Skip to content

Commit b93c511

Browse files
authored
Merge pull request #205592 from MicrosoftDocs/main
7/21 PM Publish
2 parents 3ee4b9e + 97a04c0 commit b93c511

File tree

220 files changed

+3065
-996
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

220 files changed

+3065
-996
lines changed

.openpublishing.redirection.json

Lines changed: 51 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -10388,8 +10388,8 @@
1038810388
},
1038910389
{
1039010390
"source_path_from_root": "/articles/azure-supportability/classic-deployment-model-quota-increase-requests.md",
10391-
"redirect_url": "/azure/azure-portal/supportability/classic-deployment-model-quota-increase-requests",
10392-
"redirect_document_id": true
10391+
"redirect_url": "/azure/quotas/classic-deployment-model-quota-increase-requests",
10392+
"redirect_document_id": false
1039310393
},
1039410394
{
1039510395
"source_path_from_root": "/articles/azure-supportability/how-to-create-azure-support-request.md",
@@ -10433,44 +10433,79 @@
1043310433
},
1043410434
{
1043510435
"source_path_from_root": "/articles/azure-supportability/low-priority-quota.md",
10436-
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
10437-
"redirect_document_id": true
10436+
"redirect_url": "/azure/quotas/spot-quota",
10437+
"redirect_document_id": false
1043810438
},
1043910439
{
1044010440
"source_path_from_root": "/articles/azure-supportability/networking-quota-requests.md",
10441-
"redirect_url": "/azure/azure-portal/supportability/networking-quota-requests",
10442-
"redirect_document_id": true
10441+
"redirect_url": "/azure/quotas/networking-quota-requests",
10442+
"redirect_document_id": false
1044310443
},
1044410444
{
1044510445
"source_path_from_root": "/articles/azure-supportability/per-vm-quota-requests.md",
10446-
"redirect_url": "/azure/azure-portal/supportability/per-vm-quota-requests",
10447-
"redirect_document_id": true
10446+
"redirect_url": "/azure/quotas/per-vm-quota-requests",
10447+
"redirect_document_id": false
1044810448
},
1044910449
{
1045010450
"source_path_from_root": "/articles/azure-supportability/regional-quota-requests.md",
10451-
"redirect_url": "/azure/azure-portal/supportability/regional-quota-requests",
10452-
"redirect_document_id": true
10451+
"redirect_url": "/azure/quotas/regional-quota-requests",
10452+
"redirect_document_id": false
1045310453
},
1045410454
{
1045510455
"source_path_from_root": "/articles/azure-supportability/resource-manager-core-quotas-request.md",
10456-
"redirect_url": "/azure/azure-portal/supportability/regional-quota-requests",
10456+
"redirect_url": "/azure/quotas/regional-quota-requests",
1045710457
"redirect_document_id": false
1045810458
},
1045910459
{
1046010460
"source_path_from_root": "/articles/azure-portal/supportability/resource-manager-core-quotas-request.md",
10461-
"redirect_url": "/azure/azure-portal/supportability/regional-quota-requests",
10461+
"redirect_url": "/azure/quotas/regional-quota-requests",
1046210462
"redirect_document_id": false
1046310463
},
1046410464
{
10465-
"source_path_from_root": "/articles/azure-supportability/sku-series-unavailable.md",
10466-
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
10467-
"redirect_document_id": true
10465+
"source_path_from_root": "/articles/azure-supportability/sku-series-unavailable.md",
10466+
"redirect_url": "/troubleshoot/azure/general/region-access-request-process",
10467+
"redirect_document_id": false
1046810468
},
1046910469
{
1047010470
"source_path_from_root": "/articles/azure-portal/supportability/low-priority-quota.md",
10471-
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
10471+
"redirect_url": "/azure/quotas/spot-quota",
1047210472
"redirect_document_id": false
1047310473
},
10474+
{
10475+
"source_path_from_root": "/articles/azure-portal/supportability/quotas-overview.md",
10476+
"redirect_url": "/azure/quotas/quotas-overview",
10477+
"redirect_document_id": true
10478+
},
10479+
{
10480+
"source_path_from_root": "/articles/azure-portal/supportability/view-quotas.md",
10481+
"redirect_url": "/azure/quotas/view-quotas",
10482+
"redirect_document_id": true
10483+
},
10484+
{
10485+
"source_path_from_root": "/articles/azure-portal/supportability/per-vm-quota-requests.md",
10486+
"redirect_url": "/azure/quotas/per-vm-quota-requests",
10487+
"redirect_document_id": true
10488+
},
10489+
{
10490+
"source_path_from_root": "/articles/azure-portal/supportability/regional-quota-requests.md",
10491+
"redirect_url": "/azure/quotas/regional-quota-requests",
10492+
"redirect_document_id": true
10493+
},
10494+
{
10495+
"source_path_from_root": "/articles/azure-portal/supportability/spot-quota.md",
10496+
"redirect_url": "/azure/quotas/spot-quota",
10497+
"redirect_document_id": true
10498+
},
10499+
{
10500+
"source_path_from_root": "/articles/azure-portal/supportability/classic-deployment-model-quota-increase-requests.md",
10501+
"redirect_url": "/azure/quotas/classic-deployment-model-quota-increase-requests",
10502+
"redirect_document_id": true
10503+
},
10504+
{
10505+
"source_path_from_root": "/articles/azure-portal/supportability/networking-quota-requests.md",
10506+
"redirect_url": "/azure/quotas/networking-quota-requests",
10507+
"redirect_document_id": true
10508+
},
1047410509
{
1047510510
"source_path_from_root": "/articles/managed-applications/concepts-custom-providers-built-in-policy.md",
1047610511
"redirect_url": "/azure/azure-resource-manager/custom-providers/concepts-built-in-policy",

