Skip to content

Commit 8525337

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-gh
2 parents 0ab66d8 + cce96e8 commit 8525337

File tree

75 files changed

+790
-1180
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+790
-1180
lines changed

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,11 @@ The following information is provided to better explain the anchor attributes an
5757

5858
The anchor attribute is a unique attribute of an object type that does not change and represents that object in the ECMA Connector Host in-memory cache.
5959

60-
The distinguished name (DN) is a name that uniquely identifies an object by indicating its current location in the directory hierarchy. Or in the case of SQL, in the partition. The name is formed by concatenating the anchor attribute a the root of the directory partition.
60+
The distinguished name (DN) is a name that uniquely identifies an object by indicating its current location in the directory hierarchy. Or in the case of SQL, in the partition. The name is formed by concatenating the anchor attribute at the root of the directory partition.
6161

6262
When we think of traditional DNs in a traditional format, for say, Active Directory or LDAP, we think of something similar to:
6363

64-
CN=Lola Jacobson,CN=Users,DC=contoso,DC=com
64+
`CN=Lola Jacobson,CN=Users,DC=contoso,DC=com`
6565

6666
However, for a data source such as SQL, which is flat, not hierarchical, the DN needs to be either already present in one of the table or created from the information we provide to the ECMA Connector Host.
6767

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ In this example, users and or groups are created in an HR database connected to
9494

9595
In this example, user creation occurs in Azure AD and the Azure AD provisioning service manages automatic user provisioning to the target (SaaS) applications.
9696

97-
![Diagram that shows the user/group creation process from an on-premises H R application through the Azure A D Provisioning Service to the target S a a S applications.](./media/plan-auto-user-provisioning/cloudprovisioning.png)
97+
![Diagram that shows the user/group creation process from an on-premises H R application through the Azure A D Provisioning Service to the target S A A S applications.](./media/plan-auto-user-provisioning/cloudprovisioning.png)
9898

9999
**Description of workflow:**
100100

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ The following client apps have been confirmed to support this setting:
157157
- Nine Mail - Email & Calendar
158158

159159
> [!NOTE]
160-
> Microsoft Kaizala, Microsoft Skype for Business and Microsoft Visio do not support the **Require app protection policy** grant. If you require these apps to work, please use the **Require approved apps** grant exclusively. The use of the or clause between the two grants will not work for these three applications.
160+
> Microsoft Kaizala, Microsoft Skype for Business and Microsoft Visio do not support the **Require app protection policy** grant. If you require these apps to work, please use the **Require approved apps** grant exclusively. The use of the `or` clause between the two grants will not work for these three applications.
161161
162162
**Remarks**
163163

articles/active-directory/develop/msal-net-migration-public-client.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
221221
// AcquireTokenByIntegratedWindowsAuth form that takes in the username
222222
223223
// Error Code: integrated_windows_auth_not_supported_managed_user
224-
// Explanation: This method relies on an a protocol exposed by Active Directory (AD). If a user was created in Azure
224+
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
225225
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
226226
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
227227
// Mitigation: Use interactive authentication

articles/active-directory/develop/scenario-desktop-acquire-token-integrated-windows-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ static async Task GetATokenForGraph()
124124
// AcquireTokenByIntegratedWindowsAuth form that takes in the username
125125
126126
// Error Code: integrated_windows_auth_not_supported_managed_user
127-
// Explanation: This method relies on an a protocol exposed by Active Directory (AD). If a user was created in Azure
127+
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
128128
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
129129
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
130130
// Mitigation: Use interactive authentication

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 06/28/2019
9+
ms.date: 10/26/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -31,7 +31,7 @@ With an Azure AD joined device, your users already have an SSO experience to the
3131

3232
Azure AD joined devices have no knowledge about your on-premises AD environment because they aren't joined to it. However, you can provide additional information about your on-premises AD to these devices with Azure AD Connect.
3333

34-
If you have a hybrid environment, with both Azure AD and on-premises AD, it is likely that you already have Azure AD Connect deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, Azure AD Connect synchronizes on-premises user and domain information to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
34+
If you have a hybrid environment, with both Azure AD and on-premises AD, it is likely that you already have Azure AD Connect or Azure AD Connect cloud sync deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, on-premises user and domain information is synchronized to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
3535

3636
1. Azure AD sends the details of the user's on-premises domain back to the device, along with the [Primary Refresh Token](concept-primary-refresh-token.md)
3737
1. The local security authority (LSA) service enables Kerberos and NTLM authentication on the device.

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 05/27/2021
9+
ms.date: 10/26/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -38,7 +38,7 @@ Configured trusted [network locations](../conditional-access/location-condition.
3838

3939
### Risk remediation
4040

41-
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and self-service password reset (SSPR).
41+
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and self-service password reset (SSPR).
4242

4343
- When a user risk policy triggers:
4444
- Administrators can require a secure password reset, requiring Azure AD MFA be done before the user creates a new password with SSPR, resetting the user risk.
@@ -65,6 +65,8 @@ There are two locations where these policies may be configured, Conditional Acce
6565

6666
> [!VIDEO https://www.youtube.com/embed/zEsbbik-BTE]
6767
68+
Before enabling remediation policies, organizations may want to [investigate](howto-identity-protection-investigate-risk.md) and [remediate](howto-identity-protection-remediate-unblock.md) any active risks.
69+
6870
### User risk with Conditional Access
6971

7072
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.

articles/aks/TOC.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -386,9 +386,7 @@
386386
href: open-service-mesh-deploy-new-application.md
387387
- name: Manage an existing application deployment
388388
href: open-service-mesh-deploy-existing-application.md
389-
- name: Using Azure Application Gateway Ingress
390-
href: open-service-mesh-azure-application-gateway-ingress.md
391-
- name: Using NGINX Ingress
389+
- name: Using Kubernetes Nginx Ingress Controller
392390
href: open-service-mesh-nginx-ingress.md
393391
- name: Configure observability using Prometheus, Grafana, and Jaeger
394392
href: open-service-mesh-open-source-observability.md

0 commit comments

Comments
 (0)