Skip to content

Commit 866cc57

Browse files
authored
Merge pull request #244185 from MicrosoftDocs/main
7/6/2023 PM Publish
2 parents 3258555 + e95e9a1 commit 866cc57

File tree

1,151 files changed

+6302
-3110
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,151 files changed

+6302
-3110
lines changed

.openpublishing.redirection.azure-productivity.json

Lines changed: 35 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -150,10 +150,40 @@
150150
"redirect_url": "/azure/lab-services/lab-services-overview",
151151
"redirect_document_id": false
152152
},
153-
{
154-
"source_path": "articles/lab-services/how-to-enable-nested-virtualization-template-vm-ui.md",
155-
"redirect_url": "/azure/lab-services/how-to-enable-nested-virtualization-template-vm-using-script",
156-
"redirect_document_id": false
157-
}
153+
{
154+
"source_path": "articles/lab-services/how-to-enable-nested-virtualization-template-vm-ui.md",
155+
"redirect_url": "/azure/lab-services/how-to-enable-nested-virtualization-template-vm-using-script",
156+
"redirect_document_id": false
157+
},
158+
{
159+
"source_path": "articles/lab-services/how-to-use-lab.md",
160+
"redirect_url": "/azure/lab-services/how-to-access-lab-virtual-machine",
161+
"redirect_document_id": true
162+
},
163+
{
164+
"source_path": "articles/lab-services/how-to-configure-student-usage.md",
165+
"redirect_url": "/azure/lab-services/how-to-manage-lab-users",
166+
"redirect_document_id": true
167+
},
168+
{
169+
"source_path": "articles/lab-services/how-to-manage-labs-within-canvas.md",
170+
"redirect_url": "/azure/lab-services/tutorial-setup-lab-teams-canvas",
171+
"redirect_document_id": true
172+
},
173+
{
174+
"source_path": "articles/lab-services/how-to-manage-labs-within-teams.md",
175+
"redirect_url": "/azure/lab-services/tutorial-setup-lab-teams-canvas",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "articles/lab-services/how-to-access-vm-for-students-within-canvas.md",
180+
"redirect_url": "/azure/lab-services/tutorial-access-lab-virtual-machine-teams-canvas",
181+
"redirect_document_id": true
182+
},
183+
{
184+
"source_path": "articles/lab-services/how-to-access-vm-for-students-within-teams.md",
185+
"redirect_url": "/azure/lab-services/tutorial-access-lab-virtual-machine-teams-canvas",
186+
"redirect_document_id": false
187+
}
158188
]
159189
}

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 06/21/2023
4+
ms.date: 07/06/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/on-premises-ldap-connector-prepare-directory.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -72,20 +72,20 @@ In order to enable SSL to work, you need to grant the NETWORK SERVICE read permi
7272
Now that we have configured the certificate and granted the network service account permissions, test the connectivity to verify that it is working.
7373
1. Open Server Manager and select AD LDS on the left
7474
2. Right-click your instance of AD LDS and select ldp.exe from the pop-up.
75-
[![Screenshot that shows the Ldp tool location.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-1.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-1.png#lightbox)</br>
75+
[![Screenshot that shows the Ldp tool location.](../../../includes/media/app-provisioning-ldap/ldp-1.png)](../../../includes/media/app-provisioning-ldap/ldp-1.png#lightbox)</br>
7676
3. At the top of ldp.exe, select **Connection** and **Connect**.
7777
4. Enter the following information and click **OK**.
7878
- Server: APP3
7979
- Port: 636
8080
- Place a check in the SSL box
81-
[![Screenshot that shows the Ldp tool connection configuration.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-2.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-2.png#lightbox)</br>
81+
[![Screenshot that shows the Ldp tool connection configuration.](../../../includes/media/app-provisioning-ldap/ldp-2.png)](../../../includes/media/app-provisioning-ldap/ldp-2.png#lightbox)</br>
8282
5. You should see a response similar to the screenshot below.
83-
[![Screenshot that shows the Ldp tool connection configuration success.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png#lightbox)</br>
83+
[![Screenshot that shows the Ldp tool connection configuration success.](../../../includes/media/app-provisioning-ldap/ldp-3.png)](../../../includes/media/app-provisioning-ldap/ldp-3.png#lightbox)</br>
8484
6. At the top, under **Connection** select **Bind**.
8585
7. Leave the defaults and click **OK**.
86-
[![Screenshot that shows the Ldp tool bind operation.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-4.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-4.png#lightbox)</br>
86+
[![Screenshot that shows the Ldp tool bind operation.](../../../includes/media/app-provisioning-ldap/ldp-4.png)](../../../includes/media/app-provisioning-ldap/ldp-4.png#lightbox)</br>
8787
8. You should now, successfully bind to the instance.
88-
[![Screenshot that shows the Ldp tool bind success.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-5.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-5.png#lightbox)</br>
88+
[![Screenshot that shows the Ldp tool bind success.](../../../includes/media/app-provisioning-ldap/ldp-5.png)](../../../includes/media/app-provisioning-ldap/ldp-5.png#lightbox)</br>
8989

