Skip to content

Commit 937d4b3

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ertroubleshooting
2 parents df58179 + e0b3827 commit 937d4b3

File tree

604 files changed

+6980
-4168
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

604 files changed

+6980
-4168
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2523,6 +2523,11 @@
25232523
"redirect_url": "/azure/frontdoor/manager",
25242524
"redirect_document_id": false
25252525
},
2526+
{
2527+
"source_path_from_root": "/articles/frontdoor/standard-premium/faq.md",
2528+
"redirect_url": "/azure/frontdoor/front-door-faq",
2529+
"redirect_document_id": false
2530+
},
25262531
{
25272532
"source_path_from_root": "/articles/aks/aks-resource-health.md",
25282533
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -199,6 +199,11 @@
199199
"source_path_from_root": "/articles/virtual-desktop/windows-10-multisession-faq.yml",
200200
"redirect_url": "/azure/virtual-desktop/windows-multisession-faq",
201201
"redirect_document_id": true
202+
},
203+
{
204+
"source_path_from_root": "/articles/virtual-desktop/install-client-per-user.md",
205+
"redirect_url": "/azure/virtual-desktop/install-windows-client-per-user",
206+
"redirect_document_id": true
202207
}
203208
]
204209
}

articles/active-directory-b2c/cookie-definitions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ The following table lists the cookies used in Azure AD B2C.
4747
| `x-ms-cpim-ctx` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Context |
4848
| `x-ms-cpim-rp` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing membership data for the resource provider tenant. |
4949
| `x-ms-cpim-rc` | b2clogin.com, login.microsoftonline.com, branded domain | End of [browser session](session-behavior.md) | Used for storing the relay cookie. |
50+
| `x-ms-cpim-geo` | b2clogin.com, login.microsoftonline.com, branded domain | 1 Hour | Used as a hint to determine the resource tenants home geographic location. |
5051

5152
## Cross-Site request forgery token
5253

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 08/01/2023
4+
ms.date: 09/01/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,13 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## August 2023
19+
20+
### Updated articles
21+
22+
- [Page layout versions](page-layout.md) - Editorial updates
23+
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md) - Oauth Bearer Authentication updated to GA
24+
1825
## June 2023
1926

2027
### New articles
@@ -52,10 +59,3 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
5259
- [Build a global identity solution with funnel-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
5360
- [Use the Azure portal to create and delete consumer users in Azure AD B2C](manage-users-portal.md)
5461

55-
## April 2023
56-
57-
### Updated articles
58-
59-
- [Configure Transmit Security with Azure Active Directory B2C for passwordless authentication](partner-bindid.md) - Update partner-bindid.md
60-
- [Tutorial: Enable secure hybrid access for applications with Azure Active Directory B2C and F5 BIG-IP](partner-f5.md) - Update partner-f5.md
61-

articles/active-directory-domain-services/faqs.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 08/01/2023
14+
ms.date: 09/05/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Azure Active Directory (AD) Domain Services
1717
summary: This page answers frequently asked questions about Azure Active Directory Domain Services.
@@ -106,6 +106,11 @@ sections:
106106
answer: |
107107
Any user account that's part of the managed domain can join a VM. Members of the *Azure AD DC Administrators* group are granted remote desktop access to machines that have been joined to the managed domain.
108108
109+
- question: |
110+
Is there any quota for the number of machines that I can join to the domain?
111+
answer: |
112+
There's no quota in Azure AD DS for domain-joined machines.
113+
109114
- question: |
110115
Do I have domain administrator privileges for the managed domain provided by Azure AD Domain Services?
111116
answer: |

articles/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Next, if one or more of the users that will need access to the application do no
4343
The following sections outline how to create extension attributes for a tenant with cloud only users, and for a tenant with Active Directory users.
4444

4545
## Create an extension attribute in a tenant with cloud only users
46-
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you do not have any users who need that attribute and originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
46+
You can use Microsoft Graph and PowerShell to extend the user schema for users in Azure AD. This is necessary if you have any users who need that attribute and do not originate in on-premises Active Directory. (If you do have Active Directory, then continue reading below in the section on how to [use the Azure AD Connect directory extension feature to synchronize the attribute to Azure AD](#create-an-extension-attribute-using-azure-ad-connect).)
4747

4848
Once schema extensions are created, these extension attributes are automatically discovered when you next visit the provisioning page in the Azure portal, in most cases.
4949

@@ -82,7 +82,7 @@ Content-type: application/json
8282
"extension_inputAppId_extensionName": "extensionValue"
8383
}
8484
```
85-
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get).
85+
Finally, verify the attribute for the user. To learn more, see [Get a user](/graph/api/user-get). Note that the Graph v1.0 does not by default return any of a user's directory extension attributes, unless the attributes are specified in the request as one of the properties to return.
8686

8787
```json
8888
GET https://graph.microsoft.com/v1.0/users/{id}?$select=displayName,extension_inputAppId_extensionName

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: conceptual
10-
ms.date: 08/22/2023
10+
ms.date: 08/31/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -99,7 +99,7 @@ This setting allows configuration of lifetime for token issued by Azure Active D
9999

