Skip to content

Commit 9d2b226

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into freshness120
2 parents 3647d25 + 49a5bb0 commit 9d2b226

File tree

118 files changed

+1823
-886
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

118 files changed

+1823
-886
lines changed

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The Azure AD default for browser session persistence allows users on personal de
5050
Conditional access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about conditional access, see [What is conditional access in Azure Active Directory?](overview.md#license-requirements)
5151

5252
> [!WARNING]
53-
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on October 15 and replace it with the conditional access authentication session management feature.
53+
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on November 1 and replace it with the conditional access authentication session management feature.
5454
5555
### Policy 1: Sign-in frequency control
5656

Loading
Loading

articles/active-directory/privileged-identity-management/pim-how-to-use-audit-log.md

Lines changed: 33 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -11,54 +11,60 @@ ms.service: active-directory
1111
ms.topic: conceptual
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 02/14/2017
14+
ms.date: 06/10/2019
1515
ms.author: rolyon
1616
ms.custom: pim
1717

1818
ms.collection: M365-identity-device-management
1919
---
2020
# View audit history for Azure AD roles in PIM
21-
You can use the Azure Active Directory (Azure AD) Privileged Identity Management (PIM) audit history to see all the user assignments and activations within a given time period for all privileged roles. If you want to see the full audit history of activity in your tenant, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory access and usage reports.](../reports-monitoring/overview-reports.md)
2221

23-
## Navigate to audit history
24-
From the [Azure portal](https://portal.azure.com) dashboard, select the **Azure AD Privileged Identity Management** app. From there, access the audit history by clicking **Manage privileged roles** > **Audit history** in the PIM dashboard.
22+
You can use the Azure Active Directory (Azure AD) Privileged Identity Management (PIM) audit history to see all the role assignments and activations within the past 30 days for all privileged roles. If you want to see the full audit history of activity in your directory, including administrator, end user, and synchronization activity, you can use the [Azure Active Directory security and activity reports](../reports-monitoring/overview-reports.md).
2523

26-
![Audit history](media/azure-ad-pim-approval-workflow/image021.png)
24+
## View audit history
2725

28-
> [!NOTE]
29-
> You can sort the data by Action, and look for “Activation Approved”
26+
Follow these steps to view the audit history for Azure AD roles.
3027

28+
1. Sign in to [Azure portal](https://portal.azure.com/) with a user that is a member of the [Privileged Role Administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
3129

32-
## Audit history graph
33-
You can use the audit history to view the total activations, max activations per day, and average activations per day in a line graph. You can also filter the data by role if there is more than one role in the audit history.
30+
1. Open **Azure AD Privileged Identity Management**.
3431

35-
Use the **time**, **action**, and **role** buttons to sort the history.
32+
1. Click **Azure AD roles**.
3633

37-
## Audit history list
38-
The columns in the audit history list are:
34+
1. Click **Directory roles audit history**.
3935

40-
* **Requestor** - the user who requested the role activation or change. If the value is "Azure System", check the Azure audit history for more information.
41-
* **User** - the user who is activating or assigned to a role.
42-
* **Role** - the role assigned or activated by the user.
43-
* **Action** - the actions taken by the requestor. This can include assignment, unassignment, activation, or deactivation.
44-
* **Time** - when the action occurred.
45-
* **Reasoning** - if any text was entered into the reason field during activation, it will show up here.
46-
* **Expiration** - only relevant for activation of roles.
36+
Depending on your audit history, a column chart is displayed along with the total activations, max activations per day, and average activations per day.
37+
38+
![Directory roles audit history](media/pim-how-to-use-audit-log/directory-roles-audit-history.png)
39+
40+
At the bottom of the page, a table is displayed with information about each action in the available audit history. The columns have the following meanings:
41+
42+
| Column | Description |
43+
| --- | --- |
44+
| Time | When the action occurred. |
45+
| Requestor | User who requested the role activation or change. If the value is **Azure System**, check the Azure audit history for more information. |
46+
| Action | Actions taken by the requestor. Actions can include Assign, Unassign, Activate, Deactivate, or AddedOutsidePIM. |
47+
| Member | User who is activating or assigned to a role. |
48+
| Role | Role assigned or activated by the user. |
49+
| Reasoning | Text that was entered into the reason field during activation. |
50+
| Expiration | When an activated role expires. Applies only to eligible role assignments. |
51+
52+
1. To sort the audit history, click the **Time**, **Action**, and **Role** buttons.
4753

4854
## Filter audit history
49-
You can filter the information that shows up in the audit history by clicking the **Filter** button. The **Update chart parameters blade** will appear.
5055

51-
After you set the filters, click **Update** to filter the data in the history. If the data doesn't appear right away, refresh the page.
56+
1. At the top of the audit history page, click the **Filter** button.
57+
58+
The **Update chart parameters** pane appears.
59+
60+
1. In **Time range**, select a time range.
5261

53-
### Change the date range
54-
Use the **Today**, **Past Week**, **Past Month**, or **Custom** buttons to change the time range of the audit history.
62+
1. In **Roles**, add checkmarks for the roles you want to view.
5563

56-
When you choose the **Custom** button, you will be given a **From** date field and a **To** date field to specify a range of dates for the history. You can either enter the dates in MM/DD/YYYY format or click on the **calendar** icon and choose the date from a calendar.
64+
![Update chart parameters pane](media/pim-how-to-use-audit-log/update-chart-parameters.png)
5765

58-
### Change the roles included in the history
59-
Check or uncheck the **Role** checkbox next to each role to include or exclude it from the history.
66+
1. Click **Done** to view the filtered audit history.
6067

