Skip to content

Commit 927dd0e

Browse files
authored
Merge pull request #127311 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents b33c9ad + 9b4875a commit 927dd0e

File tree

117 files changed

+2059
-1254
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

117 files changed

+2059
-1254
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39868,6 +39868,11 @@
3986839868
"redirect_url": "/azure/cognitive-services/speech-service/get-started-text-to-speech",
3986939869
"redirect_document_id": false
3987039870
},
39871+
{
39872+
"source_path": "articles/cognitive-services/Speech-Service/scenario-availability.md",
39873+
"redirect_url": "/azure/cognitive-services/speech-service/speech-sdk",
39874+
"redirect_document_id": true
39875+
},
3987139876
{
3987239877
"source_path": "articles/cognitive-services/Speech-Service/quickstarts/text-to-speech.md",
3987339878
"redirect_url": "/azure/cognitive-services/speech-service/get-started-text-to-speech",

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,11 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: overview
1414
ms.subservice: compliance
15-
ms.date: 06/18/2020
15+
ms.date: 08/25/2020
1616
ms.author: barclayn
1717
ms.reviewer: markwahl-msft
1818
ms.collection: M365-identity-device-management
19+
ms.custom: contperfq1
1920

2021

2122
#Customer intent: As a administrator, I want learn about entitlement management so that see how I can use it to manage access to resources in my organization.
@@ -25,7 +26,7 @@ ms.collection: M365-identity-device-management
2526

2627
Azure Active Directory (Azure AD) entitlement management is an [identity governance](identity-governance-overview.md) feature that enables organizations to manage identity and access lifecycle at scale, by automating access request workflows, access assignments, reviews, and expiration.
2728

28-
Employees in organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups or sites your organization is using.
29+
Employees in organizations need access to various groups, applications, and sites to perform their job. Managing this access is challenging, as requirements change - new applications are added or users need additional access rights. This scenario gets more complicated when you collaborate with outside organizations - you may not know who in the other organization needs access to your organization's resources, and they won't know what applications, groups, or sites your organization is using.
2930

3031
Azure AD entitlement management can help you more efficiently manage access to groups, applications, and SharePoint Online sites for internal users, and also for users outside your organization who need access to those resources.
3132

@@ -52,7 +53,10 @@ Here are some of capabilities of entitlement management:
5253
- Delegate to non-administrators the ability to create access packages. These access packages contain resources that users can request, and the delegated access package managers can define policies with rules for which users can request, who must approve their access, and when access expires.
5354
- Select connected organizations whose users can request access. When a user who is not yet in your directory requests access, and is approved, they are automatically invited into your directory and assigned access. When their access expires, if they have no other access package assignments, their B2B account in your directory can be automatically removed.
5455

55-
You can get started with our [tutorial to create your first access package](entitlement-management-access-package-first.md). You can also read the [common scenarios](entitlement-management-scenarios.md), or watch videos, including
56+
>[!NOTE]
57+
>If you are ready to try Entitlement management you can get started with our [tutorial to create your first access package](entitlement-management-access-package-first.md).
58+
59+
You can also read the [common scenarios](entitlement-management-scenarios.md), or watch videos, including
5660

5761
- [How to deploy Azure AD entitlement management in your organization](https://www.youtube.com/watch?v=zaaKvaaYwI4)
5862
- [How to monitor and scale your use of Azure AD entitlement management](https://www.youtube.com/watch?v=omtNJ7ySjS0)
@@ -66,7 +70,7 @@ Entitlement management introduces to Azure AD the concept of an *access package*
6670

6771
- Membership of Azure AD security groups
6872
- Membership of Microsoft 365 Groups and Teams
69-
- Assignment to Azure AD enterprise applications, including SaaS applications and custom-integrated applications that support federation/single sign on and/or provisioning
73+
- Assignment to Azure AD enterprise applications, including SaaS applications and custom-integrated applications that support federation/single sign-on and/or provisioning
7074
- Membership of SharePoint Online sites
7175

