You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-condition-filters-for-devices.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,7 +119,7 @@ The following device attributes can be used with the filter for devices conditio
119
119
| model | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | Any string | (device.model -notContains "Surface") |
120
120
| operatingSystem | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system (like Windows, iOS, or Android) | (device.operatingSystem -eq "Windows") |
121
121
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10 and Windows 11) | (device.operatingSystemVersion -in ["10.0.18363", "10.0.19041", "10.0.19042", "10.0.22000"]) |
122
-
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.devicePhysicalIDs -contains "[ZTDId]:value") |
122
+
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.physicalIds -contains "[ZTDId]:value") |
123
123
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -eq "Printer") |
124
124
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
125
125
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -eq "ServerAD") |
Copy file name to clipboardExpand all lines: articles/active-directory/develop/publisher-verification-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ App developers must meet a few requirements to complete the publisher verificati
66
66
67
67
- In Partner Center, this user must have one of the following [roles](/partner-center/permissions-overview): MPN Partner Admin, Account Admin, or Global Administrator (a shared role that's mastered in Azure AD).
68
68
69
-
- The user who initiates verification must sign in by using [multifactor authentication](../authentication/howto-mfa-getstarted.md).
69
+
- The user who initiates verification must sign in by using [Azure AD multifactor authentication](../authentication/howto-mfa-getstarted.md).
70
70
71
71
- The publisher must consent to the [Microsoft identity platform for developers Terms of Use](/legal/microsoft-identity-platform/terms-of-use).
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -97,7 +97,7 @@ This risk detection indicates that the application's valid credentials have been
97
97
98
98
5. Get the TenantID and Application(Client)ID in the **Overview** page.
99
99
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
100
-
7. Create a **public** GitHub Repository, add the following config and commit the change.
100
+
7. Create a **public** GitHub Repository, add the following config and commit the change as a file with the .txt extension.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/facebook-work-accounts-provisioning-tutorial.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: 'Tutorial: Configure Facebook Work Accounts for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3
-
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Facebook Work Accounts.
2
+
title: 'Tutorial: Configure Meta Work Accounts for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3
+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Meta Work Accounts.
4
4
services: active-directory
5
5
author: jeevansd
6
6
manager: CelesteDG
@@ -13,17 +13,17 @@ ms.topic: tutorial
13
13
ms.date: 01/06/2023
14
14
---
15
15
16
-
# Tutorial: Configure Facebook Work Accounts for automatic user provisioning
16
+
# Tutorial: Configure Meta Work Accounts for automatic user provisioning
17
17
18
-
This tutorial describes the steps you need to perform in both Facebook Work Accounts and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Facebook Work Accounts](https://work.facebook.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
18
+
This tutorial describes the steps you need to perform in both Meta Work Accounts and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Meta Work Accounts](https://work.meta.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
19
19
20
20
## Capabilities supported
21
21
22
22
> [!div class="checklist"]
23
-
> * Create users in Facebook Work Accounts
24
-
> * Remove users in Facebook Work Accounts when they do not require access anymore
25
-
> * Keep user attributes synchronized between Azure AD and Facebook Work Accounts
26
-
> * Single sign-on to Facebook Work Accounts (recommended)
23
+
> * Create users in Meta Work Accounts
24
+
> * Remove users in Meta Work Accounts when they do not require access anymore
25
+
> * Keep user attributes synchronized between Azure AD and Meta Work Accounts
26
+
> * Single sign-on to Meta Work Accounts (recommended)
27
27
28
28
## Prerequisites
29
29
@@ -37,11 +37,11 @@ The scenario outlined in this tutorial assumes that you already have the followi
37
37
38
38
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
39
39
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40
-
1. Determine what data to [map between Azure AD and Facebook Work Accounts](../app-provisioning/customize-application-attributes.md).
40
+
1. Determine what data to [map between Azure AD and Meta Work Accounts](../app-provisioning/customize-application-attributes.md).
41
41
42
-
## Step 2. Add Facebook Work Accounts from the Azure AD application gallery
42
+
## Step 2. Add Meta Work Accounts from the Azure AD application gallery
43
43
44
-
Add Facebook Work Accounts from the Azure AD application gallery to start managing provisioning to Facebook Work Accounts. If you have previously setup Facebook Work Accounts for SSO, you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
44
+
Add Meta Work Accounts from the Azure AD application gallery to start managing provisioning to Meta Work Accounts. If you have previously setup Meta Work Accounts for SSO, you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
45
45
46
46
## Step 3. Define who will be in scope for provisioning
47
47
@@ -51,31 +51,31 @@ The Azure AD provisioning service allows you to scope who will be provisioned ba
