Skip to content

Commit 8e8dec7

Browse files
authored
Merge pull request #230149 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents bd06645 + 4fee858 commit 8e8dec7

File tree

8 files changed

+26
-30
lines changed

8 files changed

+26
-30
lines changed

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ The following device attributes can be used with the filter for devices conditio
119119
| model | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | Any string | (device.model -notContains "Surface") |
120120
| operatingSystem | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system (like Windows, iOS, or Android) | (device.operatingSystem -eq "Windows") |
121121
| operatingSystemVersion | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | A valid operating system version (like 6.1 for Windows 7, 6.2 for Windows 8, or 10.0 for Windows 10 and Windows 11) | (device.operatingSystemVersion -in ["10.0.18363", "10.0.19041", "10.0.19042", "10.0.22000"]) |
122-
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.devicePhysicalIDs -contains "[ZTDId]:value") |
122+
| physicalIds | Contains, NotContains | As an example all Windows Autopilot devices store ZTDId (a unique value assigned to all imported Windows Autopilot devices) in device physicalIds property. | (device.physicalIds -contains "[ZTDId]:value") |
123123
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -eq "Printer") |
124124
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
125125
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -eq "ServerAD") |

articles/active-directory/develop/publisher-verification-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ App developers must meet a few requirements to complete the publisher verificati
6666

6767
- In Partner Center, this user must have one of the following [roles](/partner-center/permissions-overview): MPN Partner Admin, Account Admin, or Global Administrator (a shared role that's mastered in Azure AD).
6868

69-
- The user who initiates verification must sign in by using [multifactor authentication](../authentication/howto-mfa-getstarted.md).
69+
- The user who initiates verification must sign in by using [Azure AD multifactor authentication](../authentication/howto-mfa-getstarted.md).
7070

7171
- The publisher must consent to the [Microsoft identity platform for developers Terms of Use](/legal/microsoft-identity-platform/terms-of-use).
7272