7276
You can also control access to other resources that rely upon Azure AD security groups or Microsoft 365 Groups. For example:
@@ -97,16 +101,16 @@ The following diagram shows an example of the different elements in entitlement
97101

98102
## When should I use access packages?
99103

100-
Access packages do not replace other mechanisms for access assignment. They are most appropriate in situations such as the following:
104+
Access packages do not replace other mechanisms for access assignment. They are most appropriate in situations such as:
101105

102-
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need additional access,such as to read departmental resources from another department.
103-
- Access needs to be approved by an employee's manager or other designated individuals.
106+
- Employees need time-limited access for a particular task. For example, you might use group-based licensing and a dynamic group to ensure all employees have an Exchange Online mailbox, and then use access packages for situations in which employees need additional access, such as to read departmental resources from another department.
107+
- Access that requires the approval of an employee's manager or other designated individuals.
104108
- Departments wish to manage their own access policies for their resources without IT involvement.
105109
- Two or more organizations are collaborating on a project, and as a result, multiple users from one organization will need to be brought in via Azure AD B2B to access another organization's resources.
106110

107111
## How do I delegate access?
108112

109-
Access packages are defined in containers called *catalogs*. You can have a single catalog for all your access packages, or you can designate individuals to create and own their own catalogs. An administrator can add resources to any catalog, but a non-administrator can only add to a catalog the resources which they own. A catalog owner can add other users as catalog co-owners, or as access package managers. These scenarios are described further in the article [delegation and roles in Azure AD entitlement management](entitlement-management-delegate.md).
113+
Access packages are defined in containers called *catalogs*. You can have a single catalog for all your access packages, or you can designate individuals to create and own their own catalogs. An administrator can add resources to any catalog, but a non-administrator can only add to a catalog the resources that they own. A catalog owner can add other users as catalog co-owners, or as access package managers. These scenarios are described further in the article [delegation and roles in Azure AD entitlement management](entitlement-management-delegate.md).
110114

111115
## Summary of terminology
112116

@@ -119,7 +123,7 @@ To better understand entitlement management and its documentation, you can refer
119123
| assignment | An assignment of an access package to a user ensures the user has all the resource roles of that access package. Access package assignments typically have a time limit before they expire. |
120124
| catalog | A container of related resources and access packages. Catalogs are used for delegation, so that non-administrators can create their own access packages. Catalog owners can add resources they own to a catalog. |
121125
| catalog creator | A collection of users who are authorized to create new catalogs. When a non-administrator user who is authorized to be a catalog creator creates a new catalog, they automatically become the owner of that catalog. |
122-
| connected organization | A external Azure AD directory or domain that you have a relationship with. The users from a connected organization can be specified in a policy as being allowed to request access. |
126+
| connected organization | An external Azure AD directory or domain that you have a relationship with. The users from a connected organization can be specified in a policy as being allowed to request access. |
123127
| policy | A set of rules that defines the access lifecycle, such as how users get access, who can approve, and how long users have access through an assignment. A policy is linked to an access package. For example, an access package could have two policies - one for employees to request access and a second for external users to request access. |
124128
| resource | An asset, such as an Office group, a security group, an application, or a SharePoint Online site, with a role that a user can be granted permissions to. |
125129
| resource directory | A directory that has one or more resources to share. |
@@ -147,7 +151,7 @@ Azure AD Premium P2 licenses are **not** required for the following tasks:
147151
- No licenses are required for users who have been delegated administrative tasks, such as catalog creator, catalog owner, and access package manager.
148152
- No licenses are required for guests who **can** request access packages, but do **not** request an access package.
149153

