Skip to content

Commit b68ff98

Browse files
authored
Merge pull request #233991 from MicrosoftDocs/main
4/10/2023 PM Publish
2 parents c380b35 + d183bc5 commit b68ff98

File tree

97 files changed

+1695
-557
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+1695
-557
lines changed

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 01/23/2023
11+
ms.date: 04/10/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
zone_pivot_groups: app-provisioning-cross-tenant-synchronization
@@ -86,13 +86,13 @@ You can test the feature by triggering disable / deletion events by setting the
8686

8787
Let the provisioning job run (20 – 40 mins) and navigate back to the provisioning page. You'll see the provisioning job in quarantine and can choose to allow the deletions or review the provisioning logs to understand why the deletions occurred.
8888

89-
## Common de-provisioning scenarios to test
89+
## Common deprovisioning scenarios to test
9090
- Delete a user / put them into the recycle bin.
9191
- Block sign in for a user.
9292
- Unassign a user or group from the application (or configuration).
9393
- Remove a user from a group that's providing them access to the application (or configuration).
9494

95-
To learn more about de-provisioning scenarios, see [How Application Provisioning Works](how-provisioning-works.md#de-provisioning).
95+
To learn more about deprovisioning scenarios, see [How Application Provisioning Works](how-provisioning-works.md#deprovisioning).
9696

9797
## Frequently Asked Questions
9898

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 04/04/2023
11+
ms.date: 04/10/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -31,7 +31,7 @@ The **Azure AD Provisioning Service** provisions users to SaaS apps and other sy
3131

3232
## Provisioning using SCIM 2.0
3333

34-
The Azure AD provisioning service uses the [SCIM 2.0 protocol](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/bg-p/IdentityStandards) for automatic provisioning. The service connects to the SCIM endpoint for the application, and uses SCIM user object schema and REST APIs to automate the provisioning and de-provisioning of users and groups. A SCIM-based provisioning connector is provided for most applications in the Azure AD gallery. Developers use the SCIM 2.0 user management API in Azure AD to build endpoints for their apps that integrate with the provisioning service. For details, see [Build a SCIM endpoint and configure user provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md).
34+
The Azure AD provisioning service uses the [SCIM 2.0 protocol](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/bg-p/IdentityStandards) for automatic provisioning. The service connects to the SCIM endpoint for the application, and uses SCIM user object schema and REST APIs to automate the provisioning and deprovisioning of users and groups. A SCIM-based provisioning connector is provided for most applications in the Azure AD gallery. Developers use the SCIM 2.0 user management API in Azure AD to build endpoints for their apps that integrate with the provisioning service. For details, see [Build a SCIM endpoint and configure user provisioning](../app-provisioning/use-scim-to-provision-users-and-groups.md).
3535

3636
To request an automatic Azure AD provisioning connector for an app that doesn't currently have one, see [Azure Active Directory Application Request](../manage-apps/v2-howto-app-gallery-listing.md).
3737

@@ -43,7 +43,7 @@ Credentials are required for Azure AD to connect to the application's user manag
4343

4444
When you enable user provisioning for a third-party SaaS application, the Azure portal controls its attribute values through attribute mappings. Mappings determine the user attributes that flow between Azure AD and the target application when user accounts are provisioned or updated.
4545

46-
There's a pre-configured set of attributes and attribute mappings between Azure AD user objects and each SaaS app’s user objects. Some apps manage other types of objects along with Users, such as Groups.
46+
There's a preconfigured set of attributes and attribute mappings between Azure AD user objects and each SaaS app’s user objects. Some apps manage other types of objects along with Users, such as Groups.
4747

4848
When setting up provisioning, it's important to review and configure the attribute mappings and workflows that define which user (or group) properties flow from Azure AD to the application. Review and configure the matching property (**Match objects using this attribute**) that is used to uniquely identify and match users/groups between the two systems.
4949

@@ -56,15 +56,15 @@ When you configure provisioning to a SaaS application, one of the types of attri
5656

5757
For outbound provisioning from Azure AD to a SaaS application, relying on [user or group assignments](../manage-apps/assign-user-or-group-access-portal.md) is the most common way to determine which users are in scope for provisioning. Because user assignments are also used for enabling single sign-on, the same method can be used for managing both access and provisioning. Assignment-based scoping doesn't apply to inbound provisioning scenarios such as Workday and Successfactors.
5858

