Skip to content

Commit a128595

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into opentelemetry-enable-2
2 parents dd7606d + 8a70ea7 commit a128595

File tree

661 files changed

+7562
-4923
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

661 files changed

+7562
-4923
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 46 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,6 @@
7272
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/azure-api-for-fhir-additional-settings",
7373
"redirect_document_id": false
7474
},
75-
{
76-
"source_path_from_root": "/articles/healthcare-apis/configure-azure-rbac.md",
77-
"redirect_url": "/azure/healthcare-apis/fhir/configure-azure-rbac",
78-
"redirect_document_id": true
79-
},
8075
{
8176
"source_path_from_root": "/articles/healthcare-apis/configure-cross-origin-resource-sharing.md",
8277
"redirect_url": "/azure/healthcare-apis/fhir/configure-cross-origin-resource-sharing",
@@ -222,12 +217,7 @@
222217
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/access-fhir-postman-tutorial",
223218
"redirect_document_id": true
224219
},
225-
{
226-
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-azure-rbac.md",
227-
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/configure-azure-rbac",
228-
"redirect_document_id": true
229-
},
230-
{
220+
{
231221
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-database.md",
232222
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/configure-database",
233223
"redirect_document_id": true
@@ -457,5 +447,50 @@
457447
"redirect_url": "/azure/healthcare-apis/security-controls-policy",
458448
"redirect_document_id": true
459449
},
450+
{
451+
"source_path_from_root": "/articles/healthcare-apis/fhir/azure-active-directory-identity-configuration.md",
452+
"redirect_url": "/azure/healthcare-apis/authentication-authorization",
453+
"redirect_document_id": true
454+
},
455+
{
456+
"source_path_from_root": "/articles/healthcare-apis/fhir/fhir-service-access-token-validation.md",
457+
"redirect_url": "/azure/healthcare-apis/get-access-token",
458+
"redirect_document_id": true
459+
},
460+
{
461+
"source_path_from_root": "/articles/healthcare-apis/fhir/get-healthcare-apis-access-token-cli.md",
462+
"redirect_url": "/azure/healthcare-apis/get-access-token",
463+
"redirect_document_id": false
464+
},
465+
{
466+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-get-access-token-azure-cli.md",
467+
"redirect_url": "/azure/healthcare-apis/get-access-token",
468+
"redirect_document_id": false
469+
},
470+
{
471+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-register-service-client-application.md",
472+
"redirect_url": "/azure/healthcare-apis/register-application",
473+
"redirect_document_id": true
474+
},
475+
{
476+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-register-public-application.md",
477+
"redirect_url": "/azure/healthcare-apis/register-application",
478+
"redirect_document_id": false
479+
},
480+
{
481+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-register-confidential-client-application.md",
482+
"redirect_url": "/azure/healthcare-apis/register-application",
483+
"redirect_document_id": false
484+
},
485+
{
486+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-configure-azure-rbac.md",
487+
"redirect_url": "/azure/healthcare-apis/configure-azure-rbac",
488+
"redirect_document_id": true
489+
},
490+
{
491+
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-azure-rbac-for-fhir.md",
492+
"redirect_url": "/azure/healthcare-apis/configure-azure-rbac",
493+
"redirect_document_id": false
494+
}
460495
]
461496
}

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47313,7 +47313,12 @@
4731347313
},
4731447314
{
4731547315
"source_path_from_root": "/articles/aks/open-service-mesh-disable-add-on.md",
47316-
"redirect_url": "/azure/aks/open-service-mesh-deploy-addon-az-cli",
47316+
"redirect_url": "/azure/aks/oopen-service-mesh-uninstall-add-on",
47317+
"redirect_document_id": false
47318+
},
47319+
{
47320+
"source_path_from_root": "/articles/aks/open-service-mesh-open-source-observability.md",
47321+
"redirect_url": "/azure/aks/open-service-mesh-azure-monitor",
4731747322
"redirect_document_id": false
4731847323
},
4731947324
{

