Skip to content

Commit a7922c0

Browse files
author
RoseHJM
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mdb-intune-conditional-policies
2 parents 24e666b + 074642b commit a7922c0

File tree

3,104 files changed

+14987
-107613
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,104 files changed

+14987
-107613
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -44,12 +44,6 @@
4444
"branch": "main",
4545
"branch_mapping": {}
4646
},
47-
{
48-
"path_to_root": "acr-tasks",
49-
"url": "https://github.com/Azure-Samples/acr-tasks",
50-
"branch": "master",
51-
"branch_mapping": {}
52-
},
5347
{
5448
"path_to_root": "active-directory-b2c-javascript-nodejs-webapi",
5549
"url": "https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi",
@@ -74,12 +68,6 @@
7468
"branch": "master",
7569
"branch_mapping": {}
7670
},
77-
{
78-
"path_to_root": "azure_arc_sample",
79-
"url": "https://github.com/microsoft/azure_arc",
80-
"branch": "main",
81-
"branch_mapping": {}
82-
},
8371
{
8472
"path_to_root": "azure_cli_scripts",
8573
"url": "https://github.com/Azure-Samples/azure-cli-samples",

.openpublishing.redirection.json

Lines changed: 13 additions & 118 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/governance/machine-configuration/whats-new/migrating-from-dsc-extension.md ",
5+
"redirect_url": " https://azure.microsoft.com/updates/migrate-from-linux-dsc-extension-to-the-guest-configuration-feature-of-azure-policy-by-may-1-2025/",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/vpn-gateway/vpn-gateway-about-forced-tunneling.md",
510
"redirect_url": "/previous-versions/azure/vpn-gateway/vpn-gateway-about-forced-tunneling",
@@ -580,100 +585,10 @@
580585
"redirect_url": "https://azure.microsoft.com/features/azure-portal/",
581586
"redirect_document_id": false
582587
},
583-
{
584-
"source_path_from_root": "/articles/azure-portal/admin-timeout.md",
585-
"redirect_url": "/azure/azure-portal/set-preferences#change-the-directory-timeout-setting-admin",
586-
"redirect_document_id": false
587-
},
588-
{
589-
"source_path_from_root": "/articles/azure-portal/azure-portal-change-theme-high-contrast.md",
590-
"redirect_url": "/azure/azure-portal/set-preferences#choose-a-theme-or-enable-high-contrast",
591-
"redirect_document_id": false
592-
},
593-
{
594-
"source_path_from_root": "/articles/azure-portal/azure-portal-export-delete-settings.md",
595-
"redirect_url": "/azure/azure-portal/set-preferences#export-user-settings",
596-
"redirect_document_id": false
597-
},
598-
{
599-
"source_path_from_root": "/articles/azure-portal/mobile-app/microsoft-copilot-for-azure.md",
600-
"redirect_url": "/azure/azure-portal/mobile-app/microsoft-copilot-in-azure",
601-
"redirect_document_id": false
602-
},
603-
{
604-
"source_path_from_root": "/articles/azure-portal/original-preferences.md",
605-
"redirect_url": "/azure/azure-portal/set-preferences",
606-
"redirect_document_id": true
607-
},
608-
{
609-
"source_path_from_root": "/articles/azure-portal/resource-group-portal-linked-resources.md",
610-
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
611-
"redirect_document_id": false
612-
},
613-
{
614-
"source_path_from_root": "/articles/azure-portal/supportability/classic-deployment-model-quota-increase-requests.md",
615-
"redirect_url": "/azure/quotas/classic-deployment-model-quota-increase-requests",
616-
"redirect_document_id": true
617-
},
618-
{
619-
"source_path_from_root": "/articles/azure-portal/supportability/how-to-use-file-uploader.md",
620-
"redirect_url": "/azure/azure-portal/supportability/how-to-manage-azure-support-request#upload-files",
621-
"redirect_document_id": false
622-
},
623-
{
624-
"source_path_from_root": "/articles/azure-portal/supportability/low-priority-quota.md",
625-
"redirect_url": "/azure/quotas/spot-quota",
626-
"redirect_document_id": false
627-
},
628-
{
629-
"source_path_from_root": "/articles/azure-portal/supportability/networking-quota-requests.md",
630-
"redirect_url": "/azure/quotas/networking-quota-requests",
631-
"redirect_document_id": true
632-
},
633-
{
634-
"source_path_from_root": "/articles/azure-portal/supportability/per-vm-quota-requests.md",
635-
"redirect_url": "/azure/quotas/per-vm-quota-requests",
636-
"redirect_document_id": true
637-
},
638-
{
639-
"source_path_from_root": "/articles/azure-portal/supportability/quotas-overview.md",
640-
"redirect_url": "/azure/quotas/quotas-overview",
641-
"redirect_document_id": true
642-
},
643-
{
644-
"source_path_from_root": "/articles/azure-portal/supportability/regional-quota-requests.md",
645-
