Skip to content

Commit 8ef0046

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nutanix-pre-ga
2 parents 518c9fc + 9e8dece commit 8ef0046

File tree

2,294 files changed

+64054
-28245
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,294 files changed

+64054
-28245
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10895,6 +10895,11 @@
1089510895
"source_path_from_root": "/articles/active-directory/fundamentals/support-help-options.md",
1089610896
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
1089710897
"redirect_document_id": false
10898+
},
10899+
{
10900+
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
10901+
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
10902+
"redirect_document_id": false
1089810903
}
1089910904
]
1090010905
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5441,5 +5441,11 @@
54415441
"redirect_url": "/azure/azure-sql/database/sql-insights-troubleshoot",
54425442
"redirect_document_id": false
54435443
}
5444+
,
5445+
{
5446+
"source_path_from_root": "/articles/azure-monitor/autoscale/autoscale-virtual-machine-scale-sets.md",
5447+
"redirect_url": "/azure/virtual-machine-scale-sets/tutorial-autoscale-template",
5448+
"redirect_document_id": false
5449+
}
54445450
]
54455451
}

.openpublishing.redirection.healthcare-apis.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -491,6 +491,41 @@
491491
"source_path_from_root": "/articles/healthcare-apis/fhir/bulk-importing-fhir-data.md",
492492
"redirect_url": "/azure/healthcare-apis/fhir/configure-import-data",
493493
"redirect_document_id": true
494+
},
495+
{
496+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-azure-resource-manager-template-quickstart.md",
497+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
498+
"redirect_document_id": false
499+
},
500+
{
501+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-data-flow.md",
502+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
503+
"redirect_document_id": false
504+
},
505+
{
506+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-fhir-portal-quickstart.md",
507+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
508+
"redirect_document_id": false
509+
},
510+
{
511+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-mapping-templates.md",
512+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
513+
"redirect_document_id": false
514+
},
515+
{
516+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-metrics-diagnostics-export.md",
517+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
518+
"redirect_document_id": false
519+
},
520+
{
521+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-metrics-display.md",
522+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
523+
"redirect_document_id": false
524+
},
525+
{
526+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-troubleshoot-guide.md",
527+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
528+
"redirect_document_id": false
494529
}
495530
]
496531
}

.openpublishing.redirection.json

Lines changed: 74 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,30 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-dotnet-legacy.md",
5+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-java-legacy.md",
10+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-python-legacy.md",
15+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-python",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-xamarin.md",
20+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/site-recovery/deploy-vmware-azure-replication-appliance-preview.md",
25+
"redirect_url": "/azure/site-recovery/deploy-vmware-azure-replication-appliance-modernized",
26+
"redirect_document_id": false
27+
},
328
{
429
"source_path": "articles/iot-hub/iot-hub-rm-template.md",
530
"redirect_url": "/azure/iot-hub/iot-hub-rm-template-powershell",
@@ -11,14 +36,39 @@
1136
"redirect_document_id": false
1237
},
1338
{
14-
"source_path": "articles/visual-studio/vs-storage-cloud-services-getting-started-queues.md",
15-
"redirect_url": "/previous-versions/azure/visual-studio/vs-storage-cloud-services-getting-started-queues",
16-
"redirect_document_id": false
39+
"source_path": "articles/site-recovery/failover-failback-overview-preview.md",
40+
"redirect_url": "/azure/site-recovery/failover-failback-overview-modernized",
41+
"redirect_document_id": false
1742
},
1843
{
19-
"source_path": "articles/visual-studio/vs-storage-cloud-services-getting-started-tables.md",
20-
"redirect_url": "/previous-versions/azure/visual-studio/vs-storage-cloud-services-getting-started-tables",
21-
"redirect_document_id": false
44+
"source_path": "articles/site-recovery/switch-replication-appliance-preview.md",
45+
"redirect_url": "/azure/site-recovery/switch-replication-appliance-modernized",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/site-recovery/upgrade-mobility-service-preview.md",
50+
"redirect_url": "/azure/site-recovery/upgrade-mobility-service-modernized",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/site-recovery/vmware-azure-set-up-replication-tutorial-preview.md",
55+
"redirect_url": "/azure/site-recovery/vmware-azure-set-up-replication-tutorial-modernized",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/site-recovery/vmware-azure-architecture-preview.md",
60+
"redirect_url": "/azure/site-recovery/vmware-azure-architecture-modernized",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/physical-server-azure-architecture-preview.md",
65+
"redirect_url": "/azure/physical-server-azure-architecture-modernized",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/vmware-azure-tutorial-failover-failback-preview.md",
70+
"redirect_url": "/azure/vmware-azure-tutorial-failover-failback-modernized",
71+
"redirect_document_id": false
2272
},
2373
{
2474
"source_path": "articles/automanage/automanage-virtual-machines.md",
@@ -6258,6 +6308,21 @@
62586308
"redirect_url": "/azure/storage/blobs/storage-auth-abac",
62596309
"redirect_document_id": false
62606310
},
6311+
{
6312+
"source_path": "articles/storage/blobs/reference.md",
6313+
"redirect_url": "/azure/storage/blobs/storage-blobs-introduction",
6314+
"redirect_document_id": false
6315+
},
6316+
{
6317+
"source_path": "articles/storage/queues/reference.md",
6318+
"redirect_url": "/azure/storage/queues/storage-queues-introduction",
6319+
"redirect_document_id": false
6320+
},
6321+
{
6322+
"source_path": "articles/storage/files/reference.md",
6323+
"redirect_url": "/azure/storage/files/storage-files-introduction",
6324+
"redirect_document_id": false
6325+
},
62616326
{
62626327
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
62636328
"redirect_url": "/azure/storage/common/storage-client-side-encryption",
@@ -21221,12 +21286,12 @@
2122121286
{
2122221287
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-getting-started-queues.md",
2122321288
"redirect_url": "/azure/visual-studio/vs-storage-cloud-services-getting-started-queues",
21224-
"redirect_document_id": true
21289+
"redirect_document_id": false
2122521290
},
2122621291
{
2122721292
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-getting-started-tables.md",
2122821293
"redirect_url": "/azure/visual-studio/vs-storage-cloud-services-getting-started-tables",
21229-
"redirect_document_id": true
21294+
"redirect_document_id": false
2123021295
},
2123121296
{
2123221297
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-what-happened.md",
@@ -28841,3 +28906,4 @@
2884128906
}
2884228907
]
2884328908
}
28909+

