Skip to content

Commit b6d8850

Browse files
committed
Merge branch 'release-umc-rebranding' of https://github.com/MicrosoftDocs/azure-docs-pr into release-umc-rebranding
2 parents ad47e53 + ce7c481 commit b6d8850

File tree

782 files changed

+8183
-6044
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

782 files changed

+8183
-6044
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6279,6 +6279,56 @@
62796279
"source_path_from_root": "/articles/azure-monitor/essentials/prometheus-authorization-proxy.md",
62806280
"redirect_url": "/azure/azure-monitor/containers/prometheus-authorization-proxy",
62816281
"redirect_document_id": false
6282+
},
6283+
{
6284+
"source_path_from_root": "/articles/azure-monitor/azure-cli-metrics-alert-sample.md",
6285+
"redirect_url": "/azure/azure-monitor/alerts/azure-cli-metrics-alert-sample",
6286+
"redirect_document_id": false
6287+
},
6288+
{
6289+
"source_path_from_root": "/articles/azure-monitor/terminology.md",
6290+
"redirect_url": "/azure/azure-monitor/overview",
6291+
"redirect_document_id": false
6292+
},
6293+
{
6294+
"source_path_from_root": "/articles/azure-monitor/logs/create-pipeline-datacollector-api.md",
6295+
"redirect_url": "/azure/azure-monitor/logs/data-collector-api",
6296+
"redirect_document_id": false
6297+
},
6298+
{
6299+
"source_path_from_root": "/articles/azure-monitor/visualize/vmext-troubleshoot.md",
6300+
"redirect_url": "/azure/azure-monitor/agents/vmext-troubleshoot",
6301+
"redirect_document_id": false
6302+
},
6303+
{
6304+
"source_path_from_root": "/articles/azure-monitor/logs/unify-app-resource-data.md",
6305+
"redirect_url": "/azure/azure-monitor/logs/cross-workspace-query",
6306+
"redirect_document_id": false
6307+
},
6308+
{
6309+
"source_path_from_root": "/articles/azure-monitor/insights/solution-agenthealth.md",
6310+
"redirect_url": "/azure/azure-monitor/agents/solution-agenthealth",
6311+
"redirect_document_id": false
6312+
},
6313+
{
6314+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-hybrid-setup.md",
6315+
"redirect_url": "/azure/azure-monitor/containers/container-insights-enable-arc-enabled-clusters",
6316+
"redirect_document_id": false
6317+
},
6318+
{
6319+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v3.md",
6320+
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6321+
"redirect_document_id": false
6322+
},
6323+
{
6324+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v4.md",
6325+
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6326+
"redirect_document_id": false
6327+
},
6328+
{
6329+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-hybrid.md",
6330+
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6331+
"redirect_document_id": false
62826332
}
62836333
]
62846334
}

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
2222

2323
### Editing in GitHub
2424

25-
Follow the guidance for [Quick edits to existing documents](https://learn.microsoft.com/contribute/#quick-edits-to-documentation) in our contributor guide.
25+
Follow the guidance for [Quick edits to existing documents](https://learn.microsoft.com/contribute/content/#quick-edits-to-documentation) in our contributor guide.
2626