"redirect_url": "/azure/quotas/regional-quota-requests",
646-
"redirect_document_id": true
647-
},
648-
{
649-
"source_path_from_root": "/articles/azure-portal/supportability/resource-manager-core-quotas-request.md",
650-
"redirect_url": "/azure/quotas/regional-quota-requests",
651-
"redirect_document_id": false
652-
},
653-
{
654-
"source_path_from_root": "/articles/azure-portal/supportability/sku-series-unavailable.md",
655-
"redirect_url": "/troubleshoot/azure/general/region-access-request-process",
656-
"redirect_document_id": false
657-
},
658-
{
659-
"source_path_from_root": "/articles/azure-portal/supportability/spot-quota.md",
660-
"redirect_url": "/azure/quotas/spot-quota",
661-
"redirect_document_id": true
662-
},
663-
{
664-
"source_path_from_root": "/articles/azure-portal/supportability/view-quotas.md",
665-
"redirect_url": "/azure/quotas/view-quotas",
666-
"redirect_document_id": true
667-
},
668-
{
669-
"source_path_from_root": "/articles/azure-portal/tutorial-azureportal-devops.md",
670-
"redirect_url": "/azure/devops/pipelines/get-started-designer?toc=%2Fazure%2Fdevops%2Fuser-guide%2Ftoc.json&bc=%2Fazure%2Fdevops%2Fuser-guide%2Fbreadcrumb%2Ftoc.json&tabs=new-nav",
671-
"redirect_document_id": false
672-
},
673588
{
674589
"source_path_from_root": "/articles/azure-preview-portal-supported-browsers-devices.md",
675590
"redirect_url": "/azure/azure-portal/azure-portal-supported-browsers-devices",
676-
"redirect_document_id": true
591+
"redirect_document_id": false
677592
},
678593
{
679594
"source_path_from_root": "/articles/azure-resource-manager/management/control-plane-metrics.md",
@@ -788,12 +703,12 @@
788703
{
789704
"source_path_from_root": "/articles/azure-supportability/how-to-create-azure-support-request.md",
790705
"redirect_url": "/azure/azure-portal/supportability/how-to-create-azure-support-request",
791-
"redirect_document_id": true
706+
"redirect_document_id": false
792707
},
793708
{
794709
"source_path_from_root": "/articles/azure-supportability/how-to-use-file-uploader.md",
795710
"redirect_url": "/azure/azure-portal/supportability/how-to-use-file-uploader",
796-
"redirect_document_id": true
711+
"redirect_document_id": false
797712
},
798713
{
799714
"source_path_from_root": "/articles/azure-supportability/index.yml",
@@ -1475,16 +1390,6 @@
14751390
"redirect_url": "/azure/cloudfoundry",
14761391
"redirect_document_id": false
14771392
},
1478-
{
1479-
"source_path_from_root": "/articles/container-registry/manual-regional-move.md",
1480-
"redirect_url": "/azure/operational-excellence/relocation-container-registry",
1481-
"redirect_document_id": false
1482-
},
1483-
{
1484-
"source_path_from_root": "/articles/copilot/limited-access.md",
1485-
"redirect_url": "/azure/copilot/manage-access",
1486-
"redirect_document_id": false
1487-
},
14881393
{
14891394
"source_path_from_root": "/articles/data-catalog/data-catalog-developer-concepts.md",
14901395
"redirect_url": "/previous-versions/azure/data-catalog/data-catalog-developer-concepts",
@@ -2605,21 +2510,6 @@
26052510
"redirect_url": "/azure/ai-services/anomaly-detector/quickstarts/detect-data-anomalies-python",
26062511
"redirect_document_id": false
26072512
},
2608-
{
2609-
"source_path_from_root": "/articles/lighthouse/concepts/azure-delegated-resource-management.md",
2610-
"redirect_url": "/azure/lighthouse/concepts/architecture",
2611-
"redirect_document_id": true
2612-
},
2613-
{
2614-
"source_path_from_root": "/articles/lighthouse/how-to/partner-earned-credit.md",
2615-
"redirect_url": "/azure/cost-management-billing/manage/link-partner-id",
2616-
"redirect_document_id": false
2617-
},
2618-
{
2619-
"source_path_from_root": "/articles/lighthouse/samples/policy-samples.md",
2620-
"redirect_url": "/azure/lighthouse/samples/policy-reference",
2621-
"redirect_document_id": false
2622-
},
26232513
{
26242514
"source_path_from_root": "/articles/load-balancer/tutorial-cross-region-cli.md",
26252515
"redirect_url": "/azure/virtual-network/ip-services/tutorial-cross-region-portal",
@@ -2705,6 +2595,11 @@
27052595
"redirect_url": "/azure/azure-maps/zoom-levels-and-tile-grid",
27062596
"redirect_document_id": true
27072597
},
2598+
{
2599+
"source_path": "articles/managed-grafana/how-to-sync-teams-with-azure-ad-groups.md",
2600+
"redirect_url": "how-to-sync-teams-with-entra-groups",
2601+
"redirect_document_id": false
2602+
},
27082603
{
27092604
"source_path_from_root": "/articles/media-services/azure-media-player/azure-media-player-license.md",
27102605
"redirect_url": "/legal/azure-media-player/azure-media-player-license",

