flows-app-scenarios.md)

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
4444

4545
In the past, the secret token field could be kept empty when setting up provisioning on the custom / BYOA application. This function was intended to solely be used for testing. We'll update the UI to make the field required.
4646

47-
Customers can work around this requirement for testing purposes by using a feature flag in the browser URL. [Learn more](../app-provisioning/use-scim-to-provision-users-and-groups.md#authorization-for-provisioning-connectors-in-the-application-gallery).
47+
Customers can work around this requirement for testing purposes by using a feature flag in the browser URL. [Learn more](../app-provisioning/use-scim-to-provision-users-and-groups.md#authorization-to-provisioning-connectors-in-the-application-gallery).
4848

4949
---
5050

articles/active-directory/governance/complete-access-review.md

Lines changed: 23 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: how-to
1414
ms.subservice: compliance
15-
ms.date: 12/07/2020
15+
ms.date: 02/08/2021
1616
ms.author: ajburnle
1717
ms.reviewer: mwahl
1818
ms.collection: M365-identity-device-management
@@ -43,35 +43,47 @@ You can track the progress as the reviewers complete their reviews.
4343

4444
To view future instances of an access reviews, navigate to the access review, and select Scheduled reviews.
4545

46-
On the **Overview** page, you can see the progress. No access rights are changed in the directory until the review is completed.
46+
On the **Overview** page, you can see the progress of the current instance. No access rights are changed in the directory until the review is completed.
4747

48-
![Access reviews progress](./media/complete-access-review/overview-progress.png)
49-
50-
If you are viewing an access review that reviews guest access across Microsoft 365 groups (Preview), the Overview blade lists each group in the review.
48+
![Review of All company group](./media/complete-access-review/all-company-group.png)
5149

52-
![review guest access across Microsoft 365 groups](./media/complete-access-review/review-guest-access-across-365-groups.png)
50+
All blades under Current are only viewable during the duration of each review instance.
5351

54-
Click on a group to see the progress of the review on that group.
52+
The Results page provides more information on each user under review in the instance, including the ability to Stop, Reset and Download results.
53+
54+
![Review guest access across Microsoft 365 groups](./media/complete-access-review/all-company-group-results.png)
55+
56+
57+
If you are viewing an access review that reviews guest access across Microsoft 365 groups (Preview), the Overview blade lists each group in the review.
58+
59+
![review guest access across Microsoft 365 groups](./media/complete-access-review/review-guest-access-across-365-groups.png)
60+
61+
Click on a group to see the progress of the review on that group, as well as to Stop, Reset, Apply and Delete.
5562

5663
![review guest access across Microsoft 365 groups in detail](./media/complete-access-review/progress-group-review.png)
5764

5865
1. If you want to stop an access review before it has reached the scheduled end date, click the **Stop** button.
5966

60-
When stop a review, reviewers will no longer be able to give responses. You can't restart a review after it's stopped.
67+
When you stop a review, reviewers will no longer be able to give responses. You can't restart a review after it's stopped.
6168

6269
1. If you're no longer interested in the access review, you can delete it by clicking the **Delete** button.
6370

6471
## Apply the changes
6572

66-
If **Auto apply results to resource** was enabled and based on your selections in **Upon completion settings**, auto-apply will be executed after the review's end date or when you manually stop the review.
73+
If **Auto apply results to resource** was enabled based on your selections in **Upon completion settings**, auto-apply will be executed after the review's end date or when you manually stop the review.
6774

68-
If **Auto apply results to resource** wasn't enabled for the review, click **Apply** to manually apply the changes. If a user's access was denied in the review, when you click **Apply**, Azure AD removes their membership or application assignment.
75+
If **Auto apply results to resource** wasn't enabled for the review, navigate to **Review History** under **Series** after the review duration ends or the review was stopped early, and click on the instance of the review you’d like to Apply.
6976

7077
![Apply access review changes](./media/complete-access-review/apply-changes.png)
7178

79+
Click **Apply** to manually apply the changes. If a user's access was denied in the review, when you click **Apply**, Azure AD removes their membership or application assignment.
80+
81+
![Apply access review changes button](./media/complete-access-review/apply-changes-button.png)
82+
83+
7284
The status of the review will change from **Completed** through intermediate states such as **Applying** and finally to state **Result applied**. You should expect to see denied users, if any, being removed from the group membership or application assignment in a few minutes.
7385

74-
A configured auto applying review, or selecting **Apply** doesn't have an effect on a group that originates in an on-premises directory or a dynamic group. If you want to change a group that originates on-premises, download the results and apply those changes to the representation of the group in that directory.
86+
Manually or automatically applying results doesn't have an effect on a group that originates in an on-premises directory or a dynamic group. If you want to change a group that originates on-premises, download the results and apply those changes to the representation of the group in that directory.
7587

7688
## Retrieve the results
7789

172 KB
Loading
109 KB
Loading

0 commit comments

Comments
 (0)