Skip to content

Commit aaf845a

Browse files
authored
Merge branch 'main' into hectorhdzg/nodejsupda
2 parents 436555e + e3c4564 commit aaf845a

File tree

2,547 files changed

+20799
-14689
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,547 files changed

+20799
-14689
lines changed

.openpublishing.publish.config.json

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -974,12 +974,90 @@
974974
"branch": "main",
975975
"branch_mapping": {}
976976
},
977+
{
978+
"path_to_root": "cosmos-db-nosql-javascript-samples",
979+
"url": "https://github.com/azure-samples/cosmos-db-nosql-javascript-samples",
980+
"branch": "main",
981+
"branch_mapping": {}
982+
},
977983
{
978984
"path_to_root": "cosmos-db-nosql-python-samples",
979985
"url": "https://github.com/azure-samples/cosmos-db-nosql-python-samples",
980986
"branch": "main",
981987
"branch_mapping": {}
982988
},
989+
{
990+
"path_to_root": "cosmos-db-mongodb-dotnet-samples",
991+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-dotnet-samples",
992+
"branch": "main",
993+
"branch_mapping": {}
994+
},
995+
{
996+
"path_to_root": "cosmos-db-mongodb-javascript-samples",
997+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-javascript-samples",
998+
"branch": "main",
999+
"branch_mapping": {}
1000+
},
1001+
{
1002+
"path_to_root": "cosmos-db-mongodb-python-samples",
1003+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-python-samples",
1004+
"branch": "main",
1005+
"branch_mapping": {}
1006+
},
1007+
{
1008+
"path_to_root": "cosmos-db-apache-cassandra-dotnet-samples",
1009+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-dotnet-samples",
1010+
"branch": "main",
1011+
"branch_mapping": {}
1012+
},
1013+
{
1014+
"path_to_root": "cosmos-db-apache-cassandra-javascript-samples",
1015+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-javascript-samples",
1016+
"branch": "main",
1017+
"branch_mapping": {}
1018+
},
1019+
{
1020+
"path_to_root": "cosmos-db-apache-cassandra-python-samples",
1021+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-python-samples",
1022+
"branch": "main",
1023+
"branch_mapping": {}
1024+
},
1025+
{
1026+
"path_to_root": "cosmos-db-apache-gremlin-dotnet-samples",
1027+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-dotnet-samples",
1028+
"branch": "main",
1029+
"branch_mapping": {}
1030+
},
1031+
{
1032+
"path_to_root": "cosmos-db-apache-gremlin-javascript-samples",
1033+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-javascript-samples",
1034+
"branch": "main",
1035+
"branch_mapping": {}
1036+
},
1037+
{
1038+
"path_to_root": "cosmos-db-apache-gremlin-python-samples",
1039+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-python-samples",
1040+
"branch": "main",
1041+
"branch_mapping": {}
1042+
},
1043+
{
1044+
"path_to_root": "cosmos-db-table-dotnet-samples",
1045+
"url": "https://github.com/azure-samples/cosmos-db-table-dotnet-samples",
1046+
"branch": "main",
1047+
"branch_mapping": {}
1048+
},
1049+
{
1050+
"path_to_root": "cosmos-db-table-javascript-samples",
1051+
"url": "https://github.com/azure-samples/cosmos-db-table-javascript-samples",
1052+
"branch": "main",
1053+
"branch_mapping": {}
1054+
},
1055+
{
1056+
"path_to_root": "cosmos-db-table-python-samples",
1057+
"url": "https://github.com/azure-samples/cosmos-db-table-python-samples",
1058+
"branch": "main",
1059+
"branch_mapping": {}
1060+
},
9831061
{
9841062
"path_to_root": "azure-cosmos-db-table-dotnet-v12",
9851063
"url": "https://github.com/Azure-Samples/cosmos-db-table-api-dotnet-samples",