51
51
52
52
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
53
53
54
-
## Step 4. Configure automatic user provisioning to Facebook Work Accounts
54
+
## Step 4. Configure automatic user provisioning to Meta Work Accounts
55
55
56
56
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
57
57
58
-
### To configure automatic user provisioning for Facebook Work Accounts in Azure AD:
58
+
### To configure automatic user provisioning for Meta Work Accounts in Azure AD:
59
59
60
60
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
61
61
62
-
1. In the applications list, select **Facebook Work Accounts**.
62
+
1. In the applications list, select **Meta Work Accounts**.
63
63
64
64
1. Select the **Provisioning** tab.
65
65
66
66
1. Set the **Provisioning Mode** to **Automatic**.
67
67
68
-
1. Under the **Admin Credentials** section, click on **Authorize**. You will be redirected to **Facebook Work Accounts**'s authorization page. Input your Facebook Work Accounts username and click on the **Continue** button. Click **Test Connection** to ensure Azure AD can connect to Facebook Work Accounts. If the connection fails, ensure your Facebook Work Accounts account has Admin permissions and try again.
68
+
1. Under the **Admin Credentials** section, click on **Authorize**. You will be redirected to **Meta Work Accounts**'s authorization page. Input your Meta Work Accounts username and click on the **Continue** button. Click **Test Connection** to ensure Azure AD can connect to Meta Work Accounts. If the connection fails, ensure your Meta Work Accounts account has Admin permissions and try again.
69
69
70
-
:::image type="content" source="media/facebook-work-accounts-provisioning-tutorial/azure-connect.png" alt-text="Screenshot shows the Facebook Work Accounts authorization page.":::
70
+
:::image type="content" source="media/facebook-work-accounts-provisioning-tutorial/azure-connect.png" alt-text="Screenshot shows the Meta Work Accounts authorization page.":::
71
71
72
72
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
73
73
74
74
1. Select **Save**.
75
75
76
-
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Facebook Work Accounts**.
76
+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Meta Work Accounts**.
77
77
78
-
1. Review the user attributes that are synchronized from Azure AD to Facebook Work Accounts in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Facebook Work Accounts for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Facebook Work Accounts API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
78
+
1. Review the user attributes that are synchronized from Azure AD to Meta Work Accounts in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Meta Work Accounts for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Meta Work Accounts API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
79
79
80
80
|Attribute|Type|Supported for filtering|
81
81
|---|---|---|
@@ -100,9 +100,9 @@ This section guides you through the steps to configure the Azure AD provisioning
100
100
101
101
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
102
102
103
-
1. To enable the Azure AD provisioning service for Facebook Work Accounts, change the **Provisioning Status** to **On** in the **Settings** section.
103
+
1. To enable the Azure AD provisioning service for Meta Work Accounts, change the **Provisioning Status** to **On** in the **Settings** section.
104
104
105
-
1. Define the users and/or groups that you would like to provision to Facebook Work Accounts by choosing the desired values in **Scope** in the **Settings** section.
105
+
1. Define the users and/or groups that you would like to provision to Meta Work Accounts by choosing the desired values in **Scope** in the **Settings** section.
106
106
107
107

Copy file name to clipboardExpand all lines: articles/aks/workload-identity-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,7 +103,7 @@ If you've used [Azure AD pod-managed identity][use-azure-ad-pod-identity], think
103
103
|`azure.workload.identity/service-account-token-expiration`|Represents the `expirationSeconds` field for the projected service account token. It's an optional field that you configure to prevent any downtime caused by errors during service account token refresh. Kubernetes service account token expiry isn't correlated with Azure AD tokens. Azure AD tokens expire in 24 hours after they're issued. <sup>1</sup> |3600<br> Supported range is 3600-86400. |
104
104
|`azure.workload.identity/skip-containers`|Represents a semi-colon-separated list of containers to skip adding projected service account token volume. For example `container1;container2`. |By default, the projected service account token volume is added to all containers if the service account is labeled with `azure.workload.identity/use: true`. |
105
105
|`azure.workload.identity/inject-proxy-sidecar`|Injects a proxy init container and proxy sidecar into the pod. The proxy sidecar is used to intercept token requests to IMDS and acquire an Azure AD token on behalf of the user with federated identity credential. |true |
106
-
|`azure.workload.identity/proxy-sidecar-port`|Represents the port of the proxy sidecar. |8080|
106
+
|`azure.workload.identity/proxy-sidecar-port`|Represents the port of the proxy sidecar. |8000|
107
107
108
108
<sup>1</sup> Takes precedence if the service account is also annotated.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-how-to-geo-replication.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,7 @@ To configure geo-replication between two caches, the following prerequisites mus
42
42
- Both caches are in the same Azure subscription.
43
43
- The secondary linked cache is either the same cache size or a larger cache size than the primary linked cache. To use geo-failover, both caches must be the same size.
44
44
- Both caches are created and in a running state.
45
+
- Both caches are running the same version of Redis server.
45
46
46
47
> [!NOTE]
47
48
> Data transfer between Azure regions is charged at standard [bandwidth rates](https://azure.microsoft.com/pricing/details/bandwidth/).
0 commit comments