Skip to content

Commit a2bfd90

Browse files
authored
Merge pull request #253243 from MicrosoftDocs/main
9/28/2023 PM Publish
2 parents bbb7511 + 12a280a commit a2bfd90

File tree

165 files changed

+988
-941
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

165 files changed

+988
-941
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 130 deletions
Original file line numberDiff line numberDiff line change
@@ -14442,121 +14442,6 @@
1444214442
"redirect_url": "/azure/networking/fundamentals/networking-overview",
1444314443
"redirect_document_id": false
1444414444
},
14445-
{
14446-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview-create-using-portal.md",
14447-
"redirect_url": "/azure/network-watcher/connection-monitor-create-using-portal",
14448-
"redirect_document_id": false
14449-
},
14450-
{
14451-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview-create-using-arm-client.md",
14452-
"redirect_url": "/azure/network-watcher/connection-monitor-create-using-template",
14453-
"redirect_document_id": false
14454-
},
14455-
{
14456-
"source_path_from_root": "/articles/network-watcher/connection-monitor-preview.md",
14457-
"redirect_url": "/azure/network-watcher/connection-monitor-overview",
14458-
"redirect_document_id": false
14459-
},
14460-
{
14461-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-portal.md",
14462-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem",
14463-
"redirect_document_id": true
14464-
},
14465-
{
14466-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-cli.md",
14467-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-cli",
14468-
"redirect_document_id": true
14469-
},
14470-
{
14471-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-cli-nodejs.md",
14472-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-cli",
14473-
"redirect_document_id": false
14474-
},
14475-
{
14476-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-powershell.md",
14477-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-routing-problem-powershell",
14478-
"redirect_document_id": true
14479-
},
14480-
{
14481-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-portal.md",
14482-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem",
14483-
"redirect_document_id": true
14484-
},
14485-
{
14486-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-cli.md",
14487-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli",
14488-
"redirect_document_id": false
14489-
},
14490-
{
14491-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-cli-nodejs.md",
14492-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli",
14493-
"redirect_document_id": true
14494-
},
14495-
{
14496-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-powershell.md",
14497-
"redirect_url": "/azure/network-watcher/diagnose-vm-network-traffic-filtering-problem-powershell",
14498-
"redirect_document_id": true
14499-
},
14500-
{
14501-
"source_path_from_root": "/articles/network-watcher/migrate-to-connection-monitor-preview-from-connection-monitor.md",
14502-
"redirect_url": "/azure/network-watcher/migrate-to-connection-monitor-from-connection-monitor-classic",
14503-
"redirect_document_id": false
14504-
},
14505-
{
14506-
"source_path_from_root": "/articles/network-watcher/migrate-to-connection-monitor-preview-from-network-performance-monitor.md",
14507-
"redirect_url": "/azure/network-watcher/migrate-to-connection-monitor-from-network-performance-monitor",
14508-
"redirect_document_id": false
14509-
},
14510-
{
14511-
"source_path_from_root": "/articles/network-watcher/network-watcher-nsg-flow-logging-cli-nodejs.md",
14512-