articles/active-directory-b2c/azure-monitor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Watch this video to learn how to configure monitoring for Azure AD B2C using Azu
4343
## Deployment overview
4444

4545
Azure AD B2C uses [Microsoft Entra monitoring](../active-directory/reports-monitoring/overview-monitoring-health.md). Unlike Microsoft Entra tenants, an Azure AD B2C tenant can't have a subscription associated with it. So, we need to take extra steps to enable the integration between Azure AD B2C and Log Analytics, which is where we send the logs.
46-
To enable _Diagnostic settings_ in Microsoft Entra ID within your Azure AD B2C tenant, you use [Azure Lighthouse](../lighthouse/overview.md) to [delegate a resource](../lighthouse/concepts/architecture.md), which allows your Azure AD B2C (the **Service Provider**) to manage a Microsoft Entra ID (the **Customer**) resource.
46+
To enable _Diagnostic settings_ in Microsoft Entra ID within your Azure AD B2C tenant, you use [Azure Lighthouse](/azure/lighthouse/overview) to [delegate a resource](/azure/lighthouse/concepts/architecture), which allows your Azure AD B2C (the **Service Provider**) to manage a Microsoft Entra ID (the **Customer**) resource.
4747

4848
> [!TIP]
4949
> Azure Lighthouse is typically used to manage resources for multiple customers. However, it can also be used to manage resources **within an enterprise that has multiple Microsoft Entra tenants of its own**, which is what we are doing here, except that we are only delegating the management of single resource group.
@@ -113,7 +113,7 @@ To create the custom authorization and delegation in Azure Lighthouse, we use an
113113

114114
1. Sign in to the [Azure portal](https://portal.azure.com).
115115
1. If you have access to multiple tenants, select the **Settings** icon in the top menu to switch to your Microsoft Entra ID tenant from the **Directories + subscriptions** menu.
116-
1. Use the **Deploy to Azure** button to open the Azure portal and deploy the template directly in the portal. For more information, see [create an Azure Resource Manager template](../lighthouse/how-to/onboard-customer.md#create-an-azure-resource-manager-template).
116+
1. Use the **Deploy to Azure** button to open the Azure portal and deploy the template directly in the portal. For more information, see [create an Azure Resource Manager template](/azure/lighthouse/how-to/onboard-customer#create-an-azure-resource-manager-template).
117117