61-
<!--Every topic should have next steps and links to the next logical set of content to keep the customer engaged-->
6268
## Next steps
6369

6470
- [View activity and audit history for Azure resource roles in PIM](azure-pim-resource-rbac.md)

articles/active-directory/saas-apps/pluralsight-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ To configure Azure AD single sign-on with Pluralsight, perform the following ste
114114
> [!NOTE]
115115
> These values are not real. Update these values with the actual Sign-On URL and Reply URL. Contact [Pluralsight Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
116116

117-
5. Pluralsight application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
117+
5. Pluralsight application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
118118
![image](common/edit-attribute.png)
119119

120120
>[!NOTE]

articles/active-directory/saas-apps/smartdraw-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ To configure Azure AD single sign-on with SmartDraw, perform the following steps
113113
> [!NOTE]
114114
> The Sign-on URL value is not real. You will update the Sign-on URL value with the actual Sign-on URL, which is explained later in the tutorial. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
115115

116-
6. SmartDraw application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
116+
6. SmartDraw application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
117117

118118
![image](common/edit-attribute.png)
119119

@@ -172,13 +172,13 @@ To configure Azure AD single sign-on with SmartDraw, perform the following steps
172172

173173
a. In the **Your Domain (like acme.com)** textbox, type your domain.
174174

175-
b. Copy the **Your SP Initiated Login Url will be** for your instance and paste it in Sign-on URL textbox in **Basic SAML Configuration** on Azure portal.
175+
b. Copy the **Your SP Initiated Login Url will be** for your instance and paste it in Sign-on URL textbox in **Basic SAML Configuration** on Azure portal.
176176

177177
c. In the **Security Groups to Allow SmartDraw Access** textbox, type **Everyone**.
178178

179179
d. In the **Your SAML Issuer Url** textbox, paste the value of **Azure AD Identifier** which you have copied from the Azure portal.
180180

181-
e. In Notepad, open the Metadata XML file that you downloaded from the Azure portal, copy its content, and then paste it into the **Your SAML MetaData** box.
181+
e. In Notepad, open the Metadata XML file that you downloaded from the Azure portal, copy its content, and then paste it into the **Your SAML MetaData** box.
182182

183183
f. Click **Save Configuration**
184184

articles/active-directory/saas-apps/tinfoil-security-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,9 +101,9 @@ To configure Azure AD single sign-on with TINFOIL SECURITY, perform the followin
101101

102102
![TINFOIL SECURITY Domain and URLs single sign-on information](common/preintegrated.png)
103103

104-
5. Your TINFOIL SECURITY application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
104+
5. Your TINFOIL SECURITY application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
105105

106-
    ![image](common/edit-attribute.png)
106+
![image](common/edit-attribute.png)
107107

108108
6. In addition to above, TINFOIL SECURITY application expects few more attributes to be passed back in SAML response. In the **User Claims** section on the **User Attributes** dialog, perform the following steps to add SAML token attribute as shown in the below table:
109109

articles/active-directory/saas-apps/zoom-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ To configure Azure AD single sign-on with Zoom, perform the following steps:
110110
> [!NOTE]
111111
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Zoom Client support team](https://support.zoom.us/hc/en-us) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
112112

113-
5. Zoom application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
113+
5. Zoom application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes. Click **Edit** icon to open **User Attributes** dialog.
114114

115115
![image](common/edit-attribute.png)
116116

articles/app-service/containers/configure-language-java.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -476,9 +476,7 @@ App Service for Linux supports two runtimes for managed hosting of Java web appl
476476
477477
### JDK versions and maintenance
478478
479-
Azure's supported Java Development Kit (JDK) is [Zulu](https://www.azul.com/downloads/azure-only/zulu/) provided through [Azul Systems](https://www.azul.com/).
480-
481-
Major version updates will be provided through new runtime options in Azure App Service for Linux. Customers update to these newer versions of Java by configuring their App Service deployment and are responsible for testing and ensuring the major update meets their needs.
479+
Azul Zulu Enterprise builds of OpenJDK are a no-cost, multi-platform, production-ready distribution of the OpenJDK for Azure and Azure Stack backed by Microsoft and Azul Systems. They contain all the components for building and running Java SE applications. You can install the JDK from [Java JDK Installation](https://aka.ms/azure-jdks).
482480
483481
Supported JDKs are automatically patched on a quarterly basis in January, April, July, and October of each year.
484482
@@ -490,18 +488,6 @@ Patches and fixes for major security vulnerabilities will be released as soon as
490488
491489
If a supported Java runtime will be retired, Azure developers using the affected runtime will be given a deprecation notice at least six months before the runtime is retired.
492490
493-
### Local development
494-
495-
Developers can download the Production Edition of Azul Zulu Enterprise JDK for local development from [Azul's download site](https://www.azul.com/downloads/azure-only/zulu/).
496-
497-
### Development support
498-
499-
Product support for the [Azure-supported Azul Zulu JDK](https://www.azul.com/downloads/azure-only/zulu/) is available through when developing for Azure or [Azure Stack](https://azure.microsoft.com/overview/azure-stack/) with a [qualified Azure support plan](https://azure.microsoft.com/support/plans/).
500-
501-
### Runtime support
502-
503-
Developers can [open an issue](/azure/azure-supportability/how-to-create-azure-support-request) with the Azul Zulu JDKs through Azure Support if they have a [qualified support plan](https://azure.microsoft.com/support/plans/).
504-
505491
## Next steps
506492
507493
Visit the [Azure for Java Developers](/java/azure/) center to find Azure quickstarts, tutorials, and Java reference documentation.

0 commit comments

Comments
 (0)