Skip to content

Commit a6111a5

Browse files
Merge pull request #249637 from MicrosoftGuyJFlo/RemoveAadPortalAzureCom
[Remove deprecated aad.portal.azure.com references]
2 parents 45c4a36 + e287082 commit a6111a5

File tree

8 files changed

+29
-30
lines changed

8 files changed

+29
-30
lines changed

articles/active-directory/saas-apps/g-suite-provisioning-tutorial.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -107,45 +107,46 @@ This section guides you through the steps to configure the Azure AD provisioning
107107
108108
### To configure automatic user provisioning for G Suite in Azure AD:
109109

110-
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**. Users will need to log in to `portal.azure.com` and won't be able to use `aad.portal.azure.com`.
110+
1. Sign in to the [Azure portal](https://portal.azure.com).
111+
1. Browse to **Azure Active Directory** > **Enterprise Applications** > **All applications**.
111112

112113
![Enterprise applications blade](./media/g-suite-provisioning-tutorial/enterprise-applications.png)
113114

114115
![All applications blade](./media/g-suite-provisioning-tutorial/all-applications.png)
115116

116-
2. In the applications list, select **G Suite**.
117+
1. In the applications list, select **G Suite**.
117118

118119
![The G Suite link in the Applications list](common/all-applications.png)
119120

120-
3. Select the **Provisioning** tab. Click on **Get started**.
121+
1. Select the **Provisioning** tab. Click on **Get started**.
121122

122123
![Screenshot of the Manage options with the Provisioning option called out.](common/provisioning.png)
123124

124125
![Get started blade](./media/g-suite-provisioning-tutorial/get-started.png)
125126

126-
4. Set the **Provisioning Mode** to **Automatic**.
127+
1. Set the **Provisioning Mode** to **Automatic**.
127128

128129
![Screenshot of the Provisioning Mode dropdown list with the Automatic option called out.](common/provisioning-automatic.png)
129130

130-
5. Under the **Admin Credentials** section, click on **Authorize**. You'll be redirected to a Google authorization dialog box in a new browser window.
131+
1. Under the **Admin Credentials** section, click on **Authorize**. You'll be redirected to a Google authorization dialog box in a new browser window.
131132

132133
![G Suite authorize](./media/g-suite-provisioning-tutorial/authorize-1.png)
133134

134-
6. Confirm that you want to give Azure AD permissions to make changes to your G Suite tenant. Select **Accept**.
135+
1. Confirm that you want to give Azure AD permissions to make changes to your G Suite tenant. Select **Accept**.
135136

136137
![G Suite Tenant Auth](./media/g-suite-provisioning-tutorial/gapps-auth.png)
137138

138-
7. In the Azure portal, click **Test Connection** to ensure Azure AD can connect to G Suite. If the connection fails, ensure your G Suite account has Admin permissions and try again. Then try the **Authorize** step again.
139+
1. In the Azure portal, click **Test Connection** to ensure Azure AD can connect to G Suite. If the connection fails, ensure your G Suite account has Admin permissions and try again. Then try the **Authorize** step again.
139140

140-
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
141+
1. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
141142

142143
![Notification Email](common/provisioning-notification-email.png)
143144

144-
7. Select **Save**.
145+
1. Select **Save**.
145146

146-
8. Under the **Mappings** section, select **Provision Azure Active Directory Users**.
147+
1. Under the **Mappings** section, select **Provision Azure Active Directory Users**.
147148

148-
9. Review the user attributes that are synchronized from Azure AD to G Suite in the **Attribute-Mapping** section. Select the **Save** button to commit any changes.
149+
1. Review the user attributes that are synchronized from Azure AD to G Suite in the **Attribute-Mapping** section. Select the **Save** button to commit any changes.
149150

150151
> [!NOTE]
151152
> GSuite Provisioning currently only supports the use of primaryEmail as the matching attribute.
@@ -225,9 +226,9 @@ This section guides you through the steps to configure the Azure AD provisioning
225226
|websites.[type eq "work"].value|String|
226227

