Skip to content

Commit 8571ffd

Browse files
author
RoseHJM
committed
Resolving merge conflicts.
2 parents 015592f + 5e5bd89 commit 8571ffd

File tree

568 files changed

+1565
-1460
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

568 files changed

+1565
-1460
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23591,7 +23591,12 @@
2359123591
"source_path_from_root": "/articles/devtest-labs/how-to-move-schedule-to-new-region.md",
2359223592
"redirect_url": "/azure/devtest-labs/how-to-move-labs",
2359323593
"redirect_document_id": false
23594-
},
23594+
},
23595+
{
23596+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-prescriptive-adoption.md",
23597+
"redirect_url": "/azure/devtest-labs/deliver-proof-of-concept",
23598+
"redirect_document_id": false
23599+
},
2359523600
{
2359623601
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-cost-ownership.md",
2359723602
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",

articles/active-directory/app-provisioning/inbound-provisioning-api-custom-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You have configured API-driven provisioning app. You're provisioning app is succ
2828

2929
In this step, we'll add the two attributes "HireDate" and "JobCode" that are not part of the standard SCIM schema to the provisioning app and use them in the provisioning data flow.
3030

31-
1. Log in to your [Microsoft Entra admin center](https://entra.micsrosoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
31+
1. Log in to your [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
3232
1. Browse to **Enterprise applications** and open your API-driven provisioning app.
3333
1. Open the **Provisioning** blade.
3434
1. Click on the **Edit Provisioning** button.

articles/active-directory/app-provisioning/inbound-provisioning-api-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ To illustrate the procedure, let's use the CSV file `Samples/csv-with-2-records.
180180

181181
This section explains how to send the generated bulk request payload to your inbound provisioning API endpoint.
182182

183-
1. Log in to your [Microsoft Entra admin center](https://entra.micsrosoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
183+
1. Log in to your [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](https://go.microsoft.com/fwlink/?linkid=2247823).
184184
1. Browse to **Provisioning App** > **Properties** > **Object ID** and copy the `ServicePrincipalId` associated with your provisioning app.
185185

186186
:::image type="content" border="true" source="./media/inbound-provisioning-api-powershell/object-id.png" alt-text="Screenshot of the Object ID." lightbox="./media/inbound-provisioning-api-powershell/object-id.png":::

articles/active-directory/app-provisioning/isv-automatic-provisioning-multi-tenant-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ Learn more about using Microsoft Graph for provisioning:
9696

9797
* [Microsoft Graph Auth Overview](/graph/auth/)
9898

99-
* [Getting started with Microsoft Graph](https://developer.microsoft.com/graph/get-started)
99+
* [Getting started with Microsoft Graph](https://developer.microsoft.com/graph/rest-api/)
100100

101101
## Using SAML JIT for provisioning
102102

articles/active-directory/app-provisioning/on-premises-powershell-connector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The connector provides a bridge between the capabilities of the ECMA Connector H
3737
- Connectivity between hosting server, the connector, and the target system that the PowerShell scripts interact with.
3838
- The execution policy on the server must be configured to allow the connector to run Windows PowerShell scripts. Unless the scripts the connector runs are digitally signed, configure the execution policy by running this command:
3939
`Set-ExecutionPolicy -ExecutionPolicy RemoteSigned`
40-
- Deploying this connector requires one or more PowerShell scripts. Some Microsoft products may provide scripts for use with this connector, and the support statement for those scripts would be provided by that product. If you are developing your own scripts for use with this connector, you'll need to have familiarity with the [Extensible Connectivity Management Agent API](https://msdn.microsoft.com/library/windows/desktop/hh859557.aspx) to develop and maintain those scripts. If you are integrating with third party systems using your own scripts in a production environment, we recommend you work with the third party vendor or a deployment partner for help, guidance and support for this integration.
40+
- Deploying this connector requires one or more PowerShell scripts. Some Microsoft products may provide scripts for use with this connector, and the support statement for those scripts would be provided by that product. If you are developing your own scripts for use with this connector, you'll need to have familiarity with the [Extensible Connectivity Management Agent API](/previous-versions/windows/desktop/forefront-2010/hh859557(v=vs.100)?redirectedfrom=MSDN) to develop and maintain those scripts. If you are integrating with third party systems using your own scripts in a production environment, we recommend you work with the third party vendor or a deployment partner for help, guidance and support for this integration.
4141

