Skip to content

Commit 8702752

Browse files
authored
Merge pull request #205494 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents d586733 + 09d23fa commit 8702752

File tree

144 files changed

+2622
-901
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

144 files changed

+2622
-901
lines changed

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,12 +79,12 @@ Based on the attribute-mapping, during full sync Azure AD provisioning service s
7979
>| OData API Host | Appends https to the *Tenant URL*. Example: `https://api4.successfactors.com` |
8080
>| OData API Endpoint | `/odata/v2/PerPerson` |
8181
>| OData $format query parameter | `json` |
82-
>| OData $filter query parameter | `(personEmpTerminationInfoNav/activeEmploymentsCount ge 1) and (lastModifiedDateTime le <CurrentExecutionTime>)` |
82+
>| OData $filter query parameter | `(personEmpTerminationInfoNav/activeEmploymentsCount ne null) and (lastModifiedDateTime le <CurrentExecutionTime>)` |
8383
>| OData $expand query parameter | This parameter value depends on the attributes mapped. Example: `employmentNav/userNav,employmentNav/jobInfoNav,personalInfoNav,personEmpTerminationInfoNav,phoneNav,emailNav,employmentNav/jobInfoNav/companyNav/countryOfRegistrationNav,employmentNav/jobInfoNav/divisionNav,employmentNav/jobInfoNav/departmentNav` |
8484
>| OData customPageSize query parameter | `100` |
8585
8686
> [!NOTE]
87-
> During the first initial full sync, Azure AD provisioning service does not pull inactive/terminated worker data.
87+
> During the full initial sync, both active and terminated workers from SAP SuccessFactors will be fetched.
8888
8989
For each SuccessFactors user, the provisioning service looks for an account in the target (Azure AD/on-premises Active Directory) using the matching attribute defined in the mapping. For example: if *personIdExternal* maps to *employeeId* and is set as the matching attribute, then the provisioning service uses the *personIdExternal* value to search for the user with *employeeId* filter. If a user match is found, then it updates the target attributes. If no match is found, then it creates a new entry in the target.
9090

articles/active-directory/develop/tutorial-v2-asp-webapp.md

Lines changed: 292 additions & 266 deletions
Large diffs are not rendered by default.

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -399,6 +399,20 @@ Another MFA-related error message is the one described previously: "Your credent
399399

400400
![Screenshot of the message that says your credentials didn't work.](./media/howto-vm-sign-in-azure-ad-windows/your-credentials-did-not-work.png)
401401

402+
If you've configured a legacy per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting and you see the error above, you can resolve the problem by removing the per-user MFA setting through these commands:
403+
404+
```
405+
# Get StrongAuthenticationRequirements configure on a user
406+
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
407+
408+
# Clear StrongAuthenticationRequirements from a user
409+
$mfa = @()
410+
Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $mfa
411+
412+
# Verify StrongAuthenticationRequirements are cleared from the user
413+
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
414+
```
415+
402416
If you haven't deployed Windows Hello for Business and if that isn't an option for now, you can configure a Conditional Access policy that excludes the Azure Windows VM Sign-In app from the list of cloud apps that require MFA. To learn more about Windows Hello for Business, see [Windows Hello for Business overview](/windows/security/identity-protection/hello-for-business/hello-identity-verification).
403417

404418
> [!NOTE]

articles/active-directory/fundamentals/5-secure-access-b2b.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,8 @@ Some organizations use a list of known ‘bad actor’ domains provided by their
8484

8585
You can control both inbound and outbound access using Cross Tenant Access Settings. In addition, you can trust MFA, Compliant device, and hybrid Azure Active Directory joined device (HAADJ) claims from all or a subset of external Azure AD tenants. When you configure an organization specific policy, it applies to the entire Azure AD tenant and will cover all users from that tenant regardless of the user’s domain suffix.
8686