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ This risk detection indicates that the application's valid credentials have been
9797
9898
5. Get the TenantID and Application(Client)ID in the **Overview** page.
9999
6. Ensure you disable the application via **Azure Active Directory** > **Enterprise Application** > **Properties** > Set **Enabled for users to sign-in** to **No**.
100-
7. Create a **public** GitHub Repository, add the following config and commit the change.
100+
7. Create a **public** GitHub Repository, add the following config and commit the change as a file with the .txt extension.
101101
```GitHub file
102102
"AadClientId": "XXXX-2dd4-4645-98c2-960cf76a4357",
103103
"AadSecret": "p3n7Q~XXXX",

articles/active-directory/saas-apps/facebook-work-accounts-provisioning-tutorial.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Tutorial: Configure Facebook Work Accounts for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3-
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Facebook Work Accounts.
2+
title: 'Tutorial: Configure Meta Work Accounts for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Meta Work Accounts.
44
services: active-directory
55
author: jeevansd
66
manager: CelesteDG
@@ -13,17 +13,17 @@ ms.topic: tutorial
1313
ms.date: 01/06/2023
1414
---
1515

16-
# Tutorial: Configure Facebook Work Accounts for automatic user provisioning
16+
# Tutorial: Configure Meta Work Accounts for automatic user provisioning
1717

18-
This tutorial describes the steps you need to perform in both Facebook Work Accounts and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Facebook Work Accounts](https://work.facebook.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
18+
This tutorial describes the steps you need to perform in both Meta Work Accounts and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Meta Work Accounts](https://work.meta.com) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
1919

2020
## Capabilities supported
2121

2222
> [!div class="checklist"]
23-
> * Create users in Facebook Work Accounts
24-
> * Remove users in Facebook Work Accounts when they do not require access anymore
25-
> * Keep user attributes synchronized between Azure AD and Facebook Work Accounts
26-
> * Single sign-on to Facebook Work Accounts (recommended)
23+
> * Create users in Meta Work Accounts
24+
> * Remove users in Meta Work Accounts when they do not require access anymore
25+
> * Keep user attributes synchronized between Azure AD and Meta Work Accounts
26+
> * Single sign-on to Meta Work Accounts (recommended)
2727
2828
## Prerequisites
2929

@@ -37,11 +37,11 @@ The scenario outlined in this tutorial assumes that you already have the followi
3737

3838
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
3939
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
40-
1. Determine what data to [map between Azure AD and Facebook Work Accounts](../app-provisioning/customize-application-attributes.md).
40+
1. Determine what data to [map between Azure AD and Meta Work Accounts](../app-provisioning/customize-application-attributes.md).
4141

42-
## Step 2. Add Facebook Work Accounts from the Azure AD application gallery
42+
## Step 2. Add Meta Work Accounts from the Azure AD application gallery
4343

44-
Add Facebook Work Accounts from the Azure AD application gallery to start managing provisioning to Facebook Work Accounts. If you have previously setup Facebook Work Accounts for SSO, you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
44+
Add Meta Work Accounts from the Azure AD application gallery to start managing provisioning to Meta Work Accounts. If you have previously setup Meta Work Accounts for SSO, you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
4545

4646
## Step 3. Define who will be in scope for provisioning
4747

@@ -51,31 +51,31 @@ The Azure AD provisioning service allows you to scope who will be provisioned ba
5151

5252
* If you need additional roles, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add new roles.
5353

54-
## Step 4. Configure automatic user provisioning to Facebook Work Accounts
54+
## Step 4. Configure automatic user provisioning to Meta Work Accounts
5555

5656
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
5757

58-
### To configure automatic user provisioning for Facebook Work Accounts in Azure AD:
58+
### To configure automatic user provisioning for Meta Work Accounts in Azure AD:
5959

6060
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
6161

62-
1. In the applications list, select **Facebook Work Accounts**.
62+
1. In the applications list, select **Meta Work Accounts**.
6363

6464
1. Select the **Provisioning** tab.
6565

6666
1. Set the **Provisioning Mode** to **Automatic**.
6767

68-
1. Under the **Admin Credentials** section, click on **Authorize**. You will be redirected to **Facebook Work Accounts**'s authorization page. Input your Facebook Work Accounts username and click on the **Continue** button. Click **Test Connection** to ensure Azure AD can connect to Facebook Work Accounts. If the connection fails, ensure your Facebook Work Accounts account has Admin permissions and try again.
68+
1. Under the **Admin Credentials** section, click on **Authorize**. You will be redirected to **Meta Work Accounts**'s authorization page. Input your Meta Work Accounts username and click on the **Continue** button. Click **Test Connection** to ensure Azure AD can connect to Meta Work Accounts. If the connection fails, ensure your Meta Work Accounts account has Admin permissions and try again.
6969

70-
:::image type="content" source="media/facebook-work-accounts-provisioning-tutorial/azure-connect.png" alt-text="Screenshot shows the Facebook Work Accounts authorization page.":::
70+
:::image type="content" source="media/facebook-work-accounts-provisioning-tutorial/azure-connect.png" alt-text="Screenshot shows the Meta Work Accounts authorization page.":::
7171

7272
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
7373

7474