4242

4343

@@ -134,7 +134,7 @@ The connectivity tab allows you to supply configuration parameters for connectin
134134
| Password | \<Blank\> | Password of the credential to store for use when the connector is run. |
135135
| Impersonate Connector Account |Unchecked| When true, the synchronization service runs the Windows PowerShell scripts in the context of the credentials supplied. When possible, it is recommended that the **$Credentials** parameter is passed to each script is used instead of impersonation.|
136136
| Load User Profile When Impersonating |Unchecked|Instructs Windows to load the user profile of the connector’s credentials during impersonation. If the impersonated user has a roaming profile, the connector does not load the roaming profile.|
137-
| Logon Type When Impersonating |None|Logon type during impersonation. For more information, see the [dwLogonType][dw] documentation. |
137+
| Logon Type When Impersonating |None|Logon type during impersonation. For more information, see the [dwLogonType](/windows/win32/api/winbase/nf-winbase-logonusera#parameters) documentation. |
138138
|Signed Scripts Only |Unchecked| If true, the Windows PowerShell connector validates that each script has a valid digital signature. If false, ensure that the Synchronization Service server’s Windows PowerShell execution policy is RemoteSigned or Unrestricted.|
139139
|Common Module Script Name (with extension)|xADSyncPSConnectorModule.psm1|The connector allows you to store a shared Windows PowerShell module in the configuration. When the connector runs a script, the Windows PowerShell module is extracted to the file system so that it can be imported by each script.|
140140
|Common Module Script|[AD Sync PowerShell Connector Module code](https://github.com/microsoft/MIMPowerShellConnectors/blob/master/src/ECMA2HostCSV/Scripts/CommonModule.psm1) as value. This module will be automatically created by the ECMA2Host when the connector is running.||

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer: arvinh
1414

1515
# Azure AD on-premises application provisioning to SCIM-enabled apps
1616

17-
The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) client that can be used to automatically provision users into cloud or on-premises applications. This article outlines how you can use the Azure AD provisioning service to provision users into an on-premises application that's SCIM enabled. If you want to provision users into non-SCIM on-premises applications that use SQL as a data store, see the [Azure AD ECMA Connector Host Generic SQL Connector tutorial](tutorial-ecma-sql-connector.md). If you want to provision users into cloud apps such as DropBox and Atlassian, review the app-specific [tutorials](../../active-directory/saas-apps/tutorial-list.md).
17+
The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/provisioning-with-scim-getting-started/ba-p/880010) client that can be used to automatically provision users into cloud or on-premises applications. This article outlines how you can use the Azure AD provisioning service to provision users into an on-premises application that's SCIM enabled. If you want to provision users into non-SCIM on-premises applications that use SQL as a data store, see the [Azure AD ECMA Connector Host Generic SQL Connector tutorial](tutorial-ecma-sql-connector.md). If you want to provision users into cloud apps such as DropBox and Atlassian, review the app-specific [tutorials](../../active-directory/saas-apps/tutorial-list.md).
1818

1919
![Diagram that shows SCIM architecture.](./media/on-premises-scim-provisioning/scim-4.png)
2020

@@ -70,7 +70,7 @@ The following video provides an overview of on-premises provisioning.
7070
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
7171
7272
## Additional requirements
73-
* Ensure your [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) implementation meets the [Azure AD SCIM requirements](use-scim-to-provision-users-and-groups.md).
73+
* Ensure your [SCIM](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/provisioning-with-scim-getting-started/ba-p/880010) implementation meets the [Azure AD SCIM requirements](use-scim-to-provision-users-and-groups.md).
7474

7575
Azure AD offers open-source [reference code](https://github.com/AzureAD/SCIMReferenceCode/wiki) that developers can use to bootstrap their SCIM implementation. The code is as is.
7676
* Support the /schemas endpoint to reduce configuration required in the Azure portal.