59-
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service provisions or de-provisions users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "True".
59+
* **Groups.** With an Azure AD Premium license plan, you can use groups to assign access to a SaaS application. Then, when the provisioning scope is set to **Sync only assigned users and groups**, the Azure AD provisioning service provisions or deprovisions users based on whether they're members of a group that's assigned to the application. The group object itself isn't provisioned unless the application supports group objects. Ensure that groups assigned to your application have the property "SecurityEnabled" set to "True".
6060

6161
* **Dynamic groups.** The Azure AD user provisioning service can read and provision users in [dynamic groups](../enterprise-users/groups-create-rule.md). Keep these caveats and recommendations in mind:
6262

6363
* Dynamic groups can impact the performance of end-to-end provisioning from Azure AD to SaaS applications.
6464

65-
* How fast a user in a dynamic group is provisioned or de-provisioned in a SaaS application depends on how fast the dynamic group can evaluate membership changes. For information about how to check the processing status of a dynamic group, see [Check processing status for a membership rule](../enterprise-users/groups-create-rule.md).
65+
* How fast a user in a dynamic group is provisioned or deprovisioned in a SaaS application depends on how fast the dynamic group can evaluate membership changes. For information about how to check the processing status of a dynamic group, see [Check processing status for a membership rule](../enterprise-users/groups-create-rule.md).
6666

67-
* When a user loses membership in the dynamic group, it's considered a de-provisioning event. Consider this scenario when creating rules for dynamic groups.
67+
* When a user loses membership in the dynamic group, it's considered a deprovisioning event. Consider this scenario when creating rules for dynamic groups.
6868

6969
* **Nested groups.** The Azure AD user provisioning service can't read or provision users in nested groups. The service can only read and provision users that are immediate members of an explicitly assigned group. This limitation of "group-based assignments to applications" also affects single sign-on (see [Using a group to manage access to SaaS applications](../enterprise-users/groups-saasapps.md)). Instead, directly assign or otherwise [scope in](define-conditional-rules-for-provisioning-user-accounts.md) the groups that contain the users who need to be provisioned.
7070

@@ -184,8 +184,8 @@ Performance depends on whether your provisioning job is running an initial provi
184184

185185
All operations run by the user provisioning service are recorded in the Azure AD [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context). The logs include all read and write operations made to the source and target systems, and the user data that was read or written during each operation. For information on how to read the provisioning logs in the Azure portal, see the [provisioning reporting guide](./check-status-user-account-provisioning.md).
186186

187-
## De-provisioning
188-
The Azure AD provisioning service keeps source and target systems in sync by de-provisioning accounts when user access is removed.
187+
## Deprovisioning
188+
The Azure AD provisioning service keeps source and target systems in sync by deprovisioning accounts when user access is removed.
189189

190190
The provisioning service supports both deleting and disabling (sometimes referred to as soft-deleting) users. The exact definition of disable and delete varies based on the target app's implementation, but generally a disable indicates that the user can't sign in. A delete indicates that the user has been removed completely from the application. For SCIM applications, a disable is a request to set the *active* property to false on a user.
191191

@@ -201,8 +201,7 @@ Confirm the mapping for *active* for your application. If you're using an applic
201201
**Configure your application to delete a user**
202202

203203
The scenario triggers a disable or a delete:
204-
* A user is soft-deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false).
205-
30 days after a user is deleted in Azure AD, they're permanently deleted from the tenant. At this point, the provisioning service sends a DELETE request to permanently delete the user in the application. At any time during the 30-day window, you can [manually delete a user permanently](../fundamentals/active-directory-users-restore.md), which sends a delete request to the application.
204+
* A user is soft-deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false). Thirty days after a user is deleted in Azure AD, they're permanently deleted from the tenant. At this point, the provisioning service sends a DELETE request to permanently delete the user in the application. At any time during the 30-day window, you can [manually delete a user permanently](../fundamentals/active-directory-users-restore.md), which sends a delete request to the application.
206205
* A user is permanently deleted / removed from the recycle bin in Azure AD.
207206
* A user is unassigned from an app.
208207
* A user goes from in scope to out of scope (doesn't pass a scoping filter anymore).