9090
### Disable the local password policy
9191
Currently, the LDAP connector provisions users with a blank password. This provisioning will not satisfy the local password policy on our server so we are going to disable it for testing purposes. To disable password complexity, on a non-domain-joined server, use the following steps.
@@ -96,7 +96,7 @@ Currently, the LDAP connector provisions users with a blank password. This prov
9696
1. On the server, click **Start**, **Run**, and then **gpedit.msc**
9797
2. On the **Local Group Policy editor**, navigate to Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy
9898
3. On the right, double-click **Password must meet complexity requirements** and select **Disabled**.
99-
[![Screenshot of the complexity requirements setting.](../../../includes/media/active-directory-app-provisioning-ldap/local-1.png)](../../../includes/media/active-directory-app-provisioning-ldap/local-1.png#lightbox)</br>
99+
[![Screenshot of the complexity requirements setting.](../../../includes/media/app-provisioning-ldap/local-1.png)](../../../includes/media/app-provisioning-ldap/local-1.png#lightbox)</br>
100100
5. Click **Apply** and **Ok**
101101
6. Close the Local Group Policy editor
102102

articles/active-directory/develop/tutorial-v2-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ In this tutorial:
3838

3939
## How this tutorial works
4040

41-
![Shows how the sample app generated by this tutorial works](../../../includes/media/active-directory-develop-guidedsetup-android-intro/android-intro.svg)
41+
![Shows how the sample app generated by this tutorial works.](../../../includes/media/develop-guidedsetup-android-intro/android-intro.svg)
4242

4343
The app in this tutorial signs in users and get data on their behalf. This data is accessed through a protected API (Microsoft Graph API) that requires authorization and is protected by the Microsoft identity platform.
4444

articles/active-directory/develop/tutorial-v2-ios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this tutorial:
3535

3636
## How tutorial app works
3737

38-
![Shows how the sample app generated by this tutorial works](../../../includes/media/active-directory-develop-guidedsetup-ios-introduction/iosintro.svg)
38+
![Shows how the sample app generated by this tutorial works.](../../../includes/media/develop-guidedsetup-ios-introduction/iosintro.svg)
3939

4040
The app in this tutorial can sign in users and get data from Microsoft Graph on their behalf. This data is accessed via a protected API (Microsoft Graph API in this case) that requires authorization and is protected by the Microsoft identity platform.
4141

@@ -155,7 +155,7 @@ The only value you modify is the value assigned to `kClientID` to be your [Appli
155155

156156
Add a new keychain group to your project **Signing & Capabilities**. The keychain group should be `com.microsoft.adalcache` on iOS and `com.microsoft.identity.universalstorage` on macOS.
157157

158-
![Xcode UI displaying how the the keychain group should be set up](../../../includes/media/active-directory-develop-guidedsetup-ios-introduction/iosintro-keychainShare.png)
158+
![Xcode UI displaying how the keychain group should be set up.](../../../includes/media/develop-guidedsetup-ios-introduction/iosintro-keychainShare.png)
159159

160160
## For iOS only, configure URL schemes
161161

0 commit comments

Comments
 (0)