Skip to content

Commit 9ddbf78

Browse files
authored
Merge pull request #203263 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 40d78ac + ea80e2a commit 9ddbf78

File tree

205 files changed

+2053
-1118
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

205 files changed

+2053
-1118
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2417,7 +2417,7 @@
24172417
},
24182418
{
24192419
"source_path_from_root": "/articles/active-directory/develop/active-directory-graph-api.md",
2420-
"redirect_url": "https://docs.microsoft.com/graph/migrate-azure-ad-graph-planning-checklist",
2420+
"redirect_url": "/graph/migrate-azure-ad-graph-planning-checklist",
24212421
"redirect_document_id": false
24222422
},
24232423
{
@@ -10800,6 +10800,5 @@
1080010800
"redirect_url": "/azure/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on",
1080110801
"redirect_document_id": false
1080210802
}
10803-
1080410803
]
1080510804
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@
138138
},
139139
{
140140
"source_path_from_root": "/articles/azure-monitor/app/troubleshoot-portal-connectivity.md",
141-
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/troubleshoot-portal-connectivity",
141+
"redirect_url": "/troubleshoot/azure/azure-monitor/app-insights/troubleshoot-portal-connectivity",
142142
"redirect_document_id": false
143143
},
144144
{
@@ -168,7 +168,7 @@
168168
},
169169
{
170170
"source_path_from_root": "/articles/azure-monitor/app/auto-instrumentation-troubleshoot.md",
171-
"redirect_url": "https://docs.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/auto-instrumentation-troubleshoot",
171+
"redirect_url": "/troubleshoot/azure/azure-monitor/app-insights/auto-instrumentation-troubleshoot",
172172
"redirect_document_id": false
173173
},
174174
{
@@ -313,4 +313,3 @@
313313
}
314314
]
315315
}
316-

.openpublishing.redirection.json

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -30032,42 +30032,42 @@
3003230032
},
3003330033
{
3003430034
"source_path_from_root": "/articles/cognitive-services/Speech-Service/support.md",
30035-
"redirect_url": "http://docs.microsoft.com/azure/cognitive-services/cognitive-services-support-options?context=/azure/cognitive-services/speech-service/context/context",
30035+
"redirect_url": "/azure/cognitive-services/cognitive-services-support-options?context=/azure/cognitive-services/speech-service/context/context",
3003630036
"redirect_document_id": true
3003730037
},
3003830038
{
3003930039
"source_path_from_root": "/articles/cognitive-services/Speech-Service/faq-text-to-speech.md",
30040-
"redirect_url": "http://docs.microsoft.com/azure/cognitive-services/speech-service/get-started-text-to-speech",
30040+
"redirect_url": "/azure/cognitive-services/speech-service/get-started-text-to-speech",
3004130041
"redirect_document_id": false
3004230042
},
3004330043
{
3004430044
"source_path_from_root": "/articles/cognitive-services/Speech-Service/speech-studio-test-model.md",
30045-
"redirect_url": "http://docs.microsoft.com/azure/cognitive-services/speech-service/speech-studio-overview",
30045+
"redirect_url": "/azure/cognitive-services/speech-service/speech-studio-overview",
3004630046
"redirect_document_id": true
3004730047
},
3004830048
{
3004930049
"source_path_from_root": "/articles/cognitive-services/Speech-Service/whats-new.md",
30050-
"redirect_url": "http://docs.microsoft.com/azure/cognitive-services/speech-service/overview",
30050+
"redirect_url": "/azure/cognitive-services/speech-service/overview",
3005130051
"redirect_document_id": false
3005230052
},
3005330053
{
3005430054
"source_path_from_root": "/articles/cognitive-services/Speech-Service/concepts-gating-overview.md",
30055-
"redirect_url": "https://docs.microsoft.com/legal/cognitive-services/speech-service/custom-neural-voice/transparency-note-custom-neural-voice",
30055+
"redirect_url": "/legal/cognitive-services/speech-service/custom-neural-voice/transparency-note-custom-neural-voice",
3005630056
"redirect_document_id": false
3005730057
},
3005830058
{
3005930059
"source_path_from_root": "/articles/cognitive-services/Speech-Service/concepts-guidelines-responsible-deployment-synthetic.md",
30060-
"redirect_url": "https://docs.microsoft.com/legal/cognitive-services/speech-service/custom-neural-voice/concepts-guidelines-responsible-deployment-synthetic",
30060+
"redirect_url": "/legal/cognitive-services/speech-service/custom-neural-voice/concepts-guidelines-responsible-deployment-synthetic",
3006130061
"redirect_document_id": false
3006230062
},
3006330063
{
3006430064
"source_path_from_root": "/articles/cognitive-services/Speech-Service/concepts-disclosure-guidelines.md",
30065-
"redirect_url": "https://docs.microsoft.com/legal/cognitive-services/speech-service/custom-neural-voice/concepts-disclosure-guidelines",
30065+
"redirect_url": "/legal/cognitive-services/speech-service/custom-neural-voice/concepts-disclosure-guidelines",
3006630066
"redirect_document_id": false
3006730067
},
3006830068
{
3006930069
"source_path_from_root": "/articles/cognitive-services/Speech-Service/concepts-disclosure-patterns.md",
30070-
"redirect_url": "https://docs.microsoft.com/legal/cognitive-services/speech-service/custom-neural-voice/concepts-disclosure-patterns",
30070+
"redirect_url": "/legal/cognitive-services/speech-service/custom-neural-voice/concepts-disclosure-patterns",
3007130071
"redirect_document_id": false
3007230072
},
3007330073
{