118118
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2Fazure-ad-b2c%2Fsiem%2Fmaster%2Ftemplates%2FrgDelegatedResourceManagement.json)
119119

@@ -141,7 +141,7 @@ To create the custom authorization and delegation in Azure Lighthouse, we use an
141141
]
142142
```
143143

144-
After you deploy the template, it can take a few minutes (typically no more than five) for the resource projection to complete. You can verify the deployment in your Microsoft Entra tenant and get the details of the resource projection. For more information, see [View and manage service providers](../lighthouse/how-to/view-manage-service-providers.md).
144+
After you deploy the template, it can take a few minutes (typically no more than five) for the resource projection to complete. You can verify the deployment in your Microsoft Entra tenant and get the details of the resource projection. For more information, see [View and manage service providers](/azure/lighthouse/how-to/view-manage-service-providers).
145145

146146
## 4. Select your subscription
147147

articles/api-management/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -264,7 +264,7 @@
264264
- name: Set or edit policies
265265
href: set-edit-policies.md
266266
- name: Author policies using Microsoft Copilot in Azure
267-
href: ../copilot/author-api-management-policies.md?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json
267+
href: /azure/copilot/author-api-management-policies?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json
268268
- name: Debug policies in VS Code
269269
href: api-management-debug-policies.md
270270
- name: Policy expressions

articles/api-management/api-management-howto-aad.md

Lines changed: 6 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Learn how to enable user sign-in to the API Management developer po
66
author: dlepow
77
ms.service: azure-api-management
88
ms.topic: article
9-
ms.date: 12/08/2023
9+
ms.date: 09/19/2024
1010
ms.author: danlep
1111
ms.custom: engagement-fy23, devx-track-azurecli
1212
---
@@ -76,14 +76,7 @@ After the Microsoft Entra provider is enabled:
7676
1. Save the **Redirect URL** for later.
7777

7878
:::image type="content" source="media/api-management-howto-aad/api-management-with-aad001.png" alt-text="Screenshot of adding identity provider in Azure portal.":::
79-
80-
> [!NOTE]
81-
> There are two redirect URLs:<br/>
82-
> * **Redirect URL** points to the latest developer portal of the API Management.
83-
> * **Redirect URL (deprecated portal)** points to the deprecated developer portal of API Management.
84-
>
85-
> We recommended you use the latest developer portal Redirect URL.
86-
79+
8780
1. In your browser, open the Azure portal in a new tab.
8881
1. Navigate to [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) to register an app in Active Directory.
8982
1. Select **New registration**. On the **Register an application** page, set the values as follows:
@@ -104,9 +97,6 @@ After the Microsoft Entra provider is enabled:
10497
* Select any option for **Expires**.
10598
* Choose **Add**.
10699
1. Copy the client **Secret value** before leaving the page. You will need it later.
107-
1. Under **Manage** in the side menu, select **Authentication**.
108-
1. Under the **Implicit grant and hybrid flows** section, select the **ID tokens** checkbox.
109-
1. Select **Save**.
110100
1. Under **Manage** in the side menu, select **Token configuration** > **+ Add optional claim**.
111101
1. In **Token type**, select **ID**.
112102
1. Select (check) the following claims: **email**, **family_name**, **given_name**.
@@ -117,21 +107,14 @@ After the Microsoft Entra provider is enabled:
117107
> [!IMPORTANT]
118108
> Update the **Client secret** before the key expires.
119109
120-
1. In the **Add identity provider** pane's **Allowed tenants** field, specify the Microsoft Entra instance's domains to which you want to grant access to the API Management service instance APIs.
121-
* You can separate multiple domains with newlines, spaces, or commas.
122-
123-
> [!NOTE]
124-
> You can specify multiple domains in the **Allowed Tenants** section. A global administration must grant the application access to directory data before users can sign in from a different domain than the original app registration domain. To grant permission, the global administrator should:
125-