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -639,7 +639,7 @@
639639
- name: Getting help
640640
href: ../active-directory/develop/developer-support-help-options.md
641641
- name: Pricing
642-
href: https://azure.microsoft.com/pricing/details/active-directory-b2c/
642+
href: https://azure.microsoft.com/pricing/details/active-directory/external-identities/
643643
- name: Pricing calculator
644644
href: https://azure.microsoft.com/pricing/calculator/
645645
- name: Service updates

articles/active-directory-b2c/error-codes.md

Lines changed: 93 additions & 93 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/extensions-app.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Extensions app in Azure Active Directory B2C
3+
titleSuffix: Azure AD B2C
34
description: Restoring the b2c-extensions-app.
45
services: active-directory-b2c
56
author: kengaderdus
@@ -13,7 +14,7 @@ ms.author: kengaderdus
1314
ms.subservice: B2C
1415
---
1516

16-
# Azure AD B2C: Extensions app
17+
# Extensions app in Azure AD B2C
1718

1819
When an Azure AD B2C directory is created, an app called **b2c-extensions-app** is automatically created inside the new directory. This app is visible in *App registrations*. It is used by the Azure AD B2C service to store information about users and custom attributes. If the app is deleted, Azure AD B2C will not function correctly and your production environment will be affected.
1920

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ The following SAML application scenarios are supported via your own metadata end
427427
* Specify multiple logout URLs or POST binding for the logout URL in the application or service principal object.
428428
* Specify a signing key to verify relying party requests in the application or service principal object.
429429
* Specify a token encryption key in the application or service principal object.
430-
* Specify IdP-initiated sign-on, where the identity provider is Azure AD B2C.
430+
* [Specify IdP-initiated sign-on, where the identity provider is Azure AD B2C](saml-service-provider-options.md#configure-idp-initiated-flow).
431431

432432
## Next steps
433433

articles/active-directory-domain-services/concepts-resource-forest.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,11 @@ A *forest* is a logical construct used by Active Directory Domain Services (AD D
2727

2828
In an Azure AD DS managed domain, the forest only contains one domain. On-premises AD DS forests often contain many domains. In large organizations, especially after mergers and acquisitions, you may end up with multiple on-premises forests that each then contain multiple domains.
2929

30-
By default, a managed domain is created as a *user* forest. This type of forest synchronizes all objects from Azure AD, including any user accounts created in an on-premises AD DS environment. User accounts can directly authenticate against the managed domain, such as to sign in to a domain-joined VM. A user forest works when the password hashes can be synchronized and users aren't using exclusive sign-in methods like smart card authentication.
30+
By default, a managed domain is created as a *user* forest. This type of forest synchronizes all objects from Azure AD, including any user accounts created in an on-premises AD DS environment. User accounts can directly authenticate against the managed domain, such as to sign in to a domain-joined VM. A user forest works when the password hashes can be synchronized, and users aren't using exclusive sign-in methods like smart card authentication.
3131

3232
In a managed domain *resource* forest, users authenticate over a one-way forest *trust* from their on-premises AD DS. With this approach, the user objects and password hashes aren't synchronized to the managed domain. The user objects and credentials only exist in the on-premises AD DS. This approach lets enterprises host resources and application platforms in Azure that depend on classic authentication such LDAPS, Kerberos, or NTLM, but any authentication issues or concerns are removed.
3333

34-
Resource forests also provide the capability to lift-and-shift your applications one component at a time. Many legacy on-premises applications are multi-tiered, often using a web server or front end and many database-related components. These tiers make it hard to lift-and-shift the entire application to the cloud in one step. With resource forests, you can lift your application to the cloud in phased approach, which makes it easier to move your application to Azure.
34+
Resource forests also provide the capability to lift-and-shift your applications one component at a time. Many legacy on-premises applications are multi-tiered, often using a web server or front end and many database-related components. These tiers make it hard to lift-and-shift the entire application to the cloud in one step. With resource forests, you can lift your application to the cloud in a phased approach, which makes it easier to move your application to Azure.
3535