.openpublishing.redirection.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24515,6 +24515,14 @@
2451524515
"source_path_from_root": "/articles/aks/command-invoke.md",
2451624516
"redirect_url": "/azure/aks/access-private-cluster",
2451724517
"redirect_document_id": false
24518+
},
24519+
{
24520+
"source_path_from_root": "/articles/orbital/space-partner-program-overview.md",
24521+
"redirect_url": "/azure/orbital/overview",
24522+
"redirect_document_id": false
2451824523
}
24524+
24525+
24526+
2451924527
]
2452024528
}

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,7 @@ There are currently a few known limitations to on-demand provisioning. Post your
173173
* On-demand provisioning of roles isn't supported.
174174
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users don't appear when you search for a user.
175175
* On-demand provisioning doesn't support nested groups that aren't directly assigned to the application.
176+
* The on-demand provisioning request API can only accept a single group with up to 5 members at a time.
176177

177178
## Next steps
178179

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/13/2023
9+
ms.date: 09/15/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -55,7 +55,7 @@ The following table lists each setting that can be set to Microsoft managed and
5555

5656
| Setting | Configuration |
5757
|-------------------------------------------------------------------------------------------------|---------------|
58-
| [Registration campaign](how-to-mfa-registration-campaign.md) | Beginning in July, 2023, enabled for text message and voice call users with free and trial subscriptions. |
58+
| [Registration campaign](how-to-mfa-registration-campaign.md) | From Sept 25 to Oct 20, 2023, the Microsoft managed value for the registration campaign will change to Enabled for text message and voice call users across all tenants. |
5959
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6060
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6161
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Enabled |

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Nudge users to set up Microsoft Authenticator
2+
title: How to run a registration campaign to set up Microsoft Authenticator
33
description: Learn how to move your organization away from less secure authentication methods to Microsoft Authenticator
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: ignite-2022
99
ms.topic: conceptual
10-
ms.date: 09/13/2023
10+
ms.date: 09/15/2023
1111

1212
ms.author: justinha
1313
author: mjsantani

articles/active-directory/saas-apps/10000ftplans-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ In this tutorial, you'll learn how to integrate 10,000ft Plans with Azure Active
1818

1919
* Control in Azure AD who has access to 10,000ft Plans.
2020
* Enable your users to be automatically signed-in to 10,000ft Plans with their Azure AD accounts.
21-
* Manage your accounts in one central location - the Azure portal.
21+
* Manage your accounts in one central location.
2222

2323
## Prerequisites
2424

@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 10,000ft Plans, perform the following st
6060

6161
## Configure Azure AD SSO
6262

63-
Follow these steps to enable Azure AD SSO in the Azure portal.
63+
Follow these steps to enable Azure AD SSO.
6464

6565
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6666
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **10,000ft Plans** > **Single sign-on**.
@@ -86,7 +86,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8686

8787
### Create an Azure AD test user
8888

89-
In this section, you'll create a test user in the Azure portal called B.Simon.
89+
In this section, you'll create a test user called B.Simon.
9090

9191
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
9292
1. Browse to **Identity** > **Users** > **All users**.
@@ -100,7 +100,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
100100

101101
### Assign the Azure AD test user
102102

103-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 10,000ft Plans.
103+
In this section, you'll enable B.Simon to use single sign-on by granting access to 10,000ft Plans.
104104

105105
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
106106
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **10,000ft Plans**.
@@ -124,7 +124,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
124124

125125
a. Select **Automatic Configuration** in the Setup SSO section.
126126

127-
b. In the **IdP Metadata URL** text box, enter the **App Federation Metadata Url** value which you have copied from the Azure portal.
127+
b. In the **IdP Metadata URL** text box, enter the **App Federation Metadata Url** value which you copied previously.
128128

129129
c. Enable the **Auto-provision authenticated users not in account** checkbox.
130130

@@ -138,7 +138,7 @@ In this section, a user called Britta Simon is created in 10,000ft Plans. 10,000
138138

139139
In this section, you test your Azure AD single sign-on configuration with following options.
140140

141-
* Click on **Test this application** in Azure portal. This will redirect to 10,000ft Plans Sign on URL where you can initiate the login flow.
141+
* Click on **Test this application**, this will redirect to 10,000ft Plans Sign on URL where you can initiate the login flow.
142142