227228

228-
10. Under the **Mappings** section, select **Provision Azure Active Directory Groups**.
229+
1. Under the **Mappings** section, select **Provision Azure Active Directory Groups**.
229230

230-
11. Review the group attributes that are synchronized from Azure AD to G Suite in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in G Suite for update operations. Select the **Save** button to commit any changes.
231+
1. Review the group attributes that are synchronized from Azure AD to G Suite in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in G Suite for update operations. Select the **Save** button to commit any changes.
231232

232233
|Attribute|Type|
233234
|---|---|
@@ -236,17 +237,17 @@ This section guides you through the steps to configure the Azure AD provisioning
236237
|name|String|
237238
|description|String|
238239

239-
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
240+
1. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
240241

241-
13. To enable the Azure AD provisioning service for G Suite, change the **Provisioning Status** to **On** in the **Settings** section.
242+
1. To enable the Azure AD provisioning service for G Suite, change the **Provisioning Status** to **On** in the **Settings** section.
242243

243244
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
244245

245-
14. Define the users and/or groups that you would like to provision to G Suite by choosing the desired values in **Scope** in the **Settings** section.
246+
1. Define the users and/or groups that you would like to provision to G Suite by choosing the desired values in **Scope** in the **Settings** section.
246247

247248
![Provisioning Scope](common/provisioning-scope.png)
248249

249-
15. When you're ready to provision, click **Save**.
250+
1. When you're ready to provision, click **Save**.
250251

251252
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
252253

articles/ai-services/qnamaker/How-To/add-sharepoint-datasources.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,8 @@ The Active Directory manager will get a pop-up window requesting permissions to
111111
-->
112112
### Grant access from the Azure Active Directory admin center
113113

114-
1. The Active Directory manager signs in to the Azure portal and opens **[Enterprise applications](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/StartboardApplicationsMenuBlade/AllApps)**.
114+
1. Sign in to the [Azure portal](https://portal.azure.com).
115+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
115116

116117
1. Search for `QnAMakerPortalSharePoint` the select the QnA Maker app.
117118

articles/defender-for-cloud/management-groups-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ You can add subscriptions to the management group that you created.
116116
117117
Once the Azure roles have been assigned to the users, the tenant administrator should remove itself from the user access administrator role.
118118
119-
1. Sign in to the [Azure portal](https://portal.azure.com) or the [Azure Active Directory admin center](https://aad.portal.azure.com).
119+
1. Sign in to the [Azure portal](https://portal.azure.com).
120120
121121
2. In the navigation list, select **Azure Active Directory** and then select **Properties**.
122122

articles/machine-learning/data-science-virtual-machine/dsvm-common-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,11 @@ Azure AD DS makes it simple to manage your identities by providing a fully manag
2929

3030
1. In the Azure portal, add the user to Active Directory:
3131

32-
1. Sign in to the [Azure Active Directory admin center](https://aad.portal.azure.com) by using an account that's a global admin for the directory.
32+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
3333

34-
1. Select **Azure Active Directory** and then **Users and groups**.
34+
1. Browse to **Azure Active Directory** > **Users** > **All users**.
3535

36-
1. In **Users and groups**, select **All users**, and then select **New user**.
36+
1. Select **New user**.
3737

3838
The **User** pane opens:
3939

articles/role-based-access-control/elevate-access-global-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ You should remove this elevated access once you have made the changes you need t
4242

4343
Follow these steps to elevate access for a Global Administrator using the Azure portal.
4444

45-
1. Sign in to the [Azure portal](https://portal.azure.com) or the [Azure Active Directory admin center](https://aad.portal.azure.com) as a Global Administrator.
45+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
4646

