Skip to content

Commit b869687

Browse files
committed
fixed merge conflicts
2 parents 437c92d + 5fa2b54 commit b869687

File tree

1,404 files changed

+8870
-40962
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,404 files changed

+8870
-40962
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -804,6 +804,11 @@
804804
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers.md",
805805
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-servers",
806806
"redirect_document_id": true
807+
},
808+
{
809+
"source_path_from_root": "/articles/defender-for-cloud/faq-azure-monitor-logs.yml",
810+
"redirect_url": "/azure/defender-for-cloud/faq-data-collection-agents",
811+
"redirect_document_id": true
807812
}
808813
]
809814
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-work-with-device-notifications.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#manage-device-notifications-from-an-ot-sensor-device-map",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-view-information-per-zone.md",
10+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#view-a-device-map-for-a-specific-zone",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-training-sessions.md",
515
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-ninja-training/ba-p/2428899",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -661,6 +661,10 @@
661661
"redirect_url": "/azure/healthcare-apis/iot/device-messages-through-iot-hub",
662662
"redirect_document_id": false
663663
},
664+
{ "source_path_from_root": "/articles/healthcare-apis/iot/how-to-create-mappings-copies.md",
665+
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-mapping-debugger",
666+
"redirect_document_id": false
667+
},
664668
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
665669
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
666670
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7784,15 +7784,25 @@
77847784
"redirect_document_id": false
77857785
},
77867786
{
7787-
"source_path_from_root": "/articles/azure-maps/mobility-service-data-structure.md ",
7787+
"source_path_from_root": "/articles/azure-maps/mobility-service-data-structure.md",
77887788
"redirect_url": "/azure/azure-maps",
77897789
"redirect_document_id": false
77907790
},
77917791
{
7792-
"source_path_from_root": "/articles/azure-maps/power-bi-visual-getting-started.md ",
7792+
"source_path_from_root": "/articles/azure-maps/power-bi-visual-getting-started.md",
77937793
"redirect_url": "/azure/azure-maps/power-bi-visual-get-started",
77947794
"redirect_document_id": false
77957795
},
7796+
{
7797+
"source_path_from_root": "/articles/azure-maps/tutorial-creator-wfs.md",
7798+
"redirect_url": "/azure/azure-maps/how-to-creator-wfs",
7799+
"redirect_document_id": false
7800+
},
7801+
{
7802+
"source_path_from_root": "/articles/azure-maps/tutorial-creator-feature-stateset.md",
7803+
"redirect_url": "/azure/azure-maps/how-to-creator-feature-stateset",
7804+
"redirect_document_id": false
7805+
},
77967806
{
77977807
"source_path_from_root": "/articles/azure-portal/resource-group-portal-linked-resources.md",
77987808
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,41 @@
134134
"source_path_from_root": "/articles/virtual-desktop/powershell-module.md",
135135
"redirect_url": "/azure/virtual-desktop/cli-powershell",
136136
"redirect_document_id": true
137+
},
138+
{
139+
"source_path_from_root": "/articles/virtual-desktop/deploy-azure-ad-joined-vm.md",
140+
"redirect_url": "/azure/virtual-desktop/azure-ad-joined-session-hosts",
141+
"redirect_document_id": true
142+
},
143+
{
144+
"source_path_from_root": "/articles/virtual-desktop/configure-vm-gpu.md",
145+
"redirect_url": "/azure/virtual-desktop/enable-gpu-acceleration",
146+
"redirect_document_id": true
147+
},
148+
{
149+
"source_path_from_root": "/articles/virtual-desktop/create-validation-host-pool.md",
150+
"redirect_url": "/azure/virtual-desktop/configure-validation-environment",
151+
"redirect_document_id": true
152+
},
153+
{
154+
"source_path_from_root": "/articles/virtual-desktop/expand-existing-host-pool.md",
155+
"redirect_url": "/azure/virtual-desktop/add-session-hosts-host-pool",
156+
"redirect_document_id": true
157+
},
158+
{
159+
"source_path_from_root": "/articles/virtual-desktop/create-host-pools-azure-marketplace.md",
160+
"redirect_url": "/azure/virtual-desktop/create-host-pool",
161+
"redirect_document_id": true
162+
},
163+
{
164+
"source_path_from_root": "/articles/virtual-desktop/create-host-pools-powershell.md",
165+
"redirect_url": "/azure/virtual-desktop/create-host-pool",
166+
"redirect_document_id": false
167+
},
168+
{
169+
"source_path_from_root": "/articles/virtual-desktop/deploy-windows-server-virtual-machine.md",
170+
"redirect_url": "/azure/virtual-desktop/add-session-hosts-host-pool",
171+
"redirect_document_id": false
137172
}
138173
]
139174
}

