Skip to content

Commit a2f06d5

Browse files
authored
Merge pull request #201227 from MicrosoftDocs/main
6/10 AM Publish
2 parents 40a2b22 + f75a500 commit a2f06d5

File tree

219 files changed

+11262
-8455
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

219 files changed

+11262
-8455
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -913,6 +913,12 @@
913913
"url": "https://github.com/Azure-Samples/ms-identity-javascript-nodejs-desktop",
914914
"branch": "main",
915915
"branch_mapping": {}
916+
},
917+
{
918+
"path_to_root": "azure-cosmos-dotnet-v3",
919+
"url": "https://github.com/Azure-Samples/cosmos-db-sql-api-dotnet-samples",
920+
"branch": "v3",
921+
"branch_mapping": {}
916922
}
917923
],
918924
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -35413,22 +35413,17 @@
3541335413
},
3541435414
{
3541535415
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech-cpp.md",
35416-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-cpp-windows",
35416+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-translate-speech",
3541735417
"redirect_document_id": false
3541835418
},
3541935419
{
3542035420
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech-csharp.md",
35421-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-dotnetcore-windows",
35422-
"redirect_document_id": false
35423-
},
35424-
{
35425-
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech.md",
35426-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-dotnetframework-windows",
35421+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-translate-speech",
3542735422
"redirect_document_id": false
3542835423
},
3542935424
{
3543035425
"source_path_from_root": "/articles/cognitive-services/Speech-Service/how-to-translate-speech-java.md",
35431-
"redirect_url": "/azure/cognitive-services/speech-service/quickstart-translate-speech-java-jre",
35426+
"redirect_url": "/azure/cognitive-services/speech-service/how-to-translate-speech",
3543235427
"redirect_document_id": false
3543335428
},
3543435429
{

articles/active-directory/fundamentals/identity-secure-score.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: fundamentals
88
ms.topic: conceptual
9-
ms.date: 06/02/2021
9+
ms.date: 06/09/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -74,11 +74,27 @@ The secure score helps you to:
7474

7575
### Who can use the identity secure score?
7676

77-
The identity secure score can be used by the following roles:
77+
To access identity secure score, you must be assigned one of the following roles in Azure Active Directory.
7878

79-
- Global admin
80-
- Security admin
81-
- Security readers
79+
#### Read and write roles
80+
81+
With read and write access, you can make changes and directly interact with identity secure score.
82+
83+
* Global administrator
84+
* Security administrator
85+
* Exchange administrator
86+
* SharePoint administrator
87+
88+
#### Read-only roles
89+
90+
With read-only access, you aren't able to edit status for an improvement action.
91+
92+
* Helpdesk administrator
93+
* User administrator
94+
* Service support administrator
95+
* Security reader
96+
* Security operator
97+
* Global reader
8298

8399
### How are controls scored?
84100

articles/active-directory/manage-apps/admin-consent-workflow-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/30/2022
11+
ms.date: 06/10/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 05/27/2022
11+
ms.date: 06/10/2022
1212
ms.author: ergreenl
1313
ms.collection: M365-identity-device-management
1414
ms.custom: contperf-fy22q2
-58.5 KB
Loading

articles/active-directory/saas-apps/atlassian-cloud-provisioning-tutorial.md

Lines changed: 28 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,24 @@
11
---
22
title: 'Tutorial: Configure Atlassian Cloud for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3-
description: Learn how to configure Azure Active Directory to automatically provision and de-provision user accounts to Atlassian Cloud.
3+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Atlassian Cloud.
44
services: active-directory
5-
author: zhchia
6-
writer: zhchia
7-
manager: CelesteDG
5+
documentationcenter: ''
6+
author: twimmers
7+
writer: Thwimmer
8+
manager: beatrizd
9+
ms.assetid: 53b804ba-b632-4c4b-a77e-ec6468536898
810
ms.service: active-directory
911
ms.subservice: saas-app-tutorial
1012
ms.workload: identity
13+
ms.devlang: na
1114
ms.topic: tutorial
1215
ms.date: 12/27/2019
13-
ms.author: jeedes
16+
ms.author: Thwimmer
1417
---
1518

1619
# Tutorial: Configure Atlassian Cloud for automatic user provisioning
1720

18-
The objective of this tutorial is to demonstrate the steps to be performed in Atlassian Cloud and Azure Active Directory (Azure AD) to configure Azure AD to automatically provision and de-provision users and/or groups to [Atlassian Cloud](https://www.atlassian.com/licensing/cloud). For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
21+
This tutorial describes the steps you need to perform in both Atlassian Cloud and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Atlassian Cloud](https://www.atlassian.com/cloud) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
1922

2023

2124
## Capabilities supported
@@ -32,30 +35,35 @@ The scenario outlined in this tutorial assumes that you already have the followi
3235