articles/active-directory/develop/quickstart-v2-python-webapp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: "Quickstart: Add sign-in with Microsoft to a Python web app"
33
description: In this quickstart, learn how a Python web app can sign in users, get an access token from the Microsoft identity platform, and call the Microsoft Graph API.
44
services: active-directory
5-
author: CelesteDG
5+
author: henrymbuguakiarie
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: portal
1010
ms.workload: identity
1111
ms.date: 11/22/2021
1212
ROBOTS: NOINDEX
13-
ms.author: celested
13+
ms.author: henrymbugua
1414
ms.custom: aaddev, devx-track-python, "scenarios:getting-started", "languages:Python", mode-api
1515
---
1616

@@ -33,7 +33,7 @@ ms.custom: aaddev, devx-track-python, "scenarios:getting-started", "languages:Py
3333
>
3434
> - An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3535
> - [Python 2.7+](https://www.python.org/downloads/release/python-2713) or [Python 3+](https://www.python.org/downloads/release/python-364/)
36-
> - [Flask](http://flask.pocoo.org/), [Flask-Session](https://pypi.org/project/Flask-Session/), [requests](https://requests.kennethreitz.org/en/master/)
36+
> - [Flask](http://flask.pocoo.org/), [Flask-Session](https://pypi.org/project/Flask-Session/), [requests](https://github.com/psf/requests/graphs/contributors)
3737
> - [MSAL Python](https://github.com/AzureAD/microsoft-authentication-library-for-python)
3838
>
3939
> #### Step 1: Configure your application in Azure portal

articles/active-directory/fundamentals/active-directory-deployment-plans.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ From any of the plan pages, use your browser's Print to PDF capability to create
6262
| [Privileged Identity Management](../privileged-identity-management/pim-deployment-plan.md)| Azure AD Privileged Identity Management (PIM) helps you manage privileged administrative roles across Azure AD, Azure resources, and other Microsoft Online Services. PIM provides solutions like just-in-time access, request approval workflows, and fully integrated access reviews so you can identify, uncover, and prevent malicious activities of privileged roles in real time. |
6363
| [Reporting and Monitoring](../reports-monitoring/plan-monitoring-and-reporting.md)| The design of your Azure AD reporting and monitoring solution depends on your legal, security, and operational requirements as well as your existing environment and processes. This article presents the various design options and guides you to the right deployment strategy. |
6464
| [Access Reviews](../governance/deploy-access-reviews.md) | Access Reviews are an important part of your governance strategy, enabling you to know and manage who has access, and to what they have access. This article helps you plan and deploy access reviews to achieve your desired security and collaboration postures. |
65+
| [Identity governance for applications](../governance/identity-governance-applications-prepare.md) | As part of your organization's controls to meet your compliance and risk management objectives for managing access for critical applications, you can use Azure AD features to set up and enforce appropriate access.|
6566

