Skip to content

Commit 8e32c75

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 61709ad + b8534de commit 8e32c75

File tree

852 files changed

+4609
-3280
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

852 files changed

+4609
-3280
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -216,6 +216,11 @@
216216
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
217217
"redirect_document_id": false
218218
},
219+
{
220+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-sample-links.md",
221+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-samples",
222+
"redirect_document_id": false
223+
},
219224
{
220225
"source_path_from_root": "/articles/azure-monitor/visualize/view-designer-conversion-access.md",
221226
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 7 additions & 6 deletions
Large diffs are not rendered by default.

articles/active-directory/external-identities/b2b-direct-connect-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ For information about Conditional Access and Teams, see [Overview of security an
101101

102102
Currently, B2B direct connect enables the Teams Connect shared channels feature. B2B direct connect users can access an external organization's Teams shared channel without having to switch tenants or sign in with a different account. The B2B direct connect user’s access is determined by the shared channel’s policies.
103103

104-
In the resource organization, the Teams shared channel owner can search within Teams for users from an external organization and add them to the shared channel. After they're added, the B2B direct connect users can access the shared channel from within their home instance of Teams, where they collaborate using features such as chat, calls, file-sharing, and app-sharing. For details, see [Overview of teams and channels in Microsoft Teams](/microsoftteams/teams-channels-overview).For details about the resources, files, and applications, that are available to the B2B direct connect user via the Teams shared channel, refer to [Chat, teams, channels, & apps in Microsoft Teams](/microsoftteams/deploy-chat-teams-channels-microsoft-teams-landing-page).
104+
In the resource organization, the Teams shared channel owner can search within Teams for users from an external organization and add them to the shared channel. After they're added, the B2B direct connect users can access the shared channel from within their home instance of Teams, where they collaborate using features such as chat, calls, file-sharing, and app-sharing. For details, see [Overview of teams and channels in Microsoft Teams](/microsoftteams/teams-channels-overview). For details about the resources, files, and applications, that are available to the B2B direct connect user via the Teams shared channel, refer to [Chat, teams, channels, & apps in Microsoft Teams](/microsoftteams/deploy-chat-teams-channels-microsoft-teams-landing-page).
105105

106106
## B2B direct connect vs. B2B collaboration
107107

articles/active-directory/external-identities/redemption-experience.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ When a user clicks the **Accept invitation** link in an [invitation email](invit
8181

8282
![Screenshot showing the redemption flow diagram](media/redemption-experience/invitation-redemption-flow.png)
8383

84-
**If the user’s User Principal Name (UPN) matches with both an existing Azure AD and personal MSA account, the user will be prompted to choose which account they want to redeem with.*
84+
**If the user’s User Principal Name (UPN) matches with both an existing Azure AD and personal MSA account, the user will be prompted to choose which account they want to redeem with. If Email OTP is enabled, existing unmanaged "viral" Azure AD accounts will be ignored (See step #9).*
8585

8686
1. Azure AD performs user-based discovery to determine if the user exists in an [existing Azure AD tenant](./what-is-b2b.md#easily-invite-guest-users-from-the-azure-ad-portal).
8787

@@ -137,4 +137,4 @@ If you see an error that requires admin consent while accessing an application,
137137
- [Add Azure Active Directory B2B collaboration users in the Azure portal](add-users-administrator.md)
138138
- [How do information workers add B2B collaboration users to Azure Active Directory?](add-users-information-worker.md)
139139
- [Add Azure Active Directory B2B collaboration users by using PowerShell](customize-invitation-api.md#powershell)
140-
- [Leave an organization as a guest user](leave-the-organization.md)
140+
- [Leave an organization as a guest user](leave-the-organization.md)