articles/active-directory-domain-services/powershell-create-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ $replicaSetParams = @{
209209
Location = $AzureLocation
210210
SubnetId = "/subscriptions/$AzureSubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Network/virtualNetworks/$VnetName/subnets/DomainServices"
211211
}
212-
$replicaSet = New-AzADDomainServiceReplicaSet @replicaSetParams
212+
$replicaSet = New-AzADDomainServiceReplicaSetObject @replicaSetParams
213213
214214
$domainServiceParams = @{
215215
Name = $ManagedDomainName

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,12 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 09/27/2021
11+
ms.date: 09/30/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
1515

16-
# Enable accidental deletions prevention in the Azure AD provisioning service (Preview)
16+
# Enable accidental deletions prevention in the Azure AD provisioning service
1717

1818
The Azure AD provisioning service includes a feature to help avoid accidental deletions. This feature ensures that users aren't disabled or deleted in an application unexpectedly.
1919

@@ -32,7 +32,7 @@ threshold. Also, be sure the notification email address is completed. If the del
3232
When the deletion threshold is met, the job will go into quarantine and a notification email will be sent. The quarantined job can then be allowed or rejected. To learn more about quarantine behavior, see [Application provisioning in quarantine status](application-provisioning-quarantine-status.md).
3333

3434
## Recovering from an accidental deletion
35-
If you encounter an accidental deletion you'll see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information.**.
35+
If you encounter an accidental deletion you'll see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information**.
3636

3737
You can click either **Allow deletes** or **View provisioning logs**.
3838

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ Use the steps below to provision roles for a user to your application. Note that
204204
![Add SingleAppRoleAssignment](./media/customize-application-attributes/edit-attribute-singleapproleassignment.png)
205205
- **Things to consider**
206206
- Ensure that multiple roles are not assigned to a user. We cannot guarantee which role will be provisioned.
207-
207+
- SingleAppRoleAssignments is not compatible with setting scope to "Sync All users and groups."
208208
- **Example request (POST)**
209209