1. Select **Save**.
7575

76-
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Facebook Work Accounts**.
76+
1. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Meta Work Accounts**.
7777

78-
1. Review the user attributes that are synchronized from Azure AD to Facebook Work Accounts in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Facebook Work Accounts for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Facebook Work Accounts API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
78+
1. Review the user attributes that are synchronized from Azure AD to Meta Work Accounts in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Meta Work Accounts for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Meta Work Accounts API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
7979

8080
|Attribute|Type|Supported for filtering|
8181
|---|---|---|
@@ -100,9 +100,9 @@ This section guides you through the steps to configure the Azure AD provisioning
100100

101101
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
102102

103-
1. To enable the Azure AD provisioning service for Facebook Work Accounts, change the **Provisioning Status** to **On** in the **Settings** section.
103+
1. To enable the Azure AD provisioning service for Meta Work Accounts, change the **Provisioning Status** to **On** in the **Settings** section.
104104

105-
1. Define the users and/or groups that you would like to provision to Facebook Work Accounts by choosing the desired values in **Scope** in the **Settings** section.
105+
1. Define the users and/or groups that you would like to provision to Meta Work Accounts by choosing the desired values in **Scope** in the **Settings** section.
106106

107107
![Screenshot shows the Scope dropdown in the Settings section.](common/provisioning-scope.png)
108108

articles/aks/upgrade-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -246,7 +246,7 @@ To confirm that the upgrade was successful, navigate to your AKS cluster in the
246246
When you upgrade your cluster, the following Kubernetes events may occur on each node:
247247

248248
- Surge – Create surge node.
249-
- Drain – Pods are being evicted from the node. Each pod has a 30-minute timeout to complete the eviction.
249+
- Drain – Pods are being evicted from the node. Each pod has a 30-second timeout to complete the eviction.
250250
- Update – Update of a node has succeeded or failed.
251251
- Delete – Deleted a surge node.
252252

articles/aks/workload-identity-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ If you've used [Azure AD pod-managed identity][use-azure-ad-pod-identity], think
103103
|`azure.workload.identity/service-account-token-expiration` |Represents the `expirationSeconds` field for the projected service account token. It's an optional field that you configure to prevent any downtime caused by errors during service account token refresh. Kubernetes service account token expiry isn't correlated with Azure AD tokens. Azure AD tokens expire in 24 hours after they're issued. <sup>1</sup> |3600<br> Supported range is 3600-86400. |
104104
|`azure.workload.identity/skip-containers` |Represents a semi-colon-separated list of containers to skip adding projected service account token volume. For example `container1;container2`. |By default, the projected service account token volume is added to all containers if the service account is labeled with `azure.workload.identity/use: true`. |
105105
|`azure.workload.identity/inject-proxy-sidecar` |Injects a proxy init container and proxy sidecar into the pod. The proxy sidecar is used to intercept token requests to IMDS and acquire an Azure AD token on behalf of the user with federated identity credential. |true |
106-
|`azure.workload.identity/proxy-sidecar-port` |Represents the port of the proxy sidecar. |8080 |
106+
|`azure.workload.identity/proxy-sidecar-port` |Represents the port of the proxy sidecar. |8000 |
107107

108108
<sup>1</sup> Takes precedence if the service account is also annotated.
109109

articles/azure-cache-for-redis/cache-how-to-geo-replication.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ To configure geo-replication between two caches, the following prerequisites mus
4242
- Both caches are in the same Azure subscription.
4343
- The secondary linked cache is either the same cache size or a larger cache size than the primary linked cache. To use geo-failover, both caches must be the same size.
4444
- Both caches are created and in a running state.
45+
- Both caches are running the same version of Redis server.
4546

4647
> [!NOTE]
4748
> Data transfer between Azure regions is charged at standard [bandwidth rates](https://azure.microsoft.com/pricing/details/bandwidth/).

articles/iot-edge/how-to-create-iot-edge-device.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,6 @@ If you want more information about how to choose the right option for you, conti
3232
>[!NOTE]
3333
>The following table reflects the supported scenarios for IoT Edge version 1.4.
3434
35-
| | Linux containers on Linux hosts |
36-
|--| ----- |
37-
| **Manual provisioning (single device)** | [X.509 certificates](how-to-provision-single-device-linux-x509.md)<br><br>[Symmetric keys](how-to-provision-single-device-linux-symmetric.md) |
38-
| **Autoprovisioning (devices at scale)** | [X.509 certificates](how-to-provision-devices-at-scale-linux-x509.md)<br><br>[TPM](how-to-provision-devices-at-scale-linux-tpm.md)<br><br>[Symmetric keys](how-to-provision-devices-at-scale-linux-symmetric.md) |
39-
4035
| | Linux containers on Linux hosts | Linux containers on Windows hosts |
4136
|--| ----- | ---------------- |
4237
| **Manual provisioning (single device)** | [X.509 certificates](how-to-provision-single-device-linux-x509.md)<br><br>[Symmetric keys](how-to-provision-single-device-linux-symmetric.md) | [X.509 certificates](how-to-provision-single-device-linux-on-windows-x509.md)<br><br>[Symmetric keys](how-to-provision-single-device-linux-on-windows-symmetric.md) |

0 commit comments

Comments
 (0)