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,18 @@ It's recommended that you follow the [swing migration](how-to-upgrade-previous-v
5252
>[!NOTE]
5353
> If you are using an older build of group writeback in Azure AD Connect, the M365 groups being written back as universal distribution groups, will continue to be written back. The new version of group writeback is backwards compatible.
5454
55-
## Enable group writeback using Azure AD Connect
55+
## Enable group writeback
56+
Enabling group writeback's new features is a two step process. One step is done via Azure AD Connect. This step enables the original group writeback features. The second one is done using PowerShell and enables the new writeback features once the original features are enabled. To enable group writeback complete the steps in the table below
57+
58+
Steps|Description|
59+
|-----|-----|
60+
|[Enable group writeback using Azure AD Connect](#enable-group-writeback-using-azure-ad-connect)|Enables group writeback with the original features included in Azure AD Connect. That is, it will writeback M365 groups as distribution groups. This option is **only** available if you have Exchange present in your on-premises Active Directory.|
61+
|[Enabling group writeback using PowerShell](#enable-group-writeback-using-powershell)|Enables the new group writeback features outlined in this article.
62+
63+
>[!NOTE]
64+
>You must enable group writeback via Azure AD Connect before enabling group writeback via PowerShell to receive the new features outlined in this article. You must do both and in the correct order.
65+
66+
### Enable group writeback using Azure AD Connect
5667

5768
To enable group writeback, use the following steps:
5869

@@ -86,7 +97,7 @@ To enable group writeback, use the following steps:
8697
8798
For more information on configuring the Microsoft 365 groups, see [Configure Microsoft 365 Groups with on-premises Exchange hybrid](/exchange/hybrid-deployment/set-up-microsoft-365-groups#enable-group-writeback-in-azure-ad-connect).
8899
89-
## Enabling group writeback using PowerShell
100+
### Enable group writeback using PowerShell
90101
91102
To enable group writeback via PowerShell:
92103

articles/active-directory/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell.md

Lines changed: 78 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.custom: devx-track-azurepowershell
2323
Managed identities for Azure resources provide Azure services with an identity in Azure Active Directory. They work without needing credentials in your code. Azure services use this identity to authenticate to services that support Azure AD authentication. Application roles provide a form of role-based access control, and allow a service to implement authorization rules.
2424

2525
> [!NOTE]
26-
> The tokens which your application receives are cached by the underlying infrastructure, which means that any changes to the managed identity's roles can take significant time to take effect. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
26+
> The tokens that your application receives are cached by the underlying infrastructure, which means that any changes to the managed identity's roles can take significant time to take effect. For more information, see [Limitation of using managed identities for authorization](managed-identity-best-practice-recommendations.md#limitation-of-using-managed-identities-for-authorization).
2727
2828
In this article, you learn how to assign a managed identity to an application role exposed by another application using Azure AD PowerShell.
2929

@@ -33,40 +33,50 @@ In this article, you learn how to assign a managed identity to an application ro
3333
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before continuing.
3434
- To run the example scripts, you have two options:
3535
- Use the [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open using the **Try It** button on the top-right corner of code blocks.
36-
- Run scripts locally by installing the latest version of [the Az PowerShell module](/powershell/azure/install-az-ps) and the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
36+
- Run scripts locally by installing the latest version of [the Az PowerShell module](/powershell/azure/install-az-ps). You can also use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/get-started).
3737

3838
## Assign a managed identity access to another application's app role
3939

4040
1. Enable managed identity on an Azure resource, [such as an Azure VM](qs-configure-powershell-windows-vm.md).
4141

4242
1. Find the object ID of the managed identity's service principal.
4343

44-
**For a system-assigned managed identity**, you can find the object ID on the Azure portal on the resource's **Identity** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the resource you created in step 1, which is available in the Azure portal on the resource's **Properties** page.
44+
**For a system-assigned managed identity**, you can find the object ID on the Azure portal on the resource's **Identity** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the resource you created in step 1, which is available in the Azure portal on the resource's **Properties** page.
4545