143143
* Go to 10,000ft Plans Sign on URL directly and initiate the login flow from there.
144144

articles/active-directory/saas-apps/123formbuilder-tutorial.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In this tutorial, you'll learn how to integrate 123FormBuilder SSO with Azure Ac
1919

2020
* Control in Azure AD who has access to 123FormBuilder SSO.
2121
* Enable your users to be automatically signed in to 123FormBuilder SSO with their Azure AD accounts.
22-
* Manage your accounts in one central location - the Azure portal.
22+
* Manage your accounts in one central location.
2323

2424
## Prerequisites
2525

@@ -61,7 +61,7 @@ To configure and test Azure AD SSO with 123FormBuilder SSO, perform the followin
6161

6262
## Configure Azure AD SSO
6363

64-
Follow these steps to enable Azure AD SSO in the Azure portal.
64+
Follow these steps to enable Azure AD SSO.
6565

6666
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6767
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **123FormBuilder SSO** > **Single sign-on**.
@@ -94,7 +94,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9494

9595
### Create an Azure AD test user
9696

97-
In this section, you'll create a test user in the Azure portal called B.Simon.
97+
In this section, you'll create a test user called B.Simon.
9898

9999
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
100100
1. Browse to **Identity** > **Users** > **All users**.
@@ -108,7 +108,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
108108

109109
### Assign the Azure AD test user
110110

111-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 123FormBuilder SSO.
111+
In this section, you'll enable B.Simon to use single sign-on by granting access to 123FormBuilder SSO.
112112

113113
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
114114
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **123FormBuilder SSO**.
@@ -126,19 +126,19 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
126126

127127
a. In the **Email** textbox, type the email of the user like `[email protected]`.
128128

129-
b. Click **Upload** and browse the downloaded Metadata XML file, which you have downloaded from Azure portal.
129+
b. Click **Upload** and browse the downloaded Metadata XML file, which you have downloaded previously.
130130

131131
c. Click **SUBMIT FORM**.
132132

133133
2. On the **Microsoft Azure AD - Single sign-on - Configure App Settings** perform the following steps:
134134

135135
![Configure Single Sign-On](./media/123formbuilder-tutorial/configuration.png)
136136

137-
a. If you wish to configure the application in **IDP initiated mode**, copy the **IDENTIFIER** value for your instance and paste it in **Identifier** textbox in **Basic SAML Configuration** section on Azure portal.
137+
a. If you wish to configure the application in **IDP initiated mode**, copy the **IDENTIFIER** value for your instance and paste it in **Identifier** textbox in **Basic SAML Configuration** section.
138138

139-
b. If you wish to configure the application in **IDP initiated mode**, copy the **REPLY URL** value for your instance and paste it in **Reply URL** textbox in **Basic SAML Configuration** section on Azure portal.
139+
b. If you wish to configure the application in **IDP initiated mode**, copy the **REPLY URL** value for your instance and paste it in **Reply URL** textbox in **Basic SAML Configuration** section.
140140

141-
c. If you wish to configure the application in **SP initiated mode**, copy the **SIGN ON URL** value for your instance and paste it in **Sign On URL** textbox in **Basic SAML Configuration** section on Azure portal.
141+
c. If you wish to configure the application in **SP initiated mode**, copy the **SIGN ON URL** value for your instance and paste it in **Sign On URL** textbox in **Basic SAML Configuration** section.
142142

143143
### Create 123FormBuilder SSO test user
144144

@@ -150,13 +150,13 @@ In this section, you test your Azure AD single sign-on configuration with follow
150150

151151
#### SP initiated:
152152

153-
* Click on **Test this application** in Azure portal. This will redirect to 123FormBuilder SSO Sign on URL where you can initiate the login flow.
153+
* Click on **Test this application**, this will redirect to 123FormBuilder SSO Sign on URL where you can initiate the login flow.
154154

155155
* Go to 123FormBuilder SSO Sign-on URL directly and initiate the login flow from there.
156156

157157
#### IDP initiated:
158158

159-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO.
159+
* Click on **Test this application**, and you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO.
160160