3636
## What are trusts?
3737

@@ -49,7 +49,7 @@ Trusts are also be configured to handle additional trust relationships in one of
4949
* **Nontransitive** - The trust exists only between the two trust partner domains.
5050
* **Transitive** - Trust automatically extends to any other domains that either of the partners trusts.
5151

52-
In some cases, trust relationships are automatically established when domains are created. Other times, you must choose a type of trust and explicitly establish the appropriate relationships. The specific types of trusts used and the structure of those trust relationships depend on how the AD DS directory is organized, and whether different versions of Windows coexist on the network.
52+
In some cases, trust relationships are automatically established when domains are created. Other times, you must choose a type of trust and explicitly establish the appropriate relationships. The specific types of trusts used and the structure of those trust relationships depend on how the AD DS directory is organized and whether different versions of Windows coexist on the network.
5353

5454
## Trusts between two forests
5555

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
- name: Customize attribute mappings
1818
href: customize-application-attributes.md
1919
- name: App specific provisioning tutorials
20-
href: /azure/active-directory/saas-apps
20+
href: /azure/active-directory/saas-apps/tutorial-list
2121
- name: Provisioning to SQL based apps
2222
href: tutorial-ecma-sql-connector.md
2323
- name: Concepts
@@ -129,7 +129,7 @@
129129
- name: Microsoft Q&A question page
130130
href: /answers/topics/azure-active-directory.html
131131
- name: Pricing
132-
href: https://azure.microsoft.com/pricing/details/active-directory
132+
href: https://azure.microsoft.com/pricing/details/active-directory/
133133
- name: Service updates
134134
href: https://azure.microsoft.com/updates/?product=active-directory
135135
- name: Stack Overflow

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: overview
1010
ms.workload: identity
11-
ms.date: 05/28/2021
11+
ms.date: 11/15/2021
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -19,11 +19,9 @@ In Azure Active Directory (Azure AD), the term *app provisioning* refers to auto
1919

2020
![Diagram that shows provisioning scenarios.](../governance/media/what-is-provisioning/provisioning.png)
2121

22-
Azure AD to software as a service (SaaS) application provisioning refers to automatically creating user identities and roles in the cloud ([SaaS](https://azure.microsoft.com/overview/what-is-saas/)) applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and more.
22+
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and more.
2323

24-
Azure AD supports provisioning users into SaaS applications and applications hosted on-premises or an infrastructure as a service (IaaS) solution such as a virtual machine. You might have a legacy application that relies on an LDAP user store or a SQL database. By using the Azure AD provisioning service, you can create, update, and delete users into on-premises applications without having to open up firewalls or deal with TCP ports.
25-
26-
Using lightweight agents, you can provision users into on-premises applications and govern access. When Azure AD is used with the application proxy, you can manage access to your on-premises application and provide automatic user provisioning (with the provisioning service) and single sign-on (with app proxy).
24+
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://aka.ms/scimoverview), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-scim-provisioning) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](https://docs.microsoft.com/azure/active-directory/app-provisioning/on-premises-ldap-connector-configure) user store or a [SQL](https://docs.microsoft.com/azure/active-directory/app-provisioning/tutorial-ecma-sql-connector) database, Azure AD can support those as well.
2725

2826
App provisioning lets you:
2927

articles/active-directory/app-proxy/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
expanded: true
1212
items:
1313
- name: List of app integration tutorials
14-
href: /azure/active-directory/saas-apps/
14+
href: /azure/active-directory/saas-apps/tutorial-list
1515
- name: Add an on-premises app with Application Proxy
1616
href: application-proxy-add-on-premises-application.md
1717
- name: Samples
@@ -170,7 +170,7 @@
170170
- name: Microsoft Q&A question page
171171
href: /answers/topics/azure-active-directory.html
172172
- name: Pricing
173-
href: https://azure.microsoft.com/pricing/details/active-directory
173+
href: https://azure.microsoft.com/pricing/details/active-directory/
174174
- name: Service updates
175175
href: https://azure.microsoft.com/updates/?product=active-directory
176176
- name: Stack Overflow

0 commit comments

Comments
 (0)