46-
```powershell
47-
$resourceIdWithManagedIdentity = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.Compute/virtualMachines/{my virtual machine name}'
48-
(Get-AzResource -ResourceId $resourceIdWithManagedIdentity).Identity.PrincipalId
49-
```
46+
```powershell
47+
$resourceIdWithManagedIdentity = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.Compute/virtualMachines/{my virtual machine name}'
48+
(Get-AzResource -ResourceId $resourceIdWithManagedIdentity).Identity.PrincipalId
49+
```
5050
51-
**For a user-assigned managed identity**, you can find the managed identity's object ID on the Azure portal on the resource's **Overview** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the user-assigned managed identity.
51+
**For a user-assigned managed identity**, you can find the managed identity's object ID on the Azure portal on the resource's **Overview** page. You can also use the following PowerShell script to find the object ID. You'll need the resource ID of the user-assigned managed identity.
5252
53-
```powershell
54-
$userManagedIdentityResourceId = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{my managed identity name}'
55-
(Get-AzResource -ResourceId $userManagedIdentityResourceId).Properties.PrincipalId
56-
```
53+
```powershell
54+
$userManagedIdentityResourceId = '/subscriptions/{my subscription ID}/resourceGroups/{my resource group name}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{my managed identity name}'
55+
(Get-AzResource -ResourceId $userManagedIdentityResourceId).Properties.PrincipalId
56+
```
5757
5858
1. Create a new application registration to represent the service that your managed identity will send a request to. If the API or service that exposes the app role grant to the managed identity already has a service principal in your Azure AD tenant, skip this step. For example, if you want to grant the managed identity access to the Microsoft Graph API, you can skip this step.
5959
6060
1. Find the object ID of the service application's service principal. You can find this using the Azure portal. Go to Azure Active Directory and open the **Enterprise applications** page, then find the application and look for the **Object ID**. You can also find the service principal's object ID by its display name using the following PowerShell script:
6161
62+
# [Azure PowerShell](#tab/azurepowershell)
63+
64+
```powershell
65+
$serverServicePrincipalObjectId = (Get-AzureADServicePrincipal -Filter "DisplayName eq '$applicationName'").ObjectId
66+
```
67+
68+
# [Microsoft Graph](#tab/microsoftgraph)
69+
6270
```powershell
6371
$serverServicePrincipalObjectId = (Get-MgServicePrincipal -Filter "DisplayName eq '$applicationName'").Id
6472
```
6573
74+
---
75+
6676
> [!NOTE]
6777
> Display names for applications are not unique, so you should verify that you obtain the correct application's service principal.
6878
69-
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or using Microsoft Graph. For example, you could add an app role like this:
79+
1. Add an [app role](../develop/howto-add-app-roles-in-azure-ad-apps.md) to the application you created in step 3. You can create the role using the Azure portal or by using Microsoft Graph. For example, you could add an app role like this:
7080
7181
```json
7282
{
@@ -88,6 +98,18 @@ In this article, you learn how to assign a managed identity to an application ro
8898
8999
Execute the following PowerShell command to add the role assignment:
90100
101+
# [Azure PowerShell](#tab/azurepowershell)
102+
103+
```powershell
104+
New-AzureADServiceAppRoleAssignment `
105+
-ObjectId $managedIdentityObjectId `
106+
-Id $appRoleId `
107+
-PrincipalId $managedIdentityObjectId `
108+
-ResourceId $serverServicePrincipalObjectId
109+
```
110+
111+
# [Microsoft Graph](#tab/microsoftgraph)
112+
91113
```powershell
92114
New-MgServicePrincipalAppRoleAssignment `
93115
-ServicePrincipalId $managedIdentityObjectId `
@@ -96,10 +118,51 @@ In this article, you learn how to assign a managed identity to an application ro
96118
-AppRoleId $appRoleId
97119
```
98120
121+
---
122+
99123
## Complete script
100124
101125