3336
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md).
3437
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
38+
* Make sure you're an admin for an Atlassian organization. See [Organization administration.](https://support.atlassian.com/organization-administration/docs/explore-an-atlassian-organization).
39+
* Verify one or more or your domains in your organization. See [Domain verification](https://support.atlassian.com/user-management/docs/verify-a-domain-to-manage-accounts).
40+
* Subscribe to Atlassian Access from your organization. See [Atlassian Access security policies and features](https://support.atlassian.com/security-and-access-policies/docs/understand-atlassian-access).
3541
* [An Atlassian Cloud tenant](https://www.atlassian.com/licensing/cloud) with an Atlassian Access subscription.
36-
* A user account in Atlassian Cloud with Admin permissions.
42+
* Make sure you're an admin for at least one Jira or Confluence site that you want to grant synced users access to.
3743

38-
> [!NOTE]
39-
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
44+
> [!NOTE]
45+
> This integration is also available to use from Azure AD US Government Cloud environment. You can find this application in the Azure AD US Government Cloud Application Gallery and configure it in the same way as you do from public cloud.
4046
4147
## Step 1. Plan your provisioning deployment
4248
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
43-
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
44-
3. Determine what data to [map between Azure AD and Atlassian Cloud](../app-provisioning/customize-application-attributes.md).
49+
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
50+
1. Determine what data to [map between Azure AD and Atlassian Cloud](../app-provisioning/customize-application-attributes.md).
4551

4652
## Step 2. Configure Atlassian Cloud to support provisioning with Azure AD
53+
1. Navigate to [Atlassian Admin Console](http://admin.atlassian.com/). Select your organization if you have more than one.
54+
1. Select **Settings > User provisioning**.
55+
![Screenshot showing the User Provisioning tab.](media/atlassian-cloud-provisioning-tutorial/atlassian-select-settings.png)
56+
1. Select **Create a directory**.
57+
1. Enter a name to identify the user directory, for example Azure AD users, then select **Create**.
58+
![Screenshot showing the Create directory page.](media/atlassian-cloud-provisioning-tutorial/atlassian-create-directory.png)
59+
1. Copy the values for **Directory base URL** and **API key**. You'll need those for your identity provider configuration later.
4760

48-
1. Navigate to [Atlassian Organization Manager](https://admin.atlassian.com) **> select the org > directory**.
49-
50-
![Screenshot of the Administration page with the Directory option called out.](./media/atlassian-cloud-provisioning-tutorial/select-directory.png)
51-
52-
2. Click **User Provisioning** and click on **Create a directory**. Copy the **Directory base URL** and **Bearer Token** which will be entered in the **Tenant URL** and **Secret Token** fields in the Provisioning tab of your Atlassian Cloud application in the Azure AD portal respectively.
53-
54-
![Screenshot of the Administration page with the User provisioning option called out.](./media/atlassian-cloud-provisioning-tutorial/secret-token-1.png)
55-
![Screenshot of the Create a token page.](./media/atlassian-cloud-provisioning-tutorial/secret-token-2.png)
56-
![Screenshot of the demo time directory token page.](./media/atlassian-cloud-provisioning-tutorial/secret-token-3.png)
61+
> [!NOTE]
62+
> Make sure you store these values in a safe place, as we won't show them to you again.
5763
64+
![Screenshot showing the API key page.](media/atlassian-cloud-provisioning-tutorial/atlassian-apikey.png)
5865

66+
Users and groups will automatically be provisioned to your organization. See the [user provisioning](https://support.atlassian.com/provisioning-users/docs/understand-user-provisioning) page for more details on how your users and groups sync to your organization.
5967
## Step 3. Add Atlassian Cloud from the Azure AD application gallery
6068

6169
Add Atlassian Cloud from the Azure AD application gallery to start managing provisioning to Atlassian Cloud. If you have previously setup Atlassian Cloud for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).

articles/active-directory/saas-apps/blinq-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4747
[![Screenshot of the Blinq settings option.](media/blinq-provisioning-tutorial/blinq-settings.png)](media/blinq-provisioning-tutorial/blinq-settings.png#lightbox)
4848

4949
1. Under the **Integrations** page you should see **Team Card Provisioning** which contains a URL and Token. You will need to generate the token by clicking **Generate**.
50-
Copy the **URL** and **Token**. The URL and the Token are to be inserted into the **Tenant URL*** and **Secret Token** field in the Azure portal respectively.
50+
Copy the **URL** and **Token**. The URL and the Token are to be inserted into the **Tenant URL** and **Secret Token** field in the Azure portal respectively.
5151

5252
[![Screenshot of the Blinq integration page.](media/blinq-provisioning-tutorial/blinq-integrations-page.png)](media/blinq-provisioning-tutorial/blinq-integrations-page.png#lightbox)
5353

61.9 KB
Loading
26.9 KB
Loading

0 commit comments

Comments
 (0)