150-
For each paid Azure AD Premium P2 license that you purchase for your member users (employees), you can use Azure AD B2B to invite up to 5 guest users. These guest users can also use Azure AD Premium P2 features. For more information, see [Azure AD B2B collaboration licensing guidance](../external-identities/licensing-guidance.md).
154+
For each paid Azure AD Premium P2 license that you purchase for your member users (employees), you can use Azure AD B2B to invite up to five guest users. These guest users can also use Azure AD Premium P2 features. For more information, see [Azure AD B2B collaboration licensing guidance](../external-identities/licensing-guidance.md).
151155

152156
For more information about licenses, see [Assign or remove licenses using the Azure Active Directory portal](../fundamentals/license-users-groups.md).
153157

articles/active-directory/privileged-identity-management/groups-assign-member-owner.md

Lines changed: 12 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 07/27/2020
14+
ms.date: 08/18/2020
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -28,19 +28,14 @@ Azure Active Directory (Azure AD) Privileged Identity Management (PIM) can help
2828

2929
Follow these steps to make a user eligible to be a member or owner of a privileged access group.
3030

31-
1. Sign in to [Privileged Identity Management](https://portal.azure.com/) in the Azure portal with [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role permissions.
31+
1. [Sign in to Azure AD](https://aad.portal.azure.com) with Global Administrator or group Owner permissions.
32+
1. Select **Groups** and then select the role-assignable group you want to manage. You can search or filter the list.
3233

33-
For information about how to grant another administrator access to manage Privileged Identity Management, see [Grant access to other administrators to manage Privileged Identity Management](pim-how-to-give-access-to-pim.md).
34+
![find a role-assignable group to manage in PIM](./media/groups-assign-member-owner/groups-list-in-azure-ad.png)
3435

35-
1. Open **Azure AD Privileged Identity Management**.
36+
1. Open the group and select **Privileged access (Preview)**.
3637

37-
1. Select **Privileged access (Preview)**.
38-
39-
1. You can search for a group name and use the **Group type** to filter the list to select the group you want to manage.
40-
41-
![List of privileged access groups to manage](./media/groups-assign-member-owner/privileged-access-list.png)
42-
43-
1. Under **Manage**, select **Assignments**.
38+
![Open the Privileged Identity Management experience](./media/groups-assign-member-owner/groups-discover-groups.png)
4439

4540
1. Select **Add assignments**.
4641

@@ -72,21 +67,20 @@ Follow these steps to make a user eligible to be a member or owner of a privileg
7267

7368
Follow these steps to update or remove an existing role assignment.
7469

75-
1. Open **Azure AD Privileged Identity Management**.
76-
77-
1. Select **Privileged access (Preview)**.
70+
1. [Sign in to Azure AD](https://aad.portal.azure.com) with Global Administrator or group Owner permissions.
71+
1. Select **Groups** and then select the role-assignable group you want to manage. You can search or filter the list.
7872

79-
1. You can search for a group name and use the **Group type** to filter the list to select the group you want to manage.
73+
![find a role-assignable group to manage in PIM](./media/groups-assign-member-owner/groups-list-in-azure-ad.png)
8074

81-
![List of privileged access groups to manage](./media/groups-assign-member-owner/privileged-access-list.png)
75+
1. Open the group and select **Privileged access (Preview)**.
8276

83-
1. Under **Manage**, select **Assignments**.
77+
![Open the Privileged Identity Management experience](./media/groups-assign-member-owner/groups-discover-groups.png)
8478

8579
1. Select the role that you want to update or remove.
8680

8781
1. Find the role assignment on the **Eligible roles** or **Active roles** tabs.
8882

89-
![Update or remove role assignment](./media/groups-assign-member-owner/groups-add-assignment.png)
83+
![Update or remove role assignment](./media/groups-assign-member-owner/groups-bring-under-management.png)
9084