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-cli",
14513-
"redirect_document_id": true
14514-
},
14515-
{
14516-
"source_path_from_root": "/articles/network-watcher/prepare-flow-log.md",
14517-
"redirect_url": "/azure/network-watcher/network-watcher-nsg-flow-logging-overview",
14518-
"redirect_document_id": true
14519-
},
14520-
{
14521-
"source_path_from_root": "/articles/network-watcher/network-watcher-packet-capture-manage-cli-nodejs.md",
14522-
"redirect_url": "/azure/network-watcher/network-watcher-packet-capture-manage-cli",
14523-
"redirect_document_id": true
14524-
},
14525-
{
14526-
"source_path_from_root": "/articles/network-watcher/network-watcher-security-group-view-cli-nodejs.md",
14527-
"redirect_url": "/azure/network-watcher/network-watcher-security-group-view-cli",
14528-
"redirect_document_id": true
14529-
},
14530-
{
14531-
"source_path_from_root": "/articles/network-watcher/network-watcher-troubleshoot-manage-cli-nodejs.md",
14532-
"redirect_url": "/azure/network-watcher/network-watcher-troubleshoot-manage-cli",
14533-
"redirect_document_id": true
14534-
},
14535-
{
14536-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-cli.md",
14537-
"redirect_url": "/azure/network-watcher/view-network-topology",
14538-
"redirect_document_id": false
14539-
},
14540-
{
14541-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-cli-nodejs.md",
14542-
"redirect_url": "/azure/network-watcher/view-network-topology",
14543-
"redirect_document_id": false
14544-
},
14545-
{
14546-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-overview.md",
14547-
"redirect_url": "/azure/network-watcher/view-network-topology",
14548-
"redirect_document_id": true
14549-
},
14550-
{
14551-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-powershell.md",
14552-
"redirect_url": "/azure/network-watcher/view-network-topology",
14553-
"redirect_document_id": false
14554-
},
14555-
{
14556-
"source_path_from_root": "/articles/network-watcher/network-watcher-topology-rest.md",
14557-
"redirect_url": "/azure/network-watcher/view-network-topology",
14558-
"redirect_document_id": false
14559-
},
1456014445
{
1456114446
"source_path_from_root": "/articles/notebooks/index.yml",
1456214447
"redirect_url": "https://notebooks.azure.com",
@@ -20357,16 +20242,6 @@
2035720242
"redirect_url": "/rest/api/load-balancer/loadbalancers/createorupdate",
2035820243
"redirect_document_id": false
2035920244
},
20360-
{
20361-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-next-hop-rest.md",
20362-
"redirect_url": "/rest/api/network-watcher/networkwatchers/getnexthop",
20363-
"redirect_document_id": false
20364-
},
20365-
{
20366-
"source_path_from_root": "/articles/network-watcher/network-watcher-check-ip-flow-verify-rest.md",
20367-
"redirect_url": "/rest/api/network-watcher/networkwatchers/verifyipflow",
20368-
"redirect_document_id": false
20369-
},
2037020245
{
2037120246
"source_path_from_root": "/articles/resource-group-link-resources.md",
2037220247
"redirect_url": "/rest/api/resources/resourcelinks",
@@ -22467,11 +22342,6 @@
2246722342
"redirect_url": "/windows-server/remote/remote-desktop-services/remote-desktop-gateway-role",
2246822343
"redirect_document_id": false
2246922344
},
22470-
{
22471-
"source_path_from_root": "/articles/peering-service/create-connection.md",
22472-
"redirect_url": "/azure/peering-service/azure-portal",
22473-
"redirect_document_id": false
22474-
},
2247522345
{
2247622346
"source_path_from_root": "/articles/lighthouse/concepts/azure-delegated-resource-management.md",
2247722347
"redirect_url": "/azure/lighthouse/concepts/architecture",

