Skip to content

Commit 83d18b4

Browse files
Merge branch 'MicrosoftDocs:main' into main
2 parents 0f7a869 + 20b7207 commit 83d18b4

File tree

637 files changed

+5534
-2785
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

637 files changed

+5534
-2785
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -505,6 +505,11 @@
505505
"source_path_from_root": "/articles/azure-monitor/app/cloudservices.md" ,
506506
"redirect_url": "/azure/azure-monitor/app/azure-web-apps-net-core",
507507
"redirect_document_id": false
508+
},
509+
{
510+
"source_path_from_root": "/articles/azure-monitor/logs/workspace-design-service-providers.md" ,
511+
"redirect_url": "/azure/azure-monitor/logs/workspace-design",
512+
"redirect_document_id": false
508513
}
509514
]
510515
}

articles/active-directory-b2c/extensions-app.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
3636
> [!NOTE]
3737
> An application can only be restored if it has been deleted within the last 30 days. If it has been more than 30 days, data will be permanently lost. For more assistance, file a support ticket.
3838
39+
<!--Hide portal steps until SP bug is fixed
3940
### Recover the extensions app using the Azure portal
4041
4142
1. Sign in to your Azure AD B2C tenant.
@@ -44,18 +45,18 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
4445
1. Select **Restore app registration**.
4546
4647
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
47-
48+
-->
4849
### Recover the extensions app using Microsoft Graph
49-
To restore the app using Microsoft Graph, you must restore both the application and the service principal.
50+
To restore the app using Microsoft Graph, you must restore both the application object and the service principal. For more information, see the [Restore deleted item](/graph/api/directory-deleteditems-restore) API.
5051

51-
To restore the application:
52+
To restore the application object:
5253
1. Browse to [https://developer.microsoft.com/en-us/graph/graph-explorer](https://developer.microsoft.com/en-us/graph/graph-explorer).
5354
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
5455
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.application?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
5556
1. Find the application in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
5657
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.]
5758

58-
To restore the service principal:
59+
To restore the service principal object:
5960
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.servicePrincipal`. This operation will list all of the service principals that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
6061
1. Find the service principal in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
6162
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 07/26/2022
4+
ms.date: 08/08/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 07/18/2022
9+
ms.date: 08/09/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -167,11 +167,11 @@ In some cases, an **All cloud apps** policy could inadvertently block user acces
167167

168168
- Calls to Azure AD Graph and MS Graph, to access user profile, group membership and relationship information that is commonly used by applications excluded from policy. The excluded scopes are listed below. Consent is still required for apps to use these permissions.
169169
- For native clients:
170-
- Azure AD Graph: User.read
171-
- MS Graph: User.read, People.read, and UserProfile.read
170+
- Azure AD Graph: User.Read
171+
- MS Graph: User.Read, People.Read, and UserProfile.Read
172172
- For confidential / authenticated clients:
173-
- Azure AD Graph: User.read, User.read.all, and User.readbasic.all
174-
- MS Graph: User.read,User.read.all, User.read.All People.read, People.read.all, GroupMember.Read.All, Member.Read.Hidden, and UserProfile.read
173+
- Azure AD Graph: User.Read, User.Read.All, and User.ReadBasic.All
174+
- MS Graph: User.Read, User.Read.All, User.ReadBasic.All, People.Read, People.Read.All, GroupMember.Read.All, Member.Read.Hidden, and UserProfile.Read
175175

176176
## User actions
177177

0 commit comments

Comments
 (0)