2727
### Pull requests
2828

articles/active-directory-b2c/enable-authentication-web-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ Azure AD B2C identity provider settings are stored in the *appsettings.json* fil
260260
"Instance": "https://<your-tenant-name>.b2clogin.com",
261261
"ClientId": "<web-app-application-id>",
262262
"Domain": "<your-b2c-domain>",
263-
"SignedOutCallbackPath": "/signout-oidc
263+
"SignedOutCallbackPath": "/signout-oidc",
264264
"SignUpSignInPolicyId": "<your-sign-up-in-policy>"
265265
}
266266
```

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This article describes how to use the Microsoft Graph API and the Microsoft Grap
2020
* If ***SkipOutOfScopeDeletions*** is set to 0 (false), accounts that go out of scope are disabled in the target.
2121
* If ***SkipOutOfScopeDeletions*** is set to 1 (true), accounts that go out of scope aren't disabled in the target. This flag is set at the *Provisioning App* level and can be configured using the Graph API.
2222

23-
Because this configuration is widely used with the *Workday to Active Directory user provisioning* app, the following steps include screenshots of the Workday application. However, the configuration can also be used with *all other apps*, such as ServiceNow, Salesforce, and Dropbox and [cross-tenant synchronization](../multi-tenant-organizations/cross-tenant-synchronization-configure.md). To successfully complete this procedure, you must have first set up app provisioning for the app. Each app has its own configuration article. For example, to configure the Workday application, see [Tutorial: Configure Workday to Azure AD user provisioning](../saas-apps/workday-inbound-cloud-only-tutorial.md).
23+
Because this configuration is widely used with the *Workday to Active Directory user provisioning* app, the following steps include screenshots of the Workday application. However, the configuration can also be used with *all other apps*, such as ServiceNow, Salesforce, and Dropbox. To successfully complete this procedure, you must have first set up app provisioning for the app. Each app has its own configuration article. For example, to configure the Workday application, see [Tutorial: Configure Workday to Azure AD user provisioning](../saas-apps/workday-inbound-cloud-only-tutorial.md). SkipOutOfScopeDeletions does not work for cross-tenant synchronization.
2424

2525
## Step 1: Retrieve your Provisioning App Service Principal ID (Object ID)
2626

articles/active-directory/app-proxy/application-proxy-connectors.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/17/2022
11+
ms.date: 08/09/2023
1212
ms.author: kenwith
1313
ms.reviewer: ashishj
1414
---
@@ -28,6 +28,8 @@ To deploy Application Proxy successfully, you need at least one connector, but w
2828
### Windows Server
2929
You need a server running Windows Server 2012 R2 or later on which you can install the Application Proxy connector. The server needs to connect to the Application Proxy services in Azure, and the on-premises applications that you're publishing.
3030

31+
Starting from the version 1.5.3437.0, having the .NET version 4.7.1 or greater is required for successful installation (upgrade).
32+
3133
The server needs to have TLS 1.2 enabled before you install the Application Proxy connector. To enable TLS 1.2 on the server:
3234

3335
1. Set the following registry keys:
@@ -36,7 +38,7 @@ The server needs to have TLS 1.2 enabled before you install the Application Prox
3638
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2]
3739
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client] "DisabledByDefault"=dword:00000000 "Enabled"=dword:00000001
3840
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server] "DisabledByDefault"=dword:00000000 "Enabled"=dword:00000001
39-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319] "SchUseStrongCrypto"=dword:00000001
41+
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.8.4250.0] "SchUseStrongCrypto"=dword:00000001
4042
```
4143
4244
A `regedit` file you can use to set these values follows:
@@ -51,7 +53,7 @@ The server needs to have TLS 1.2 enabled before you install the Application Prox
5153
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server]
5254
"DisabledByDefault"=dword:00000000
5355
"Enabled"=dword:00000001
54-
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
56+
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.8.4250.0]
5557
"SchUseStrongCrypto"=dword:00000001
5658
```
5759

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ ms.collection: M365-identity-device-management
1414

1515
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1616
---
17+
1718
# System-preferred multifactor authentication - Authentication methods policy
1819

1920
System-preferred multifactor authentication (MFA) prompts users to sign in by using the most secure method they registered. Administrators can enable system-preferred MFA to improve sign-in security and discourage less secure sign-in methods like SMS.
@@ -111,7 +112,7 @@ When a user signs in, the authentication process checks which authentication met
111112

112113
1. [Temporary Access Pass](howto-authentication-temporary-access-pass.md)
113114
1. [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
114-
1. [Microsoft Authenticator push notifications](concept-authentication-authenticator-app.md)
115+
1. [Microsoft Authenticator notifications](concept-authentication-authenticator-app.md)
115116
1. [Time-based one-time password (TOTP)](concept-authentication-oath-tokens.md)<sup>1</sup>
116117
1. [Telephony](concept-authentication-phone-options.md)<sup>2</sup>
117118
1. [Certificate-based authentication](concept-certificate-based-authentication.md)
@@ -134,3 +135,5 @@ The system-preferred MFA also applies for users who are enabled for MFA in the l
134135

135136
* [Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
136137
* [How to run a registration campaign to set up Microsoft Authenticator](how-to-mfa-registration-campaign.md)
138+
139+

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@
2727
href: onboard-enable-controller-after-onboarding.md
2828
- name: Add an account/ subscription/ project after onboarding is complete
2929
href: onboard-add-account-after-onboarding.md
30+
- name: Create folders to organize your Authorization Systems
31+
href: how-to-create-folders.md
3032
- name: View information about your Authorization Systems
3133
expanded: false
3234
items:
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: Create folders to organize your Authorization Systems
3+
description: How to create folders to organize Authorization Systems - accounts, subscriptions, and projects - in Microsoft Entra Permissions Management.
4+
services: active-directory
5+
author: jenniferf-skc
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: ciem
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 08/09/2023
12+
ms.author: jfields
13+
---
14+
15+
# Create folders to organize your authorization systems
16+
17+
After onboarding your cloud environment to Permissions Management, you might have multiple authorization systems (AWS accounts, Azure subscriptions, or GCP projets) that you need to manage. You can create folders to organize and group together your list of accounts, subscriptions, or projects to manage your workflow more efficiently.