210210
```json

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,8 @@ Let's cover each step:
7070
7171
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png" alt-text="Screenshot of the certificate picker." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png":::
7272

73-
1. Azure AD verifies the certificate revocation list to make sure the certificate is not revoked and is valid. Azure AD identifies the user in the tenant by using the [username binding configured](how-to-certificate-based-authentication.md#step-3-configure-username-binding-policy) on the tenant by mapping the certificate field value to user attribute value.
74-
1. If a unique user is found and the user has a conditional access policy and needs multifactor authentication (MFA) and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-2-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
73+
1. Azure AD verifies the certificate revocation list to make sure the certificate is not revoked and is valid. Azure AD identifies the user in the tenant by using the [username binding configured](how-to-certificate-based-authentication.md#step-4-configure-username-binding-policy) on the tenant by mapping the certificate field value to user attribute value.
74+
1. If a unique user is found and the user has a conditional access policy and needs multifactor authentication (MFA) and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
7575
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7676
1. If the user sign-in is successful, the user can access the application.
7777

@@ -244,4 +244,4 @@ For the next test scenario, configure the authentication policy where the **poli
244244
- [Windows SmartCard logon using Azure AD CBA](concept-certificate-based-authentication-smartcard.md)
245245
- [Azure AD CBA on mobile devices (Android and iOS)](concept-certificate-based-authentication-mobile.md)
246246
- [FAQ](certificate-based-authentication-faq.yml)
247-
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
247+
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -59,14 +59,16 @@ Combined registration supports the authentication methods and actions in the fol
5959
| Hardware token | No | No | Yes |
6060
| Phone | Yes | Yes | Yes |
6161
| Alternate phone | Yes | Yes | Yes |
62-
| Office phone | Yes | Yes | Yes |
62+
| Office phone* | Yes | Yes | Yes |
6363
| Email | Yes | Yes | Yes |
6464
| Security questions | Yes | No | Yes |
65-
| App passwords | Yes | No | Yes |
66-
| FIDO2 security keys<br />*Managed mode only from the [Security info](https://mysignins.microsoft.com/security-info) page*| Yes | Yes | Yes |
65+
| App passwords* | Yes | No | Yes |
66+
| FIDO2 security keys*| Yes | Yes | Yes |
6767

6868
> [!NOTE]
69-
> App passwords are available only to users who have been enforced for Azure AD Multi-Factor Authentication. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy.
69+
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
70+
> <b>App passwords</b> are available only to users who have been enforced for Azure AD Multi-Factor Authentication. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
71+
> <b>FIDO2 security keys</b>, can only be added in *Managed mode only from the [Security info](https://mysignins.microsoft.com/security-info) page*
7072
7173
Users can set one of the following options as the default multifactor authentication method.
7274

@@ -140,7 +142,7 @@ A user who hasn't yet set up all required security info goes to [https://myaccou
140142

141143
### Set up other methods after partial registration
142144

143-
If a user has partially satisfied MFA or SSPR registration due to existing authentication method registrations performed by the user or admin, users will only be asked to register additional information allowed by the Authentication methods policy. If more than one other authentication method is available for the user to choose and register, an option on the registration experience titled **I want to set up another method** will be shown and allow the user to set up their desired authentication method.
145+
If a user has partially satisfied MFA or SSPR registration due to existing authentication method registrations performed by the user or admin, users will only be asked to register additional information allowed by the Authentication methods policy settings when registration is required. If more than one other authentication method is available for the user to choose and register, an option on the registration experience titled **I want to set up another method** will be shown and allow the user to set up their desired authentication method.
144146

145147
:::image type="content" border="true" source="./media/concept-registration-mfa-sspr-combined/other-method.png" alt-text="Screenshot of how to set up another method." :::
146148

@@ -165,6 +167,12 @@ To switch the directory in the Azure portal, click the user account name in the
165167

166168
![External users can switch directory.](media/concept-registration-mfa-sspr-combined/switch-directory.png)
167169

170+
Or, you can specify a tenant by URL to access security information.
171+
172+
`https://mysignins.microsoft.com/security-info?tenant=<Tenant Name>`
173+
174+
`https://mysignins.microsoft.com/security-info/?tenantId=<Tenant ID>`
175+
168176
## Next steps
169177

170178
To get started, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,9 @@ The two-gate policy requires two pieces of authentication data, such as an email
8787
* Power BI service administrator
8888
* Privileged Authentication administrator
8989
* Privileged role administrator
90-
* SharePoint administrator
9190
* Security administrator
9291
* Service support administrator
92+
* SharePoint administrator
9393
* Skype for Business administrator
9494
* User administrator
9595

0 commit comments

Comments
 (0)