Skip to content

Commit 8026b8a

Browse files
authored
Merge pull request #231825 from MicrosoftDocs/main
Publish to live, Thursday 4 AM PST, 3/23
2 parents c2cc5e4 + 9f35f9b commit 8026b8a

File tree

104 files changed

+2314
-1274
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

104 files changed

+2314
-1274
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,11 @@
4545
"redirect_url": "/azure/azure-monitor/app/app-insights-overview",
4646
"redirect_document_id": false
4747
},
48+
{
49+
"source_path_from_root": "/articles/azure-monitor/app/console.md",
50+
"redirect_url": "/previous-versions/azure/azure-monitor/app/console",
51+
"redirect_document_id": false
52+
},
4853
{
4954
"source_path_from_root": "/articles/azure-monitor/app/resource-manager-web-app.md",
5055
"redirect_url": "/previous-versions/azure/azure-monitor/app/resource-manager-web-app",

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2525
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2626

2727
## Deploying Azure AD provisioning agent
28-
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a seperate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or seperate hosts, again as long as each SCIM endpoint is reachable by the agent.
28+
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a separate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or separate hosts, again as long as each SCIM endpoint is reachable by the agent.
2929

3030
1. [Download](https://aka.ms/OnPremProvisioningAgent) the provisioning agent and copy it onto the virtual machine or server that your SCIM application endpoint is hosted on.
3131
2. Run the provisioning agent installer, agree to the terms of service, and select **Install**.

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/10/2023
9+
ms.date: 03/22/2023
1010

1111
ms.author: justinha
1212
author: justinha

articles/active-directory/authentication/how-to-authentication-methods-manage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: How to migrate to the Authentication methods policy (preview)
2+
title: How to migrate to the Authentication methods policy
33
description: Learn about how to centrally manage multifactor authentication (MFA) and self-service password reset (SSPR) settings in the Authentication methods policy.
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/07/2023
9+
ms.date: 03/22/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -18,7 +18,7 @@ ms.custom: contperf-fy20q4
1818

1919
# Customer intent: As an identity administrator, I want to understand what authentication options are available in Azure AD and how I can manage them.
2020
---
21-
# How to migrate MFA and SSPR policy settings to the Authentication methods policy for Azure AD (preview)
21+
# How to migrate MFA and SSPR policy settings to the Authentication methods policy for Azure AD
2222

2323
You can migrate Azure Active Directory (Azure AD) [legacy policy settings](concept-authentication-methods-manage.md#legacy-mfa-and-sspr-policies) that separately control multifactor authentication (MFA) and self-service password reset (SSPR) to unified management with the [Authentication methods policy](./concept-authentication-methods-manage.md).
2424

Loading
-119 KB
Loading

articles/active-directory/manage-apps/add-application-portal-assign-users.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,50 +8,51 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: quickstart
1010
ms.workload: identity
11-
ms.date: 03/24/2022
11+
ms.date: 03/23/2023
1212
ms.author: jomondi
1313
ms.reviewer: alamaral
14-
ms.custom: mode-other
14+
ms.custom: mode-other, enterprise-apps
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to assign a user to an enterprise application.
1616
---
1717

1818
# Quickstart: Create and assign a user account
1919

2020
In this quickstart, you use the Azure portal to create a user account in your Azure Active Directory (Azure AD) tenant. After you create the account, you can assign it to the enterprise application that you added to your tenant.
2121

22-
It is recommended that you use a non-production environment to test the steps in this quickstart.
22+
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
2323

2424
## Prerequisites
2525

2626
To create a user account and assign it to an enterprise application, you need:
2727

2828
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
29+
- One of the following roles: Global Administrator, or owner of the service principal.
3030
- Completion of the steps in [Quickstart: Add an enterprise application](add-application-portal.md).
3131

3232
## Create a user account
3333

3434
To create a user account in your Azure AD tenant:
3535

3636
1. Go to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
37-
1. Browse to **Azure Active Directory** > **Users**.
37+
1. Browse to **Azure Active Directory** and select **Users**.
3838
1. Select **New user** at the top of the pane.
3939

4040
:::image type="content" source="media/add-application-portal-assign-users/new-user.png" alt-text="Add a new user account to your Azure AD tenant.":::
4141

4242
1. In the **User name** field, enter the username of the user account. For example, `[email protected]`. Be sure to change `contoso.com` to the name of your tenant domain.
4343
1. In the **Name** field, enter the name of the user of the account. For example, `contosouser1`.
44-
1. Leave **Auto-generate password** selected, and then select **Show password**. Write down the value that's displayed in the Password box.
44+
1. Enter the details required for the user under the **Groups and roles**, **Settings**, and **Job info** sections.
4545
1. Select **Create**.
4646