18+
19+
## Create a folder
20+
21+
1. On the Permissions Management home page, select the **Data Collectors** tab and make sure that the **Status** for your cloud environment is **Onboarded**.
22+
1. Select the **Authorization Systems** subtab, then **Folders**.
23+
1. Click **Create Folder**.
24+
1. In the **Folder Name** field, enter a name for the folder you want to create.
25+
1. From the list of names, select all Authorization Systems (accounts, subscriptions, or projects) you want to add to this folder.
26+
1. Click **Save**. Your folder is created.
27+
1. Repeat these steps to create as many folders as you need.
28+
29+
## Next steps
30+
31+
- [View key statistics and data about your authorization systems](ui-dashboard.md)
32+
- [View data about the activity in your authorization system](product-dashboard.md)

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 21 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -8,24 +8,24 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 08/09/2023
1212
ms.author: jfields
1313
---
1414

1515
# Onboard a Google Cloud Platform (GCP) project
1616

17-
This article describes how to onboard a Google Cloud Platform (GCP) project on Permissions Management.
17+
This article describes how to onboard a Google Cloud Platform (GCP) project in Microsoft Entra Permissions Management.
1818

1919
> [!NOTE]
2020
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2121
2222
## Explanation
2323

24-
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
24+
For GCP, Permissions Management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, but with further configurations you can perform such as application registrations and OIDC configurations.
2525

2626
<!-- Diagram from Gargi-->
2727

28-
There are several moving parts across GCP and Azure, which are required to be configured before onboarding.
28+
There are several moving parts across GCP and Azure, which should be configured before onboarding.
2929

3030
* An Azure AD OIDC App
3131
* A Workload Identity in GCP
@@ -39,7 +39,7 @@ There are several moving parts across GCP and Azure, which are required to be co
3939

4040
- In the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
4141

42-
1. On the **Data Collectors** tab, select **GCP**, and then select **Create Configuration**.
42+
1. On the **Data Collectors** tab, select **GCP**, then select **Create Configuration**.
4343

4444
### 1. Create an Azure AD OIDC app.
4545

@@ -50,7 +50,7 @@ There are several moving parts across GCP and Azure, which are required to be co
5050
1. To create the app registration, copy the script and run it in your command-line app.
5151

5252
> [!NOTE]
53-
> 1. To confirm that the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
53+
> 1. To confirm the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
5454
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your GCP account.
5555
> 1. Return to the Permissions Management window, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
5656
@@ -73,15 +73,15 @@ Choose from three options to manage GCP projects.
7373

7474
#### Option 1: Automatically manage
7575

76-
The automatically manage option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
76+
The automatically manage option allows you to automatically detect and monitor projects without extra configuration. Steps to detect a list of projects and onboard for collection:
7777

78-
1. Firstly, grant **Viewer** and **Security Reviewer** role to service account created in previous step at organization, folder or project scope.
78+
1. Grant **Viewer** and **Security Reviewer** roles to a service account created in the previous step at a project, folder or organization level.
7979

80-
To enable controller mode 'On' for any projects, add following roles to the specific projects:
80+
To enable Controller mode **On** for any projects, add these roles to the specific projects:
8181
- Role Administrators
8282
- Security Admin
8383

84-
2. Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programmatically with the gCloud CLI.
84+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
8585

8686
3. Select **Next**.
8787

@@ -93,34 +93,36 @@ You have the ability to specify only certain GCP member projects to manage and m
9393

9494
2. You can choose to download and run the script at this point, or you can do it via Google Cloud Shell.
9595

96-
To enable controller mode 'On' for any projects, add following roles to the specific projects:
96+
To enable controller mode 'On' for any projects, add these roles to the specific projects:
9797
- Role Administrators
9898
- Security Admin
9999

100100
3. Select **Next**.
101101

102102
#### Option 3: Select authorization systems
103103

104-
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
104+
This option detects all projects accessible by the Cloud Infrastructure Entitlement Management application.
105105

106-
1. Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
106+
1. Grant **Viewer** and **Security Reviewer** roles to a service account created in the previous step at a project, folder or organization level.
107+
108+
To enable Controller mode **On** for any projects, add these roles to the specific projects:
109+
- Role Administrators
110+
- Security Admin
111+
112+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
107113

108-
To enable controller mode 'On' for any projects, add following roles to the specific projects:
109-
- Role Administrators
110-
- Security Admin
111-
2. Once done, the steps are listed in the screen to do configure manually in the GPC console, or programmatically with the gCloud CLI
112114
3. Select **Next**.
113115

114116

115117
### 3. Review and save.
116118

117119
- In the **Permissions Management Onboarding – Summary** page, review the information you've added, and then select **Verify Now & Save**.
118120

119-
The following message appears: **Successfully Created Configuration.**
121+
The following message appears: **Successfully Created Configuration**.
120122

121123
On the **Data Collectors** tab, the **Recently Uploaded On** column displays **Collecting**. The **Recently Transformed On** column displays **Processing.**
122124

123-
You have now completed onboarding GCP, and Permissions Management has started collecting and processing your data.
125+
You've completed onboarding GCP, and Permissions Management has started collecting and processing your data.
124126

125127
### 4. View the data.
126128

articles/active-directory/develop/howto-call-a-web-api-with-curl.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,13 @@
11
---
22
title: Call an ASP.NET Core web API with cURL
33
description: Learn how to call a protected ASP.NET Core Web API using the Microsoft identity platform with cURL
4-
manager: CelesteDG
4+
services: active-directory
55
author: henrymbuguakiarie
6-
ms.author: henrymbugua
6+
77
ms.service: active-directory
8+
ms.subservice: develop
9+
ms.author: henrymbugua
10+
manager: CelesteDG
811
ms.topic: how-to
912
ms.date: 03/14/2023
1013
zone_pivot_groups: web-api-howto-prereq

0 commit comments

Comments
 (0)