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.subservice: domain-services
99
ms.workload: identity
1010
ms.custom: has-azure-ad-ps-ref
1111
ms.topic: tutorial
12-
ms.date: 09/15/2023
12+
ms.date: 09/28/2023
1313
ms.author: justinha
1414
#Customer intent: As an identity administrator, I want to create a Microsoft Entra Domain Services managed domain so that I can synchronize identity information with my Microsoft Entra tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
1515
---
@@ -152,7 +152,7 @@ With Domain Services successfully deployed, now configure the virtual network to
152152
1. To update the DNS server settings for the virtual network, select the **Configure** button. The DNS settings are automatically configured for your virtual network.
153153

154154
> [!TIP]
155-
> If you selected an existing virtual network in the previous steps, any VMs connected to the network only get the new DNS settings after a restart. You can restart VMs using the Microsoft Entra admin center, Azure PowerShell, or the Azure CLI.
155+
> If you selected an existing virtual network in the previous steps, any VMs connected to the network only get the new DNS settings after a restart. You can restart VMs using the Microsoft Entra admin center, Microsoft Graph PowerShell, or the Azure CLI.
156156
157157
<a name='enable-user-accounts-for-azure-ad-ds'></a>
158158

@@ -169,7 +169,7 @@ To authenticate users on the managed domain, Domain Services needs password hash
169169
170170
The steps to generate and store these password hashes are different for cloud-only user accounts created in Microsoft Entra ID versus user accounts that are synchronized from your on-premises directory using Microsoft Entra Connect.
171171

172-
A cloud-only user account is an account that was created in your Microsoft Entra directory using either the Microsoft Entra admin center or Azure AD PowerShell cmdlets. These user accounts aren't synchronized from an on-premises directory.
172+
A cloud-only user account is an account that was created in your Microsoft Entra directory by using either the Microsoft Entra admin center or PowerShell. These user accounts aren't synchronized from an on-premises directory.
173173

174174
> In this tutorial, let's work with a basic cloud-only user account. For more information on the additional steps required to use Microsoft Entra Connect, see [Synchronize password hashes for user accounts synced from your on-premises AD to your managed domain][on-prem-sync].
175175

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 09/21/2023
11+
ms.date: 09/28/2023
1212
ms.reviewer: arvinh
1313
zone_pivot_groups: app-provisioning-cross-tenant-synchronization
1414
---
@@ -69,7 +69,7 @@ When two users in the source tenant have the same mail, and they both need to be
6969
### Usage of Microsoft Entra B2B collaboration for cross-tenant access
7070

7171
- B2B users are unable to manage certain Microsoft 365 services in remote tenants (such as Exchange Online), as there's no directory picker.
72-
- Azure Virtual Desktop currently doesn't support B2B users.
72+
- To learn about Azure Virtual Desktop support for B2B users, see [Prerequisites for Azure Virtual Desktop](../../virtual-desktop/prerequisites.md?tabs=portal).
7373
- B2B users with UserType Member aren't currently supported in Power BI. For more information, see [Distribute Power BI content to external guest users using Microsoft Entra B2B](/power-bi/guidance/whitepaper-azure-b2b-power-bi)
7474
- Converting a guest account into a Microsoft Entra member account or converting a Microsoft Entra member account into a guest isn't supported by Teams. For more information, see [Guest access in Microsoft Teams](/microsoftteams/guest-access).
7575
::: zone-end
@@ -106,7 +106,7 @@ Attribute-mapping expressions can have a maximum of 10,000 characters.
106106

107107
#### Unsupported scoping filters
108108

109-
Directory extensions and the **appRoleAssignments**, **userType**, and **accountExpires** attributes aren't supported as scoping filters.
109+
The **appRoleAssignments**, **userType**, and **accountExpires** attributes aren't supported as scoping filters.
110110

111111
#### Multivalue directory extensions
112112

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: how-to
10-
ms.date: 01/29/2023
10+
ms.date: 09/28/2023
1111

1212
ms.author: justinha
1313
author: Gargi-Sinha
@@ -46,7 +46,7 @@ If you can't move your user authentication, see the step-by-step guidance for [M
4646
- Upgrade to AD FS for Windows Server 2019, Farm behavior level (FBL) 4. This upgrade enables you to select authentication provider based on group membership for a more seamless user transition. While it's possible to migrate while on AD FS for Windows Server 2016 FBL 3, it isn't as seamless for users. During the migration, users are prompted to select an authentication provider (MFA Server or Microsoft Entra multifactor authentication) until the migration is complete.
4747
- Permissions
4848
- Enterprise administrator role in Active Directory to configure AD FS farm for Microsoft Entra multifactor authentication
49-
- Global administrator role in Microsoft Entra ID to perform configuration of Microsoft Entra ID using Azure AD PowerShell
49+
- Global administrator role in Microsoft Entra ID to configure Microsoft Entra ID by using PowerShell
5050