4747
## Assign a user account to an enterprise application
4848

4949
To assign a user account to an enterprise application:
5050

51-
1. In the [Azure portal](https://portal.azure.com), browse to **Azure Active Directory** > **Enterprise applications**, and then search for and select the application to which you want to assign the user account. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
51+
1. In the [Azure portal](https://portal.azure.com), browse to **Azure Active Directory** and select **Enterprise applications**.
52+
1. Search for and select the application to which you want to assign the user account. For example, the application that you created in the previous quickstart named **Azure AD SAML Toolkit 1**.
5253
1. In the left pane, select **Users and groups**, and then select **Add user/group**.
5354

54-
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to zn application in your Azure AD tenant.":::
55+
:::image type="content" source="media/add-application-portal-assign-users/assign-user.png" alt-text="Assign user account to an application in your Azure AD tenant.":::
5556

5657
1. On the **Add Assignment** pane, select **None Selected** under **Users and groups**.
5758
1. Search for and select the user that you want to assign to the application. For example, `[email protected]`.
@@ -60,7 +61,7 @@ To assign a user account to an enterprise application:
6061

6162
## Clean up resources
6263

63-
If you are planning to complete the next quickstart, keep the application that you created. Otherwise, you can consider deleting it to clean up your tenant.
64+
If you're planning to complete the next quickstart, keep the application that you created. Otherwise, you can consider deleting it to clean up your tenant.
6465

6566
## Next steps
6667

articles/active-directory/manage-apps/add-application-portal.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,32 +8,32 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: quickstart
1010
ms.workload: identity
11-
ms.date: 03/24/2022
11+
ms.date: 03/22/2023
1212
ms.author: jomondi
1313
ms.reviewer: ergreenl
14-
ms.custom: mode-other
14+
ms.custom: mode-other, enterprise-apps
1515
#Customer intent: As an administrator of an Azure AD tenant, I want to add an enterprise application.
1616
---
1717

1818
# Quickstart: Add an enterprise application
1919

20-
In this quickstart, you use the Azure portal to add an enterprise application to your Azure Active Directory (Azure AD) tenant. Azure AD has a gallery that contains thousands of enterprise applications that have been pre-integrated. Many of the applications your organization uses are probably already in the gallery. This quickstart uses the application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most [enterprise applications in the gallery](../saas-apps/tutorial-list.md).
20+
In this quickstart, you use the Azure portal to add an enterprise application to your Azure Active Directory (Azure AD) tenant. Azure AD has a gallery that contains thousands of enterprise applications that have been preintegrated. Many of the applications your organization uses are probably already in the gallery. This quickstart uses the application named **Azure AD SAML Toolkit** as an example, but the concepts apply for most [enterprise applications in the gallery](../saas-apps/tutorial-list.md).
2121

22-
It is recommended that you use a non-production environment to test the steps in this quickstart.
22+
It's recommended that you use a nonproduction environment to test the steps in this quickstart.
2323

2424
## Prerequisites
2525

2626
To add an enterprise application to your Azure AD tenant, you need:
2727

2828
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
29-
- One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
29+
- One of the following roles: Global Administrator, or Application Administrator.
3030

3131
## Add an enterprise application
3232

3333
To add an enterprise application to your tenant:
3434

3535
1. Go to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
36-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
36+
1. Browse to **Azure Active Directory** and select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant.
3737
1. In the **Enterprise applications** pane, select **New application**.
3838
1. The **Browse Azure AD Gallery** pane opens and displays tiles for cloud platforms, on-premises applications, and featured applications. Applications listed in the **Featured applications** section have icons indicating whether they support federated single sign-on (SSO) and provisioning. Search for and select the application. In this quickstart, **Azure AD SAML Toolkit** is being used.
3939

@@ -46,7 +46,7 @@ If you choose to install an application that uses OpenID Connect based SSO, inst
4646

4747
## Clean up resources
4848

49-
If you are planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant. For more information, see [Delete an application](delete-application-portal.md).
49+
If you're planning to complete the next quickstart, keep the enterprise application that you created. Otherwise, you can consider deleting it to clean up your tenant. For more information, see [Delete an application](delete-application-portal.md).
5050

5151
## Next steps
5252

-14.2 KB
Loading
75.9 KB
Loading

0 commit comments

Comments
 (0)