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 03/01/2023
4+
ms.date: 03/06/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -30,6 +30,20 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3030

3131
- [Migrate applications using header-based authentication to Azure Active Directory B2C with Grit's app proxy](partner-grit-app-proxy.md)
3232
- [Configure Grit's biometric authentication with Azure Active Directory B2C](partner-grit-authentication.md)
33+
- [Create and run your own custom policies in Azure Active Directory B2C](custom-policies-series-overview.md)
34+
- [Write your first Azure Active Directory B2C custom policy - Hello World!](custom-policies-series-hello-world.md)
35+
- [Collect and manipulate user inputs by using Azure AD B2C custom policy](custom-policies-series-collect-user-input.md)
36+
- [Validate user inputs by using Azure Active Directory B2C custom policy](custom-policies-series-validate-user-input.md)
37+
- [Create branching in user journey by using Azure Active Directory B2C custom policy](custom-policies-series-branch-user-journey.md)
38+
- [Validate custom policy files by using TrustFrameworkPolicy schema](custom-policies-series-install-xml-extensions.md)
39+
- [Call a REST API by using Azure Active Directory B2C custom policy](custom-policies-series-call-rest-api.md)
40+
- [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md)
41+
- [Set up a sign-up and sign-in flow by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in.md)
42+
- [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md)
43+
- [Manage administrator accounts in Azure Active Directory B2C](tenant-management-manage-administrator.md)
44+
- [Manage emergency access accounts in Azure Active Directory B2C](tenant-management-emergency-access-account.md)
45+
- [Review tenant creation permission in Azure Active Directory B2C](tenant-management-check-tenant-creation-permission.md)
46+
- [Find tenant name and tenant ID in Azure Active Directory B2C](tenant-management-read-tenant-name.md)
3347

3448
### Updated articles
3549

articles/active-directory-domain-services/password-policy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,13 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/29/2023
13+
ms.date: 03/06/2023
1414
ms.author: justinha
1515

1616
---
1717
# Password and account lockout policies on Azure Active Directory Domain Services managed domains
1818

19-
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.
19+
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific users or groups.
2020

2121
This article shows you how to create and configure a fine-grained password policy in Azure AD DS using the Active Directory Administrative Center.
2222

@@ -110,15 +110,15 @@ To create a custom password policy, you use the Active Directory Administrative
110110

111111
![Select the users and groups to apply the password policy to](./media/password-policy/fgpp-applies-to.png)
112112

113-
1. Password policies can only be applied to groups. In the **Locations** dialog, expand the domain name, such as *aaddscontoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
113+
1. In the **Locations** dialog, expand the domain name, such as *aaddscontoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
114114

115115
![Select the OU that the group belongs to](./media/password-policy/fgpp-container.png)
116116

117-
1. Type the name of the group you wish to apply the policy to, then select **Check Names** to validate that the group exists.
117+
1. Type the name of the user or group you wish to apply the policy to. Select **Check Names** to validate the account.
118118

119119
![Search for and select the group to apply FGPP](./media/password-policy/fgpp-apply-group.png)
120120

121-
1. With the name of the group you selected now displayed in **Directly Applies To** section, select **OK** to save your custom password policy.
121+
1. Click **OK** to save your custom password policy.
122122

123123
## Next steps
124124

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,10 @@ Azure AD uses this integration to enable the following cloud HR application (app
2525
- **Provision cloud-only users to Azure AD:** In scenarios where Active Directory isn't used, provision users directly from the cloud HR app to Azure AD.
2626
- **Write back to the cloud HR app:** Write the email addresses and username attributes from Azure AD back to the cloud HR app.
2727