6667
## Include the right stakeholders
6768

articles/active-directory/governance/TOC.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,16 @@
5858
- name: How-to guides
5959
expanded: true
6060
items:
61+
- name: Govern access to applications
62+
items:
63+
- name: Prepare
64+
href: identity-governance-applications-prepare.md
65+
- name: Define
66+
href: identity-governance-applications-define.md
67+
- name: Integrate
68+
href: identity-governance-applications-integrate.md
69+
- name: Deploy
70+
href: identity-governance-applications-deploy.md
6171
- name: Entitlement management
6272
items:
6373
- name: Common scenarios

articles/active-directory/governance/access-reviews-application-preparation.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.collection: M365-identity-device-management
2525

2626
[Azure Active Directory (Azure AD) Identity Governance](identity-governance-overview.md) allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources.
2727

28-
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Azure AD access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access.
28+
Organizations with compliance requirements or risk management plans will have sensitive or business-critical applications. The application sensitivity may be based on its purpose or the data it contains, such as financial information or personal information of the organization's customers. For those applications, only a subset of all the users in the organization will typically be authorized to have access, and access should only be permitted based on documented business requirements. Azure AD can be integrated with many popular SaaS applications, on-premises applications, and applications that your organization has developed, using [standard protocol](../fundamentals/auth-sync-overview.md) and API interfaces. Through these interfaces, Azure AD can be the authoritative source to control who has access to those applications. As you integrate your applications with Azure AD, you can then use Azure AD access reviews to recertify the users who have access to those applications, and remove access of those users who no longer need access. You can also use other features, including terms of use, conditional access and entitlement management, for governing access to applications, as described in [how to govern access to applications in your environment](identity-governance-applications-prepare.md).
2929

3030
## Prerequisites for reviewing access
3131

@@ -146,4 +146,5 @@ Once the reviews have started, you can monitor their progress, and update the ap
146146
## Next steps
147147

148148
* [Plan an Azure Active Directory access reviews deployment](deploy-access-reviews.md)
149-
* [Create an access review of a group or application](create-access-review.md)
149+
* [Create an access review of a group or application](create-access-review.md)
150+
* [Govern access to applications](identity-governance-applications-prepare.md)

articles/active-directory/governance/entitlement-management-access-package-approval-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ For a demonstration of how to add a multi-stage approval to a request policy, wa
4444
>[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4d1Jw]
4545
4646

47-
## Change approval settings of an existing access package
47+
## Change approval settings of an existing access package assignment policy
4848

49-
Follow these steps to specify the approval settings for requests for the access package:
49+
Follow these steps to specify the approval settings for requests for the access package through a policy:
5050

5151
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
5252

articles/active-directory/governance/entitlement-management-access-package-lifecycle-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,14 @@ ms.reviewer:
1717
ms.collection: M365-identity-device-management
1818

1919

20-
#Customer intent: As an administrator, I want detailed information about how I can edit an access package to include requestor infromation to screen requestors and get requestors the resources they need to perform their job.
20+
#Customer intent: As an administrator, I want detailed information about how I can edit an access package to include requestor information to screen requestors and get requestors the resources they need to perform their job.
2121

2222
---
2323
# Change lifecycle settings for an access package in Azure AD entitlement management
2424

2525
As an access package manager, you can change the lifecycle settings for assignments in an access package at any time by editing an existing policy. If you change the expiration date for assignments on a policy, the expiration date for requests that are already in a pending approval or approved state will not change.
2626

27-
This article describes how to change the lifecycle settings for an existing access package.
27+
This article describes how to change the lifecycle settings for an existing access package assignment policy.
2828