87+
You can enable collaboration across Microsoft clouds such as Microsoft Azure China 21Vianet or Microsoft Azure Government with additional configuration. Determine if any of your collaboration partners reside in a different Microsoft cloud. If so, you should [enable collaboration with these partners using Cross Tenant Access Settings](/azure/active-directory/external-identities/cross-cloud-settings).
88+
8789
If you wish to allow inbound access to only specific tenants (allowlist), you can set the default policy to block access and then create organization policies to granularly allow access on a per user, group, and application basis.
8890

8991
If you wish to block access to specific tenants (blocklist), you can set the default policy as allow and then create organization policies that block access to those specific tenants.
@@ -254,4 +256,4 @@ See the following articles on securing external access to resources. We recommen
254256

255257
8. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
256258

257-
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
259+
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)

articles/active-directory/governance/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,8 @@
5555
href: manage-access-review.md
5656
- name: Manage users excluded from Conditional Access
5757
href: conditional-access-exclusion.md
58-
- name: Review recommendations for group access reviews
59-
href: review-recommendations-group-access-reviews.md
58+
- name: Review recommendations for access reviews
59+
href: review-recommendations-access-reviews.md
6060
- name: Review and remove users from external organizations
6161
href: access-reviews-external-users.md
6262
- name: How-to guides

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Change approval settings for an access package in Azure AD entitlement ma
33
description: Learn how to change approval and requestor information settings for an access package in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: ajburnle
6+
author: owinfreyatl
77
manager: karenhoran
88
editor:
99
ms.service: active-directory
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: compliance
1414
ms.date: 05/16/2021
15-
ms.author: ajburnle
15+
ms.author: owinfreyatl
1616
ms.reviewer:
1717
ms.collection: M365-identity-device-management
1818

articles/active-directory/governance/entitlement-management-access-package-assignments.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: View, add, and remove assignments for an access package in Azure AD entit
33
description: Learn how to view, add, and remove assignments for an access package in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: ajburnle
6+
author: owinfreyatl
77
manager: karenhoran
88
editor:
99
ms.service: active-directory
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: compliance
1414
ms.date: 01/05/2022
15-
ms.author: ajburnle
15+
ms.author: owinfreyatl
1616
ms.reviewer:
1717
ms.collection: M365-identity-device-management
1818

articles/active-directory/governance/entitlement-management-access-package-create.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create a new access package in entitlement management - Azure AD
33
description: Learn how to create a new access package of resources you want to share in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: ajburnle
6+
author: owinfreyatl
77
manager: karenhoran
88
editor:
99
ms.service: active-directory
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: compliance
1414
ms.date: 06/18/2020
15-
ms.author: ajburnle
15+
ms.author: owinfreyatl
1616
ms.reviewer:
1717
ms.collection: M365-identity-device-management
1818

articles/active-directory/governance/entitlement-management-access-package-edit.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Hide or delete access package in entitlement management - Azure AD
33
description: Learn how to hide or delete an access package in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: ajburnle
6+
author: owinfreyatl
77
manager: karenhoran
88
editor:
99
ms.service: active-directory
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.topic: how-to
1313
ms.subservice: compliance
1414
ms.date: 06/18/2020
15-
ms.author: ajburnle
15+
ms.author: owinfreyatl
1616
ms.reviewer:
1717
ms.collection: M365-identity-device-management
1818

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Tutorial - Manage access to resources in Azure AD entitlement management
33
description: Step-by-step tutorial for how to create your first access package using the Azure portal in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: ajburnle
6+
author: owinfreyatl
77
manager: karenhoran
88
editor: markwahl-msft
99
ms.service: active-directory
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.topic: tutorial
1313
ms.subservice: compliance
1414
ms.date: 07/11/2022
15-
ms.author: ajburnle
15+
ms.author: owinfreyatl
1616
ms.reviewer: markwahl-msft
1717
ms.collection: M365-identity-device-management
1818

0 commit comments

Comments
 (0)