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ To further secure the connectivity between Azure AD provisioning service and Suc
3636
3737
1. Copy all IP address ranges listed within the element *addressPrefixes* and use the range to build your IP address restriction list.
3838
1. Translate the CIDR values to IP ranges.
39-
1. Log in to SuccessFactors admin portal to add IP ranges to the allowlist. Refer to SAP [support note 2253200](https://apps.support.sap.com/sap/support/knowledge/en/2253200). You can now [enter IP ranges](https://answers.sap.com/questions/12882263/whitelisting-sap-cloud-platform-ip-address-range-i.html) in this tool.
39+
1. Log in to SuccessFactors admin portal to add IP ranges to the allowlist. Refer to SAP [support note 2253200](https://userapps.support.sap.com/sap/support/knowledge/2253200). You can now [enter IP ranges](https://answers.sap.com/questions/12882263/whitelisting-sap-cloud-platform-ip-address-range-i.html) in this tool.
4040

4141
## Supported entities
4242
For every user in SuccessFactors, Azure AD provisioning service retrieves the following entities. Each entity is expanded using the OData API *$expand* query parameter as outlined in the *Retrieval rule* column. Some entities are expanded by default, while some entities are expanded only if a specific attribute is present in the mapping.

articles/active-directory/conditional-access/concept-continuous-access-evaluation-workload.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Continuous access evaluation (CAE) for [workload identities](../workload-identit
2121

2222
Continuous access evaluation doesn't currently support managed identities.
2323

24-
## Scope of preview
24+
## Scope of support
2525

2626
The continuous access evaluation for workload identities is supported only on access requests sent to Microsoft Graph as a resource provider. More resource providers will be added over time.
2727

articles/active-directory/develop/v2-protocols-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,7 @@ To sign out a user, perform both of these operations:
321321
* Redirect the user's user-agent to the Microsoft identity platform's logout URI
322322
* Clear your app's cookies or otherwise end the user's session in your application.
323323

324-
If you fail to perform either operation, the user may remain authenticated and not be prompted to sign-in the next time they user your app.
324+
If you fail to perform either operation, the user may remain authenticated and not be prompted to sign-in the next time they use your app.
325325

326326
Redirect the user-agent to the `end_session_endpoint` as shown in the OpenID Connect configuration document. The `end_session_endpoint` supports both HTTP GET and POST requests.
327327

articles/active-directory/external-identities/add-users-administrator.md

Lines changed: 2 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -126,22 +126,14 @@ If you need to manually add B2B collaboration users to a group after the user wa
126126
4. Select a group (or select **New group** to create a new one). It's a good idea to include in the group description that the group contains B2B guest users.
127127
5. Under **Manage**, select **Members**.
128128
6. Select **Add members**.
129-
7. Complete one of the following set of steps:
129+
7. Complete the following set of steps:
130130

131131
- *If the guest user is already in the directory:*
132132

133133
a. On the **Add members** page, start typing the name or email address of the guest user.
134134

135135
b. In the search results, choose the user, and then choose **Select**.
136136

137-
- *If the guest user isn't currently in the directory:*
138-
139-
a. On the **Add members** page, type the user's full email address in the search box, type a **Personal message** (optional), and then choose **Invite** to send an invitation.
140-
141-
b. Choose **Select**.
142-
143-
c. Now add the user to the group: On the **Members** page, choose **Add members**. Type the user's name or email address in the search box, choose the user in the results, and then choose **Select**.
144-
145137
You can also use dynamic groups with Azure AD B2B collaboration. For more information, see [Dynamic groups and Azure Active Directory B2B collaboration](use-dynamic-groups.md).
146138

147139
## Add guest users to an application
@@ -154,7 +146,7 @@ To add B2B collaboration users to an application, follow these steps:
154146
5. Under **Manage**, select **Users and groups**.
155147
6. Select **Add user/group**.
156148
7. On the **Add Assignment** page, select the link under **Users**.
157-
8. Complete one of the following set of steps:
149+
8. Complete the following set of steps:
158150

159151
- *If the guest user is already in the directory:*
160152

@@ -164,16 +156,6 @@ To add B2B collaboration users to an application, follow these steps:
164156

165157
c. On the **Add Assignment** page, choose **Assign** to add the user to the app.
166158

167-
- *If the guest user isn't currently in the directory:*
168-
169-
a. On the **Users** page, type the user's full email address in the search box, type a **Personal message** (optional), and then choose **Invite**.
170-
171-
b. Choose **Select**.
172-
173-
c. Now add the invited user to the application: On the **Add Assignment** page, choose the link under **Users**. Type the invited user's name or email address in the search box, choose the user in the results, and then choose **Select**.
174-
175-
d. On the **Add Assignment** page, choose **Assign**.
176-
177159
9. The guest user appears in the application's **Users and groups** list with the assigned role of **Default Access**. If the application provides different roles and you want to change the user's role, do the following:
178160

179161
a. Select the check box next to the guest user, and then select the **Edit** button.

0 commit comments

Comments
 (0)