4747
If you are using Azure AD Privileged Identity Management, [activate your Global Administrator role assignment](../active-directory/privileged-identity-management/pim-how-to-activate-role.md).
4848

articles/security/fundamentals/operational-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ This checklist is intended to help enterprises think through various operational
3838
| [<br>Data Protection & Storage](../../storage/blobs/security-recommendations.md)|<ul><li>Use Management Plane Security to secure your Storage Account using [Azure role-based access control (Azure RBAC)](../../role-based-access-control/role-assignments-portal.md).</li><li>Data Plane Security to Securing Access to your Data using [Shared Access Signatures (SAS)](../../storage/common/storage-sas-overview.md) and Stored Access Policies.</li><li>Use Transport-Level Encryption – Using HTTPS and the encryption used by [SMB (Server message block protocols) 3.0](/windows/win32/fileio/microsoft-smb-protocol-and-cifs-protocol-overview) for [Azure File Shares](../../storage/files/storage-dotnet-how-to-use-files.md).</li><li>Use [Client-side encryption](../../storage/common/storage-client-side-encryption.md) to secure data that you send to storage accounts when you require sole control of encryption keys. </li><li>Use [Storage Service Encryption (SSE)](../../storage/common/storage-service-encryption.md) to automatically encrypt data in Azure Storage, and [Azure Disk Encryption for Linux VMs](../../virtual-machines/linux/disk-encryption-overview.md) and [Azure Disk Encryption for Windows VMs](../../virtual-machines/linux/disk-encryption-overview.md) to encrypt virtual machine disk files for the OS and data disks.</li><li>Use Azure [Storage Analytics](/rest/api/storageservices/storage-analytics) to monitor authorization type; like with Blob Storage, you can see if users have used a Shared Access Signature or the storage account keys.</li><li>Use [Cross-Origin Resource Sharing (CORS)](/rest/api/storageservices/cross-origin-resource-sharing--cors--support-for-the-azure-storage-services) to access storage resources from different domains.</li></ul> |
3939
|[<br>Security Policies & Recommendations](../../defender-for-cloud/defender-for-cloud-planning-and-operations-guide.md#security-policies-and-recommendations)|<ul><li>Use [Microsoft Defender for Cloud](../../defender-for-cloud/integration-defender-for-endpoint.md) to deploy endpoint solutions.</li><li>Add a [web application firewall (WAF)](../../web-application-firewall/ag/ag-overview.md) to secure web applications.</li><li>Use [Azure Firewall](../../firewall/overview.md) to increase your security protections. </li><li>Apply security contact details for your Azure subscription. The [Microsoft Security Response Center](https://technet.microsoft.com/security/dn528958.aspx) (MSRC) contacts you if it discovers that your customer data has been accessed by an unlawful or unauthorized party.</li></ul> |
4040
| [<br>Identity & Access Management](identity-management-best-practices.md)|<ul><li>[Synchronize your on-premises directory with your cloud directory using Azure AD](../../active-directory/hybrid/whatis-hybrid-identity.md).</li><li>Use [single sign-on](../../active-directory/manage-apps/what-is-single-sign-on.md) to enable users to access their SaaS applications based on their organizational account in Azure AD.</li><li>Use the [Password Reset Registration Activity](../../active-directory/authentication/howto-sspr-reporting.md) report to monitor the users that are registering.</li><li>Enable [multi-factor authentication (MFA)](../../active-directory/authentication/concept-mfa-howitworks.md) for users.</li><li>Developers to use secure identity capabilities for apps like [Microsoft Security Development Lifecycle (SDL)](https://www.microsoft.com/download/details.aspx?id=12379).</li><li>Actively monitor for suspicious activities by using Azure AD Premium anomaly reports and [Azure AD identity protection capability](../../active-directory/identity-protection/overview-identity-protection.md).</li></ul> |
41-
|[<br>Ongoing Security Monitoring](../../defender-for-cloud/defender-for-cloud-introduction.md)|<ul><li>Use Malware Assessment Solution [Azure Monitor logs](../../azure-monitor/logs/log-query-overview.md) to report on the status of antimalware protection in your infrastructure.</li><li>Use [Update Management](../../automation/update-management/overview.md) to determine the overall exposure to potential security problems, and whether or how critical these updates are for your environment.</li><li>The [Azure Active Directory portal](https://aad.portal.azure.com/) to gain visibility into the integrity and security of your organization's directory. |
41+
|[<br>Ongoing Security Monitoring](../../defender-for-cloud/defender-for-cloud-introduction.md)|<ul><li>Use Malware Assessment Solution [Azure Monitor logs](../../azure-monitor/logs/log-query-overview.md) to report on the status of antimalware protection in your infrastructure.</li><li>Use [Update Management](../../automation/update-management/overview.md) to determine the overall exposure to potential security problems, and whether or how critical these updates are for your environment.</li><li>The [Microsoft Entra admin center](https://entra.microsoft.com) provides visibility into the integrity and security of your organization's directory. |
4242
| [<br>Microsoft Defender for Cloud detection capabilities](../../security-center/security-center-alerts-overview.md#detect-threats)|<ul><li>Use [Cloud Security Posture Management](../../defender-for-cloud/concept-cloud-security-posture-management.md) (CSPM) for hardening guidance that helps you efficiently and effectively improve your security.</li><li>Use [alerts](../../defender-for-cloud/alerts-overview.md) to be notified when threats are identified in your cloud, hybrid, or on-premises environment. </li><li>Use [security policies, initiatives, and recommendations](../../defender-for-cloud/security-policy-concept.md) to improve your security posture.</li></ul> |
4343

