Skip to content

Commit ac90358

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into painbar-powerbi-mobile-shared-device-support
2 parents 16c3c61 + cd89158 commit ac90358

11 files changed

+107
-184
lines changed

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -257,13 +257,10 @@ Restricted Claim type (URI):
257257
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/groups`
258258
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid`
259259
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/ispersistent`
260-
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarygroupsid`
261-
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`
262260
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/role`
263261
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/role`
264262
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/samlissuername`
265263
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/wids`
266-
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname`
267264
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsdeviceclaim`
268265
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsdevicegroup`
269266
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsfqbnversion`
@@ -272,14 +269,9 @@ Restricted Claim type (URI):
272269
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication`
273270
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecision`
274271
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid`
275-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress`
276-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name`
277-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier`
278272
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier`
279-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/sid`
280273
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn`
281274
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn`
282-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishedname`
283275
- `http://schemas.xmlsoap.org/ws/2009/09/identity/claims/actor`
284276

285277

articles/active-directory/manage-apps/access-panel-collections.md

Lines changed: 23 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -37,59 +37,52 @@ To create collections on the My Apps portal, you need:
3737

3838
To create a collection, you must have an Azure AD Premium P1 or P2 license.
3939

40-
1. Sign in to the [Azure portal](https://portal.azure.com) as an admin with an Azure AD Premium P1 or P2 license.
41-
42-
2. Go to **Azure Active Directory** > **Enterprise Applications**.
43-
44-
3. Under **Manage**, select **App launchers**.
45-
46-
4. Select **New collection**. In the **New collection** page, enter a **Name** for the collection (we recommend not using "collection" in the name. Then enter a **Description**.
47-
48-
5. Select the **Applications** tab. Select **+ Add application**, and then in the **Add applications** page, select all the applications you want to add to the collection, or use the **Search** box to find applications.
40+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
41+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
42+
1. Under **Manage**, select **App launchers**.
43+
1. Select **New collection**. In the **New collection** page, enter a **Name** for the collection (we recommend not using "collection" in the name). Then enter a **Description**.
44+
1. Select the **Applications** tab. Select **+ Add application**, and then in the **Add applications** page, select all the applications you want to add to the collection, or use the **Search** box to find applications.
4945

5046
![Add an application to the collection](media/acces-panel-collections/add-applications.png)
5147

52-
6. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
53-
54-
7. Select the **Owners** tab. Select **+ Add users and groups**, and then in the **Add users and groups** page, select the users or groups you want to assign ownership to. When you're finished selecting users and groups, choose **Select**.
55-
56-
8. Select the **Users and groups** tab. Select **+ Add users and groups**, and then in the **Add users and groups** page, select the users or groups you want to assign the collection to. Or use the **Search** box to find users or groups. When you're finished selecting users and groups, choose **Select**.
57-
58-
9. Select **Review + Create**. The properties for the new collection appear.
48+
1. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
49+
1. Select the **Owners** tab. Select **+ Add users and groups**, and then in the **Add users and groups** page, select the users or groups you want to assign ownership to. When you're finished selecting users and groups, choose **Select**.
50+
1. Select the **Users and groups** tab. Select **+ Add users and groups**, and then in the **Add users and groups** page, select the users or groups you want to assign the collection to. Or use the **Search** box to find users or groups. When you're finished selecting users and groups, choose **Select**.
51+
1. Select **Review + Create**. The properties for the new collection appear.
5952