100100
Now that you understand how different settings works and the recommended configuration, it's time to check your tenants. You can start by looking at the sign-in logs to understand which session lifetime policies were applied during sign-in.
101101

102-
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see [Authentication details](../reports-monitoring/concept-sign-in-log-activity-details.md#authentication-details).
102+
Under each sign-in log, go to the **Authentication Details** tab and explore **Session Lifetime Policies Applied**. For more information, see the [Learn about the sign-in log activity details](../reports-monitoring/concept-sign-in-log-activity-details.md) article.
103103

104104
![Screenshot of authentication details.](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/details.png)
105105

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-controller-after-onboarding.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,17 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 08/24/2023
1212
ms.author: jfields
1313
---
1414

1515
# Enable or disable the controller after onboarding is complete
1616

17-
With the controller, you determine what level of access to provide Permissions Management.
17+
With the controller, you can decide what level of access to grant in Permissions Management.
1818

19-
* Enable to grant read and write access to your environment(s). You can manage permissions and remediate through Permissions Management.
19+
* Enable to grant read and write access to your environments. You can right-size permissions and remediate through Permissions Management.
2020

21-
* Disable to grant read-only access to your environment(s).
21+
* Disable to grant read-only access to your environments.
2222

2323

2424
This article describes how to enable the controller in Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) after onboarding is complete.
@@ -30,7 +30,7 @@ This article also describes how to disable the controller in Microsoft Azure and
3030
## Enable the controller in AWS
3131

3232
> [!NOTE]
33-
> You can enable the controller in AWS if you disabled it during onboarding. Once you enable the controller, you can’t disable it at this time.
33+
> You can enable the controller in AWS if you disabled it during onboarding. Once you enable the controller in AWS, you can’t disable it.
3434
3535
1. Sign in to the AWS console of the member account in a separate browser window.
3636
1. Go to the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.

articles/active-directory/develop/application-consent-experience.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following diagram and table provide information about the building blocks of
4242
| 5 | Publisher name and verification | The blue "verified" badge means that the app publisher has verified their identity using a Microsoft Partner Network account and has completed the verification process. If the app is publisher verified, the publisher name is displayed. If the app isn't publisher verified, "Unverified" is displayed instead of a publisher name. For more information, read about [Publisher Verification](publisher-verification-overview.md). Selecting the publisher name displays more app info as available, such as the publisher name, publisher domain, date created, certification details, and reply URLs. |
4343
| 6 | Microsoft 365 Certification | The Microsoft 365 Certification logo means that an app has been vetted against controls derived from leading industry standard frameworks, and that strong security and compliance practices are in place to protect customer data. For more information, read about [Microsoft 365 Certification](/microsoft-365-app-certification/docs/enterprise-app-certification-guide).|
4444
| 7 | Publisher information | Displays whether the application is published by Microsoft. |
45-
| 8 | Permissions | This list contains the permissions being requested by the client application. Users should always evaluate the types of permissions being requested to understand what data the client application will be authorized to access on their behalf if they accept. As an application developer it's best to request access, to the permissions with the least privilege. |
45+
| 8 | Permissions | This list contains the permissions being requested by the client application. Users should always evaluate the types of permissions being requested to understand what data the client application will be authorized to access on their behalf if they accept. As an application developer, it's best to request access to the permissions with the least privilege. |
4646
| 9 | Permission description | This value is provided by the service exposing the permissions. To see the permission descriptions, you must toggle the chevron next to the permission. |
4747
| 10 | https://myapps.microsoft.com | This is the link where users can review and remove any non-Microsoft applications that currently have access to their data. |
4848
| 11 | Report it here | This link is used to report a suspicious app if you don't trust the app, if you believe the app is impersonating another app, if you believe the app will misuse your data, or for some other reason. |

articles/active-directory/develop/howto-add-app-roles-in-apps.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,17 @@ To create an app role by using the Azure portal's user interface:
6363

6464
When the app role is set to enabled, any users, applications or groups who are assigned has it included in their tokens. These can be access tokens when your app is the API being called by an app or ID tokens when your app is signing in a user. If set to disabled, it becomes inactive and no longer assignable. Any previous assignees will still have the app role included in their tokens, but it has no effect as it is no longer actively assignable.
6565

66+
## Assign application owner
67+
68+
If you have not already done so, you'll need to assign yourself as the application owner.
69+
70+
1. In your app registration, under **Manage**, select **Owners**, and **Add owners**.
71+
1. In the new window, find and select the owner(s) that you want to assign to the application. Selected owners appear in the right panel. Once done, confirm with **Select**. The app owner(s) will now appear in the owner's list.
72+
73+
>[!NOTE]
74+
>
75+
> Ensure that both the API application and the application you want to add permissions to both have an owner, otherwise the API will not be listed when requesting API permissions.
76+
6677
## Assign users and groups to roles
6778

6879
Once you've added app roles in your application, you can assign users and groups to the roles. Assignment of users and groups to roles can be done through the portal's UI, or programmatically using [Microsoft Graph](/graph/api/user-post-approleassignments). When the users assigned to the various app roles sign in to the application, their tokens will have their assigned roles in the `roles` claim.

0 commit comments

Comments
 (0)