> 1. Go to `https://<URL of your developer portal>/aadadminconsent` (for example, `https://contoso.portal.azure-api.net/aadadminconsent`).
126-
> 1. Enter the domain name of the Microsoft Entra tenant to which they want to grant access.
127-
> 1. Select **Submit**.
128-
110+
1. In **Signin tenant**, specify a tenant name or ID to use for sign-in to Microsoft Entra. If no value is specified, the Common endpoint is used.
111+
1. In **Allowed tenants**, add specific Microsoft Entra tenant names or IDs for sign-in to Microsoft Entra.
129112
1. After you specify the desired configuration, select **Add**.
130113
1. Republish the developer portal for the Microsoft Entra configuration to take effect. In the left menu, under **Developer portal**, select **Portal overview** > **Publish**.
131114

132115
After the Microsoft Entra provider is enabled:
133116

134-
* Users in the specified Microsoft Entra instance can [sign into the developer portal by using a Microsoft Entra account](#log_in_to_dev_portal).
117+
* Users in the specified Microsoft Entra tenant(s) can [sign into the developer portal by using a Microsoft Entra account](#log_in_to_dev_portal).
135118
* You can manage the Microsoft Entra configuration on the **Developer portal** > **Identities** page in the portal.
136119
* Optionally configure other sign-in settings by selecting **Identities** > **Settings**. For example, you might want to redirect anonymous users to the sign-in page.
137120
* Republish the developer portal after any configuration change.
@@ -160,7 +143,7 @@ For steps, see [Switch redirect URIs to the single-page application type](../act
160143
## Add an external Microsoft Entra group
161144

162145
Now that you've enabled access for users in a Microsoft Entra tenant, you can:
163-
* Add Microsoft Entra groups into API Management.
146+
* Add Microsoft Entra groups into API Management. Groups added must be in the tenant where your API Management instance is deployed.
164147
* Control product visibility using Microsoft Entra groups.
165148

166149
1. Navigate to the App Registration page for the application you registered in [the previous section](#enable-user-sign-in-using-azure-ad---portal).

articles/api-management/api-management-key-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ API Management is offered in a variety of pricing tiers to meet the needs of dif
118118
API Management integrates with many complementary Azure services to create enterprise solutions, including:
119119

120120
* **[Azure API Center](../api-center/overview.md)** to build a complete inventory of APIs​ in the organization - regardless of their type, lifecycle stage, or deployment location​ - for API discovery, reuse, and governance
121-
* **[Copilot in Azure](../copilot/overview.md)** to help author API Management policies or explain already configured policies​
121+
* **[Copilot in Azure](/azure/copilot/overview)** to help author API Management policies or explain already configured policies​
122122
* **[Azure Key Vault](/azure/key-vault/general/overview)** for secure safekeeping and management of [client certificates](api-management-howto-mutual-certificates.md) and [secrets​](api-management-howto-properties.md)
123123
* **[Azure Monitor](api-management-howto-use-azure-monitor.md)** for logging, reporting, and alerting on management operations, systems events, and API requests​
124124
* **[Application Insights](api-management-howto-app-insights.md)** for live metrics, end-to-end tracing, and troubleshooting

articles/api-management/api-management-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ More information about policies:
2222
+ [Policy overview](api-management-howto-policies.md)
2323
+ [Set or edit policies](set-edit-policies.md)
2424
+ [Policy expressions](api-management-policy-expressions.md)
25-
+ [Author policies using Microsoft Copilot in Azure](../copilot/author-api-management-policies.md?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json)
25+
+ [Author policies using Microsoft Copilot in Azure](/azure/copilot/author-api-management-policies?toc=%2Fazure%2Fapi-management%2Ftoc.json&bc=/azure/api-management/breadcrumb/toc.json)
2626

2727
> [!IMPORTANT]
2828
> [Limit call rate by subscription](rate-limit-policy.md) and [Set usage quota by subscription](quota-policy.md) have a dependency on the subscription key. A subscription key isn't required when other policies are applied.

0 commit comments

Comments
 (0)