6053
> [!NOTE]
61-
> Admin collections are managed through the [Azure portal](https://portal.azure.com), not from [My Apps portal](https://myapps.microsoft.com). For example, if you assign users or groups as an owner, then they can only manage the collection through the Azure portal.
54+
> Admin collections are managed through the [Microsoft Entra admin center](https://entra.microsoft.com), not from [My Apps portal](https://myapps.microsoft.com). For example, if you assign users or groups as an owner, then they can only manage the collection through the Microsoft Entra admin center.
6255
6356
> [!NOTE]
6457
> There is a known issue with Office apps in collections. If you already have at least one Office app in a collection and want to add more, follow these steps:
6558
> 1. Select the collection you'd like to manage, then select the **Applications** tab.
66-
> 2. Remove all Office apps from the collection but do not save the changes.
67-
> 3. Select **+ Add application**.
68-
> 4. In the **Add applications** page, select all the Office apps you want to add to the collection (including the ones that you removed in step 2).
69-
> 5. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
70-
> 5. Select **Save** to apply the changes.
59+
> 1. Remove all Office apps from the collection but do not save the changes.
60+
> 1. Select **+ Add application**.
61+
> 1. In the **Add applications** page, select all the Office apps you want to add to the collection (including the ones that you removed in step 2).
62+
> 1. When you're finished adding applications, select **Add**. The list of selected applications appears. You can use the arrows to change the order of applications in the list.
63+
> 1. Select **Save** to apply the changes.
7164
7265
## View audit logs
7366

7467
The Audit logs record My Apps collections operations, including collection creation end-user actions. The following events are generated from My Apps:
7568

76-
* Create admin collection
77-
* Edit admin collection
78-
* Delete admin collection
79-
* Self-service application adding (end user)
80-
* Self-service application deletion (end user)
69+
- Create admin collection
70+
- Edit admin collection
71+
- Delete admin collection
72+
- Self-service application adding (end user)
73+
- Self-service application deletion (end user)
8174

82-
You can access audit logs in the [Azure portal](https://portal.azure.com) by selecting **Azure Active Directory** > **Enterprise Applications** > **Audit logs** in the Activity section. For **Service**, select **My Apps**.
75+
You can access audit logs in the [Microsoft Entra admin center](https://entra.microsoft.com) by selecting **Identity** > **Applications** > **Enterprise applications** > **Audit logs** in the Activity section. For **Service**, select **My Apps**.
8376

8477
## Get support for My Account pages
8578

8679
From the My Apps page, a user can select **My account** > **View account** to open their account settings. On the Azure AD **My Account** page, users can manage their security info, devices, passwords, and more. They can also access their Office account settings.
8780

8881
In case you need to submit a support request for an issue with the Azure AD account page or the Office account page, follow these steps so your request is routed properly:
8982

90-
* For issues with the **Azure AD "My Account"** page, open a support request from within the Azure portal. Go to **Azure portal** > **Azure Active Directory** > **New support request**.
83+
- For issues with the **Azure AD "My Account"** page, open a support request from within the Microsoft Entra admin center. Go to **Microsoft Entra admin center** > **Identity** > **Learn & support** > **New support request**.
9184

92-
* For issues with the **Office "My account"** page, open a support request from within the Microsoft 365 admin center. Go to **Microsoft 365 admin center** > **Support**.
85+
- For issues with the **Office "My account"** page, open a support request from within the Microsoft 365 admin center. Go to **Microsoft 365 admin center** > **Support**.
9386

9487
## Next steps
9588

articles/active-directory/manage-apps/add-application-portal-configure.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,9 @@ Application properties control how the application is represented and how the ap
3838

3939
To configure the application properties:
4040

41-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
42-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to use.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
43+
1. Search for and select the application that you want to use.
4344
1. In the **Manage** section, select **Properties** to open the **Properties** pane for editing.
4445
1. On the **Properties** pane, you may want to configure the following properties for your application:
4546
- Logo
@@ -54,7 +55,7 @@ To configure the application properties:
5455

5556
Use the following Microsoft Graph PowerShell script to configure basic application properties.
5657

57-
You'll need to consent to the `Application.ReadWrite.All` permission.
58+
You'll need to to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator) and consent to the `Application.ReadWrite.All` permission.
5859

5960
```powershell
6061
@@ -89,7 +90,7 @@ Update-MgApplication -ApplicationId $applicationId -BodyParameter $params
8990

9091
:::zone pivot="ms-graph"
9192

92-
To configure the basic properties of an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
93+
To configure the basic properties of an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
9394

9495
You'll need to consent to the `Application.ReadWrite.All` permission.
9596

0 commit comments

Comments
 (0)