5151

5252
## Considerations for all migration paths

articles/active-directory/governance/how-to-lifecycle-workflow-sync-attributes.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ The following example walks you through setting up a custom synchronization rule
118118
- Connected System: contoso.com
119119
- Connected System Object Type: user
120120
- Metaverse Object Type: person
121-
- Precedence: 200
121+
- Precedence: 20
122122
![Screenshot of creating an inbound synchronization rule basics.](media/how-to-lifecycle-workflow-sync-attributes/create-inbound-rule.png)
123123
1. On the **Scoping filter** screen, select **Next.**
124124
1. On the **Join rules** screen, select **Next**.
@@ -135,7 +135,7 @@ The following example walks you through setting up a custom synchronization rule
135135
- Connected System: &lt;your tenant&gt;
136136
- Connected System Object Type: user
137137
- Metaverse Object Type: person
138-
- Precedence: 201
138+
- Precedence: 21
139139
1. On the **Scoping filter** screen, select **Next.**
140140
1. On the **Join rules** screen, select **Next**.
141141
1. On the **Transformations** screen, Under **Add transformations,** enter the following information.
@@ -208,3 +208,4 @@ Get-MgUser -UserId "44198096-38ea-440d-9497-bb6b06bcaf9b" | Select-Object Displa
208208
- [Create a custom workflow using the Microsoft Entra admin center](tutorial-onboard-custom-workflow-portal.md)
209209
- [Configure API-driven inbound provisioning app (Public preview)](../app-provisioning/inbound-provisioning-api-configure-app.md)
210210
- [Create a Lifecycle workflow](create-lifecycle-workflow.md)
211+
3.49 KB
Loading

articles/active-directory/saas-apps/cybsafe-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
3232

3333
* [A Microsoft Entra tenant](../develop/quickstart-create-new-tenant.md)
3434
* A user account in Microsoft Entra ID with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
35-
* A [CybSafe](https://app.cybsafe.com/login) Administrator account with an enterprise subscription.
35+
* A [CybSafe](https://www.cybsafe.com/) Administrator account with an enterprise subscription.
3636

3737
## Step 1: Plan your provisioning deployment
3838
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).

articles/ai-services/.openpublishing.redirection.ai-services-from-cog.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2880,6 +2880,11 @@
28802880
"redirect_url": "/azure/ai-services/language-service/entity-linking/overview",
28812881
"redirect_document_id": true
28822882
},
2883+
{
2884+
"source_path_from_root": "/articles/cognitive-services/entitylinking.md",
2885+
"redirect_url": "/azure/ai-services/language-service/entity-linking/overview",
2886+
"redirect_document_id": false
2887+
},
28832888
{
28842889
"source_path_from_root": "/articles/cognitive-services/language-service/entity-linking/quickstart.md",
28852890
"redirect_url": "/azure/ai-services/language-service/entity-linking/quickstart",

articles/ai-services/.openpublishing.redirection.applied-ai-old.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@
9292
},
9393
{
9494
"source_path_from_root": "/articles/cognitive-services/form-recognizer/quickstarts/client-library.md",
95-
"redirect_url": "/azure/ai-services/document-intelligence/quickstarts/client-library",
95+
"redirect_url": "/azure/ai-services/document-intelligence/quickstarts/get-started-sdks-rest-api",
9696
"redirect_document_id": false
9797
},
9898
{

articles/ai-services/.openpublishing.redirection.applied-ai-services.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@
157157
},
158158
{
159159
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/try-v3-form-recognizer-studio.md",
160-
"redirect_url": "/azure/ai-services/document-intelligence/quickstarts/try-form-recognizer-studio",
160+
"redirect_url": "/azure/ai-services/document-intelligence/quickstarts/try-document-intelligence-studio",
161161
"redirect_document_id": false
162162
},
163163
{

0 commit comments

Comments
 (0)