9185
1. Select **Update** or **Remove** to update or remove the role assignment.
9286

articles/active-directory/privileged-identity-management/groups-discover-groups.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Identify a group to manage in Privileged Identity Management - Azure AD | Microsoft Docs
3-
description: Learn how to onboard role-assignable groups to manage as privileged access groups in Privileged Identity Management (PIM).
2+
title: Manage role-assignable groups as privileged access groups - Azure AD | Microsoft Docs
3+
description: Consent to onboard role-assignable groups to manage as privileged access groups in Privileged Identity Management (PIM).
44
services: active-directory
55
documentationcenter: ''
66
author: curtand
@@ -11,34 +11,38 @@ ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 08/03/2020
14+
ms.date: 08/17/2020
1515
ms.author: curtand
1616
ms.collection: M365-identity-device-management
1717
---
1818

19-
# Bring a privileged access groups (preview) into Privileged Identity Management
19+
# Manage privileged access groups (preview) in Privileged Identity Management
2020

2121
In Azure Active Directory (Azure AD), you can assign Azure AD built-in roles to cloud groups to simplify how you manage role assignments. To protect Azure AD roles and to secure access, you can now use Privileged Identity Management (PIM) to manage just-in-time access for members or owners of these groups. To manage an Azure AD role-assignable group as a privileged access group in Privileged Identity Management, you must bring it under management in PIM.
2222

2323
## Identify groups to manage
2424

25-
You can create a role-assignable group in Azure AD as described in [Create a role-assignable group in Azure Active Directory](../users-groups-roles/roles-groups-create-eligible.md). You have be an owner of the group to bring it under management with Privileged Identity Management.
25+
You can create a role-assignable group in Azure AD as described in [Create a role-assignable group in Azure Active Directory](../users-groups-roles/roles-groups-create-eligible.md). You have be an owner of the group to bring it under management in Privileged Identity Management.
2626

27-
1. [Sign in to Azure AD](https://aad.portal.azure.com) with Privileged Role Administrator role permissions.
28-
1. Select **Groups** and then select the role-assignable group you want to manage in PIM. You can search and filter the list.
27+
1. [Sign in to Azure AD](https://aad.portal.azure.com) with Privileged Role Administrator permissions.
28+
1. Select **Groups** and then select the role-assignable group you want to manage. You can search or filter the list.
2929

3030
![find a role-assignable group to manage in PIM](./media/groups-discover-groups/groups-list-in-azure-ad.png)
3131

3232
1. Open the group and select **Privileged access (Preview)**.
3333

3434
![Open the Privileged Identity Management experience](./media/groups-discover-groups/groups-discover-groups.png)
3535

36+
1. If your groups hasn't yet been brought under management in PIM, select **Enable privileged access** to consent to management. Only the Global Administrator or Owner of a group can give this consent.
37+
38+
![consent to manage the group in Privileged Identity Management if required](./media/groups-discover-groups/consent-page.png)
39+
3640
1. Start managing assignments in PIM.
3741

3842
![Manage assignments in Privileged Identity Management](./media/groups-discover-groups/groups-bring-under-management.png)
3943

4044
> [!NOTE]
41-
> Once a privileged access group is managed, it can't be taken out of management. This prevents another resource administrator from removing Privileged Identity Management settings.
45+
> Once a privileged access group is managed, it can't be taken out of management. This prevents another administrator from removing Privileged Identity Management settings.
4246
4347
## Next steps
4448

Loading
Loading
Loading
179 KB
Loading

articles/aks/availability-zones.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ You need the Azure CLI version 2.0.76 or later installed and configured. Run `a
2424

2525
AKS clusters can currently be created using availability zones in the following regions:
2626

27+
* Australia East
2728
* Central US
2829
* East US 2
2930
* East US

articles/aks/update-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ When you want to update the credentials for an AKS cluster, you can choose to ei
2727
* Update the credentials for the existing service principal.
2828
* Create a new service principal and update the cluster to use these new credentials.
2929

30-
> ![WARNING]
30+
> [!WARNING]
3131
> If you choose to create a *new* service principal, updating a large AKS cluster to use these credentials may take a long time to complete.
3232
3333
### Check the expiration date of your service principal

0 commit comments

Comments
 (0)