161161
You can also use Microsoft My Apps to test the application in any mode. When you click the 123FormBuilder SSO tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the 123FormBuilder SSO for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](https://support.microsoft.com/account-billing/sign-in-and-start-apps-from-the-my-apps-portal-2f3b1bae-0e5a-4a86-a33e-876fbd2a4510).
162162

articles/active-directory/saas-apps/15five-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Before configuring 15Five for automatic user provisioning with Azure AD, you wil
5858

5959
:::image type="content" source="media/15five-provisioning-tutorial/image02.png" alt-text="Screenshot of the S C I M integration page in the 15Five admin console. Generate OAuth token is highlighted." border="false":::
6060

61-
4. Copy the values for **SCIM 2.0 base URL** and **Access Token**. This value will be entered in the **Tenant URL** and **Secret Token** field in the Provisioning tab of your 15Five application in the Azure portal.
61+
4. Copy the values for **SCIM 2.0 base URL** and **Access Token**. This value will be entered in the **Tenant URL** and **Secret Token** field in the Provisioning tab of your 15Five application.
6262

6363
:::image type="content" source="media/15five-provisioning-tutorial/image03.png" alt-text="Screen shot of the S C I M integration page. In the Token table, the values next to S C I M 2.0 base U R L and Access token are highlighted." border="false":::
6464

articles/active-directory/saas-apps/15five-tutorial.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ In this tutorial, you'll learn how to integrate 15Five with Azure Active Directo
1818

1919
* Control in Azure AD who has access to 15Five.
2020
* Enable your users to be automatically signed-in to 15Five with their Azure AD accounts.
21-
* Manage your accounts in one central location - the Azure portal.
21+
* Manage your accounts in one central location.
2222

2323
## Prerequisites
2424

@@ -60,7 +60,7 @@ To configure and test Azure AD SSO with 15Five, perform the following steps:
6060

6161
## Configure Azure AD SSO
6262

63-
Follow these steps to enable Azure AD SSO in the Azure portal.
63+
Follow these steps to enable Azure AD SSO.
6464

6565
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
6666
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **15Five** > **Single sign-on**.
@@ -78,7 +78,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878
`https://<COMPANY_NAME>.15five.com/saml2/metadata/`
7979

8080
> [!NOTE]
81-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
81+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [15Five Client support team](https://www.15five.com/contact/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section.
8282
8383
1. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Federation Metadata XML** from the given options as per your requirement and save it on your computer.
8484

@@ -90,7 +90,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9090

9191
### Create an Azure AD test user
9292

93-
In this section, you'll create a test user in the Azure portal called B.Simon.
93+
In this section, you'll create a test user called B.Simon.
9494

9595
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
9696
1. Browse to **Identity** > **Users** > **All users**.
@@ -104,7 +104,7 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
104104

105105
### Assign the Azure AD test user
106106

107-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to 15Five.
107+
In this section, you'll enable B.Simon to use single sign-on by granting access to 15Five.
108108

109109
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
110110
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **15Five**.
@@ -116,7 +116,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116116

117117
## Configure 15Five SSO
118118

119-
To configure single sign-on on **15Five** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [15Five support team](https://www.15five.com/contact/). They set this setting to have the SAML SSO connection set properly on both sides.
119+
To configure single sign-on on **15Five** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from the application configuration to [15Five support team](https://www.15five.com/contact/). They set this setting to have the SAML SSO connection set properly on both sides.
120120

121121
### Create 15Five test user
122122

@@ -149,7 +149,7 @@ To enable Azure AD users to log in to 15Five, they must be provisioned into 15Fi
149149

150150
In this section, you test your Azure AD single sign-on configuration with following options.
151151

152-
* Click on **Test this application** in Azure portal. This will redirect to 15Five Sign-on URL where you can initiate the login flow.
152+
* Click on **Test this application**, this will redirect to 15Five Sign-on URL where you can initiate the login flow.
153153

154154
* Go to 15Five Sign-on URL directly and initiate the login flow from there.
155155

0 commit comments

Comments
 (0)