This example script shows how to assign an Azure web app's managed identity to an app role.
102126
127+
# [Azure PowerShell](#tab/azurepowershell)
128+
129+
```powershell
130+
# Install the module. This step requires you to be an administrator on your machine.
131+
# Install-Module AzureAD
132+
133+
# Your tenant ID (in the Azure portal, under Azure Active Directory > Overview).
134+
$tenantID = '<tenant-id>'
135+
136+
# The name of your web app, which has a managed identity that should be assigned to the server app's app role.
137+
$webAppName = '<web-app-name>'
138+
$resourceGroupName = '<resource-group-name-containing-web-app>'
139+
140+
# The name of the server app that exposes the app role.
141+
$serverApplicationName = '<server-application-name>' # For example, MyApi
142+
143+
# The name of the app role that the managed identity should be assigned to.
144+
$appRoleName = '<app-role-name>' # For example, MyApi.Read.All
145+
146+
# Look up the web app's managed identity's object ID.
147+
$managedIdentityObjectId = (Get-AzWebApp -ResourceGroupName $resourceGroupName -Name $webAppName).identity.principalid
148+
149+
Connect-AzureAD -TenantId $tenantID
150+
151+
# Look up the details about the server app's service principal and app role.
152+
$serverServicePrincipal = (Get-AzureADServicePrincipal -Filter "DisplayName eq '$serverApplicationName'")
153+
$serverServicePrincipalObjectId = $serverServicePrincipal.Id
154+
$appRoleId = ($serverServicePrincipal.AppRoles | Where-Object {$_.Value -eq $appRoleName }).Id
155+
156+
# Assign the managed identity access to the app role.
157+
New-AzureADServiceAppRoleAssignment `
158+
-ObjectId $managedIdentityObjectId `
159+
-Id $appRoleId `
160+
-PrincipalId $managedIdentityObjectId `
161+
-ResourceId $serverServicePrincipalObjectId
162+
```
163+
164+
# [Microsoft Graph](#tab/microsoftgraph)
165+
103166
```powershell
104167
# Install the module.
105168
# Install-Module Microsoft.Graph -Scope CurrentUser
@@ -135,6 +198,8 @@ New-MgServicePrincipalAppRoleAssignment `
135198
-AppRoleId $appRoleId
136199
```
137200

201+
---
202+
138203
## Next steps
139204

140205
- [Managed identity for Azure resources overview](overview.md)

articles/aks/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Kubernetes Service (AKS)
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Kubernetes Service (AKS). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 06/16/2022
4+
ms.date: 07/06/2022
55
ms.topic: sample
66
ms.service: container-service
77
ms.custom: subject-policy-compliancecontrols

articles/api-management/api-management-access-restriction-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ If `identity-type=jwt` is configured, a JWT token is required to be validated. T
186186
| authorization-id | The authorization resource identifier. | Yes | |
187187
| context-variable-name | The name of the context variable to receive the [`Authorization` object](#authorization-object). | Yes | |
188188
| identity-type | Type of identity to be checked against the authorization access policy. <br> - `managed`: managed identity of the API Management service. <br> - `jwt`: JWT bearer token specified in the `identity` attribute. | No | managed |
189-
| identity | An Azure AD JWT bearer token to be checked against the authorization permissions. Ignored for `identity-type` other than `jwt`. <br><br>Expected claims: <br> - audience: https://azure-api.net/authorization-manager <br> - `oid`: Permission object ID <br> - `tid`: Permission tenant ID | No | |
189+
| identity | An Azure AD JWT bearer token to be checked against the authorization permissions. Ignored for `identity-type` other than `jwt`. <br><br>Expected claims: <br> - audience: `https://azure-api.net/authorization-manager` <br> - `oid`: Permission object ID <br> - `tid`: Permission tenant ID | No | |
190190
| ignore-error | Boolean. If acquiring the authorization context results in an error (for example, the authorization resource is not found or is in an error state): <br> - `true`: the context variable is assigned a value of null. <br> - `false`: return `500` | No | false |
191191

192192
### Authorization object

0 commit comments

Comments
 (0)