4444
## Conclusion

articles/security/fundamentals/technical-capabilities.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,6 @@ Security benefits of Azure Active Directory (Azure AD) include the ability to:
5151

5252
- Provision secure remote access to on-premises web applications through Azure AD Application Proxy.
5353

54-
The [Azure Active Directory portal](https://aad.portal.azure.com/) is available as part of the Azure portal. From this dashboard, you can get an overview of the state of your organization, and easily manage the directory, users, or application access.
55-
5654
![Azure Active Directory](./media/technical-capabilities/azure-security-technical-capabilities-fig2.png)
5755

5856
The following are core Azure identity management capabilities:
@@ -89,7 +87,7 @@ Not only do users not have to manage multiple sets of usernames and passwords, a
8987

9088
Security monitoring and alerts and machine learning-based reports that identify inconsistent access patterns can help you protect your business. You can use Azure Active Directory's access and usage reports to gain visibility into the integrity and security of your organization’s directory. With this information, a directory admin can better determine where possible security risks may lie so that they can adequately plan to mitigate those risks.
9189

92-
In the Azure portal or through the [Azure Active Directory portal](https://aad.portal.azure.com/), [reports](../../active-directory/reports-monitoring/overview-reports.md) are categorized in the following ways:
90+
In the [Azure portal](https://portal.azure.com), [reports](../../active-directory/reports-monitoring/overview-reports.md) are categorized in the following ways:
9391

9492
- Anomaly reports – contain sign in events that we found to be anomalous. Our goal is to make you aware of such activity and enable you to be able to decide about whether an event is suspicious.
9593

articles/sentinel/dynamics-365/deploy-dynamics-365-finance-operations-solution.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,10 +77,9 @@ To enable data collection, you create a new role in Finance and Operations with
7777

7878
To collect the managed identity application ID from Azure Active Directory:
7979

80-
1. In the[Azure Active Directory portal](https://aad.portal.azure.com/), select **Enterprise Applications**.
81-
80+
1. Sign in to the [Azure portal](https://portal.azure.com).
81+
1. Browse to **Azure Active Directory** > **Enterprise applications**.
8282
1. Change the application type filter to **Managed Identities**.
83-
8483
1. Search for and open the Function App created in the [previous step](#deploy-the-azure-resource-manager-arm-template). Copy the Application ID and save it for later use.
8584

8685
### Create a role for data collection in Finance and Operations

0 commit comments

Comments
 (0)