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,7 @@ Tenants are set to either Pre-migration or Migration in Progress by default, dep
105105
106106
## Known issues and limitations
107107
- In recent updates we removed the ability to target individual users. Previously targeted users will remain in the policy but we recommend moving them to a targeted group.
108+
- Registration of FIDO2 security keys may fail for some users if the FIDO2 Authentication method policy is targeted for a group and the overall Authentication methods policy has more than 20 groups configured. We're working on increasing the policy size limit and in the mean time recommend limiting the number of group targets to no more than 20.
108109

109110
## Next steps
110111

articles/aks/dapr.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,7 @@ Global Azure cloud is supported with Arc support on the following regions:
6363
| ------ | ----------- | -------------------------- |
6464
| `australiaeast` | :heavy_check_mark: | :heavy_check_mark: |
6565
| `australiasoutheast` | :heavy_check_mark: | :x: |
66+
| `brazilsouth` | :heavy_check_mark: | :x: |
6667
| `canadacentral` | :heavy_check_mark: | :heavy_check_mark: |
6768
| `canadaeast` | :heavy_check_mark: | :heavy_check_mark: |
6869
| `centralindia` | :heavy_check_mark: | :heavy_check_mark: |
@@ -72,18 +73,24 @@ Global Azure cloud is supported with Arc support on the following regions:
7273
| `eastus2` | :heavy_check_mark: | :heavy_check_mark: |
7374
| `eastus2euap` | :x: | :heavy_check_mark: |
7475
| `francecentral` | :heavy_check_mark: | :heavy_check_mark: |
76+
| `francesouth` | :heavy_check_mark: | :x: |
7577
| `germanywestcentral` | :heavy_check_mark: | :heavy_check_mark: |
7678
| `japaneast` | :heavy_check_mark: | :heavy_check_mark: |
79+
| `japanwest` | :heavy_check_mark: | :x: |
7780
| `koreacentral` | :heavy_check_mark: | :heavy_check_mark: |
81+
| `koreasouth` | :heavy_check_mark: | :x: |
7882
| `northcentralus` | :heavy_check_mark: | :heavy_check_mark: |
7983
| `northeurope` | :heavy_check_mark: | :heavy_check_mark: |
8084
| `norwayeast` | :heavy_check_mark: | :x: |
8185
| `southafricanorth` | :heavy_check_mark: | :x: |
8286
| `southcentralus` | :heavy_check_mark: | :heavy_check_mark: |
8387
| `southeastasia` | :heavy_check_mark: | :heavy_check_mark: |
88+
| `southindia` | :heavy_check_mark: | :x: |
8489
| `swedencentral` | :heavy_check_mark: | :heavy_check_mark: |
8590
| `switzerlandnorth` | :heavy_check_mark: | :heavy_check_mark: |
91+
| `uaenorth` | :heavy_check_mark: | :x: |
8692
| `uksouth` | :heavy_check_mark: | :heavy_check_mark: |
93+
| `ukwest` | :heavy_check_mark: | :x: |
8794
| `westcentralus` | :heavy_check_mark: | :heavy_check_mark: |
8895
| `westeurope` | :heavy_check_mark: | :heavy_check_mark: |
8996
| `westus` | :heavy_check_mark: | :heavy_check_mark: |

articles/api-management/api-management-howto-app-insights.md

Lines changed: 43 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,10 @@ author: dlepow
77

88
ms.service: api-management
99
ms.tgt_pltfrm: na
10-
ms.topic: article
11-
ms.date: 10/27/2021
10+
ms.topic: how-to
11+
ms.date: 04/03/2023
1212
ms.author: danlep
13+
ms.custom: engagement-fy23
1314

1415
---
1516

@@ -55,9 +56,14 @@ To use Application Insights, [create an instance of the Application Insights ser
5556
5657
## Enable Application Insights logging for your API
5758

59+
Use the following steps to enable Application Insights logging for an API. You can also enable Application Insights logging for all APIs.
60+
5861
1. Navigate to your **Azure API Management service instance** in the **Azure portal**.
5962
1. Select **APIs** from the menu on the left.
6063
1. Click on your API, in this case **Demo Conference API**. If configured, select a version.
64+
65+
> [!TIP]
66+
> To enable logging for all APIs, select **All APIs**.
6167
1. Go to the **Settings** tab from the top bar.
6268
1. Scroll down to the **Diagnostics Logs** section.
6369
:::image type="content" source="media/api-management-howto-app-insights/apim-app-insights-api-1.png" alt-text="App Insights logger":::
@@ -66,8 +72,8 @@ To use Application Insights, [create an instance of the Application Insights ser
6672
1. Input **100** as **Sampling (%)** and select the **Always log errors** checkbox.
6773
1. Leave the rest of the settings as is. For details about the settings, see [Diagnostic logs settings reference](diagnostic-logs-reference.md).
6874