2929
## Open requestor information
3030
To ensure users have the right access to an access package, custom questions can be configured to ask users requesting access to certain access packages. Configuration options include: localization, required/optional, and text/multiple choice answer formats. Requestors will see the questions when they request the package and approvers see the answers to the questions to help them make their decision. Use the following steps to configure questions in an access package:

articles/active-directory/governance/entitlement-management-access-package-request-policy.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,13 @@ ms.collection: M365-identity-device-management
2222
---
2323
# Change request settings for an access package in Azure AD entitlement management
2424

25-
As an access package manager, you can change the users who can request an access package at any time by editing the policy or adding a new policy. This article describes how to change the request settings for an existing access package.
25+
As an access package manager, you can change the users who can request an access package at any time by editing a policy for access package assignment requests, or adding a new policy to the access package. This article describes how to change the request settings for an existing access package assignment policy.
2626

2727
## Choose between one or multiple policies
2828

2929
The way you specify who can request an access package is with a policy. Before creating a new policy or editing an existing policy in an access package, you need to determine how many policies the access package needs.
3030

31-
When you create an access package, you specify the request, approval and lifecycle settings, which are stored on the first policy of the access package. Most access packages will have a single policy, but a single access package can have multiple policies. You would create multiple policies for an access package if you want to allow different sets of users to be granted assignments with different request and approval settings.
31+
When you create an access package, you can specify the request, approval and lifecycle settings, which are stored on the first policy of the access package. Most access packages will have a single policy for users to request access, but a single access package can have multiple policies. You would create multiple policies for an access package if you want to allow different sets of users to be granted assignments with different request and approval settings.
3232

3333
For example, a single policy cannot be used to assign internal and external users to the same access package. However, you can create two policies in the same access package, one for internal users and one for external users. If there are multiple policies that apply to a user, they will be prompted at the time of their request to select the policy they would like to be assigned to. The following diagram shows an access package with two policies.
3434

@@ -40,14 +40,15 @@ For example, a single policy cannot be used to assign internal and external user
4040
| --- | --- |
4141
| I want all users in my directory to have the same request and approval settings for an access package | One |
4242
| I want all users in certain connected organizations to be able to request an access package | One |
43-
| I want to allow users in my directory and also users outside my directory to request an access package | Multiple |
44-
| I want to specify different approval settings for some users | Multiple |
45-
| I want some users access package assignments to expire while other users can extend their access | Multiple |
43+
| I want to allow users in my directory and also users outside my directory to request an access package | Two |
44+
| I want to specify different approval settings for some users | One for each group of users |
45+
| I want some users access package assignments to expire while other users can extend their access | One for each group of users |
46+
| I want users to request access and other users to be assigned access by an administrator | Two |
4647

4748
For information about the priority logic that is used when multiple policies apply, see [Multiple policies](entitlement-management-troubleshoot.md#multiple-policies
4849
).
4950

50-
## Open an existing access package and add a new policy of request settings
51+
## Open an existing access package and add a new policy with different request settings
5152

5253
If you have a set of users that should have different request and approval settings, you'll likely need to create a new policy. Follow these steps to start adding a new policy to an existing access package:
5354

@@ -160,9 +161,9 @@ Follow these steps if you want to bypass access requests and allow administrator
160161
> When assigning users to an access package, administrators will need to verify that the users are eligible for that access package based on the existing policy requirements. Otherwise, the users won't successfully be assigned to the access package. If the access package contains a policy that requires user requests to be approved, users can't be directly assigned to the package without necessary approval(s) from the designated approver(s).
161162
162163

163-
## Open and edit an existing policy of request settings
164+
## Open and edit an existing policy's request settings
164165

165-
To change the request and approval settings for an access package, you need to open the corresponding policy. Follow these steps to open and edit the request settings for an access package:
166+
To change the request and approval settings for an access package, you need to open the corresponding policy with those settings. Follow these steps to open and edit the request settings for an access package assignment policy:
166167

167168
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
168169

0 commit comments

Comments
 (0)