28+
The following video provides guidance on planning your HR-driven provisioning integrations.
29+
30+
> [!VIDEO https://www.youtube-nocookie.com/embed/HsdBt40xEHs]
31+
2832
> [!NOTE]
2933
> This deployment plan shows you how to deploy your cloud HR app workflows with Azure AD user provisioning. For information on how to deploy automatic user provisioning to software as a service (SaaS) apps, see [Plan an automatic user provisioning deployment](./plan-auto-user-provisioning.md).
3034
@@ -90,7 +94,8 @@ You also need a valid Azure AD Premium P1 or higher subscription license for eve
9094
| Videos | [What is user provisioning in Active Azure Directory?](https://youtu.be/_ZjARPpI6NI) |
9195
| | [How to deploy user provisioning in Active Azure Directory](https://youtu.be/pKzyts6kfrw) |
9296
| Tutorials | [List of tutorials on how to integrate SaaS apps with Azure AD](../saas-apps/tutorial-list.md) |
93-
| | [Tutorial: Configure Workday for automatic user provisioning](../saas-apps/workday-inbound-tutorial.md#frequently-asked-questions-faq) |
97+
| | [Tutorial: Configure automatic user provisioning with Workday](../saas-apps/workday-inbound-tutorial.md) |
98+
| | [Tutorial: Configure automatic user provisioning with SAP SuccessFactors](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md) |
9499
| FAQ | [Automated user provisioning](../app-provisioning/user-provisioning.md#what-applications-and-systems-can-i-use-with-azure-ad-automatic-user-provisioning) |
95100
| | [Provisioning from Workday to Azure AD](../saas-apps/workday-inbound-tutorial.md#frequently-asked-questions-faq) |
96101

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 11 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -141,34 +141,28 @@ IIF(IsPresent([alternativeSecurityId]),
141141

142142
## Look up certificateUserIds using Microsoft Graph queries
143143

144-
Tenant admins can run MS Graph queries to find all the users with a given certificateUserId value.
144+
Authorized callers can run Microsoft Graph queries to find all the users with a given certificateUserId value. On the Microsoft Graph [user](/graph/api/resources/user) object, the collection of certificateUserIds are stored in the **authorizationInfo** property.
145145

146-
GET all user objects that have the value '[email protected]' value in certificateUserIds:
146+
To retrieve all user objects that have the value '[email protected]' in certificateUserIds:
147147

148-
```http
149-
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds/any(x:x eq '[email protected]')
150-
```
151-
152-
```http
153-
GET https://graph.microsoft.com/v1.0/users?$filter=startswith(certificateUserIds, '[email protected]')
148+
```msgraph-interactive
149+
GET https://graph.microsoft.com/v1.0/users?$filter=authorizationInfo/certificateUserIds/any(x:x eq '[email protected]')&$count=true
150+
ConsistencyLevel: eventual
154151
```
155152

156-
```http
157-
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds eq '[email protected]'
158-
```
153+
You can also use the `not` and `startsWith` operators to match the filter condition. To filter against the certificateUserIds object, the request must include the `$count=true` query string and the **ConsistencyLevel** header set to `eventual`.
159154

160-
## Update certificate user IDs using Microsoft Graph queries
161-
PATCH the user object certificateUserIds value for a given userId
155+
## Update certificateUserIds using Microsoft Graph queries
156+
157+
Run a PATCH request to update the certificateUserIds for a given user.
162158

163159
#### Request body:
164160

165161
```http
166-
PATCH https://graph.microsoft.us/v1.0/users/{id}
162+
PATCH https://graph.microsoft.com/v1.0/users/{id}
167163
Content-Type: application/json
168-
{
169164
170-
"@odata.context": "https://graph.microsoft.com/v1.0/$metadata#users(authorizationInfo,department)/$entity",
171-
"department": "Accounting",
165+
{
172166
"authorizationInfo": {
173167
"certificateUserIds": [
174168
"X509:<PN>123456789098765@mil"

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about deployment considerations and strategy for successful i
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: how-to
7-
ms.date: 01/29/2023
7+
ms.date: 03/06/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -187,7 +187,7 @@ If the user does not have a backup method available, you can:
187187

188188
- Provide them a Temporary Access Pass so that they can manage their own authentication methods. You can also provide a Temporary Access Pass to enable temporary access to resources.
189189
- Update their methods as an administrator. To do so, select the user in the Azure portal, then select Authentication methods and update their methods.
190-
User communications
190+
191191

192192
## Plan integration with on-premises systems
193193

0 commit comments

Comments
 (0)