69-
> [!WARNING]
70-
> Overriding the default **Number of payload bytes to log** value **0** may significantly decrease the performance of your APIs.
75+
> [!WARNING]
76+
> Overriding the default **Number of payload bytes to log** value **0** may significantly decrease the performance of your APIs.
7177
7278
1. Select **Save**.
7379
1. Behind the scenes, a [Diagnostic](/rest/api/apimanagement/current-ga/diagnostic/create-or-update) entity named `applicationinsights` is created at the API level.
@@ -83,7 +89,7 @@ You can specify loggers on different levels:
8389
+ A logger for all APIs
8490

8591
Specifying *both*:
86-
- By default, the single API logger (more granular level) will override the one for all APIs.
92+
- By default, the single API logger (more granular level) overrides the one for all APIs.
8793
- If the loggers configured at the two levels are different, and you need both loggers to receive telemetry (multiplexing), please contact Microsoft Support.
8894

8995
## What data is added to Application Insights
@@ -97,15 +103,41 @@ Application Insights receives:
97103
| *Exception* | For every failed request: <ul><li>Failed because of a closed client connection</li><li>Triggered an *on-error* section of the API policies</li><li>Has a response HTTP status code matching 4xx or 5xx</li></ul> |
98104
| *Trace* | If you configure a [trace](trace-policy.md) policy. <br /> The `severity` setting in the `trace` policy must be equal to or greater than the `verbosity` setting in the Application Insights logging. |
99105

100-
### Emit custom metrics
101-
You can emit custom metrics by configuring the [`emit-metric`](emit-metric-policy.md) policy.
106+
> [!NOTE]
107+
> See [Application Insights limits](../azure-monitor/service-limits.md#application-insights) for information about the maximum size and number of metrics and events per Application Insights instance.
102108
103-
To make Application Insights pre-aggregated metrics available in API Management, you'll need to manually enable custom metrics in the service.
104-
1. Use the [`emit-metric`](emit-metric-policy.md) policy with the [Create or Update API](/rest/api/apimanagement/current-ga/api-diagnostic/create-or-update).
105-
1. Add `"metrics":true` to the payload, along with any other properties.
109+
## Emit custom metrics
110+
You can emit [custom metrics](../azure-monitor/essentials/metrics-custom-overview.md) to Application Insights from your API Management instance. API Management emits custom metrics using the [emit-metric](emit-metric-policy.md) policy.
106111

107112
> [!NOTE]
108-
> See [Application Insights limits](../azure-monitor/service-limits.md#application-insights) for information about the maximum size and number of metrics and events per Application Insights instance.
113+
> Custom metrics are a preview feature of Azure Monitor and subject to limitations.
114+
115+
To emit custom metrics, perform the following configuration steps.
116+
117+
1. Enable **Custom metrics (Preview)** with custom dimensions in your Application Insights instance.
118+
119+
1. Navigate to your Application Insights instance in the portal.
120+
1. In the left menu, select **Usage and estimated costs**.
121+
1. Select **Custom metrics (Preview)** > **With dimensions**.
122+
1. Select **OK**.
123+
124+
1. Add the `"metrics": true` property to the `applicationInsights` diagnostic entity that's configured in API Management. Currently you must add this property using the API Management [Diagnostic - Create or Update](/rest/api/apimanagement/current-ga/diagnostic/create-or-update) REST API. For example:
125+
126+
```http
127+
PUT https://management.azure.com/subscriptions/{SubscriptionId}/resourceGroups/{ResourceGroupName}/providers/Microsoft.ApiManagement/service/{APIManagementServiceName}/diagnostics/applicationinsights
128+
129+
{
130+
[...]
131+
{
132+
"properties": {
133+
"loggerId": "/subscriptions/{SubscriptionId}/resourceGroups/{ResourceGroupName}/providers/Microsoft.ApiManagement/service/{APIManagementServiceName}/loggers/{ApplicationInsightsLoggerName}",
134+
"metrics": true
135+
[...]
136+
}
137+
}
138+
```
139+
1. Ensure that the Application Insights logger is configured at the scope you intend to emit custom metrics (either all APIs, or a single API). For more information, see [Enable Application Insights logging for your API](#enable-application-insights-logging-for-your-api), earlier in this article.
140+
1. Configure the `emit-metric` policy at a scope where Application Insights logging is configured (either all APIs, or a single API) and is enabled for custom metrics. For policy details, see the [`emit-metric`](emit-metric-policy.md) policy reference.
109141
110142
## Performance implications and log sampling
111143

0 commit comments

Comments
 (0)