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ Here's what you need to know about email as an alternate login ID:
4040
* The feature is available in Azure AD Free edition and higher.
4141
* The feature enables sign-in with *ProxyAddresses*, in addition to UPN, for cloud-authenticated Azure AD users. More on how this applies to Azure AD business-to-business (B2B) collaboration in the [B2B](#b2b-guest-user-sign-in-with-an-email-address) section.
4242
* When a user signs in with a non-UPN email, the `unique_name` and `preferred_username` claims (if present) in the [ID token](../develop/id-tokens.md) will return the non-UPN email.
43+
* If the non-UPN email in use becomes stale (no longer belongs to the user), these claims will return the UPN instead.
4344
* The feature supports managed authentication with Password Hash Sync (PHS) or Pass-Through Authentication (PTA).
4445
* There are two options for configuring the feature:
4546
* [Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global administrator privileges required.
59.8 KB
Loading

articles/active-directory/enterprise-users/groups-write-back-portal.md

Lines changed: 22 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Group writeback portal operations (preview) in Azure Active Directory
33
description: The access points for group writeback to on-premises Active Directory in the Azure Active Directory admin center.
44
keywords:
5-
author: curtand
6-
manager: karenhoran
7-
ms.author: curtand
5+
author: barclayn
6+
manager: rkarlin
7+
ms.author: barclayn
88
ms.reviewer: jordan.dahl
9-
ms.date: 06/18/2022
9+
ms.date: 07/21/2022
1010
ms.topic: how-to
1111
ms.service: active-directory
1212
ms.subservice: enterprise-users
@@ -23,7 +23,20 @@ ms.collection: M365-identity-device-management
2323
Group writeback is a valuable tool for administrators of Azure Active Directory (Azure AD) tenants being synced with on-premises Active Directory groups. Microsoft is now previewing new capabilities for group writeback. In this preview, you can specify in the Azure AD admin center which groups you want to write back and what you’d like each group to write back as. You can write Microsoft 365 groups back to on-premises Active Directory as Distribution, Mail-enabled Security, or Security groups, and write Security groups back as Security groups. Groups are written back with a scope of universal​.
2424

2525
>[!NOTE]
26-
> If you were previously writing Microsoft 365 groups back to on-premises Active Directory as universal distribution groups, they will appear in the Azure portal as not enabled for writeback in both the **Groups** page and in the properties page for a group. This is to ensure backward compatibility with the legacy version of group writeback and to avoid breaking setups that customers currently have.
26+
> If you were previously writing Microsoft 365 groups back to on-premises Active Directory as universal distribution groups, they will appear in the Azure portal as not enabled for writeback in both the **Groups** page and in the properties page for a group. These pages display a new property introduced for the preview, “writeback enabled”. This property is not set by the current version of group writeback to ensure backward compatibility with the legacy version of group writeback and to avoid breaking existing customer setups.
27+
28+
To understand the behavior of No writeback in the portal, check the properties of the group in MS Graph.
29+
30+
31+
| Portal | MS Graph| Behavior|
32+
|--------|---------|---------|
33+
| No writeback | isEnabled=false | Group won't be written back to on-premises Active Directory|
34+
| No writeback | IsEnabled = null & onPremisesGroupType = null | If a Microsoft 365 group – it will be written back to on-premises Active Directory as a distribution group. </br> If an Azure AD security group – it will not be written back to on premises Active Directory. |
35+
36+
By default, the **Group writeback state** of groups is set to **No writeback**. This means:
37+
38+
- **Microsoft 365 groups**: if the group ```IsEnabled = null``` and ```onPremisesGroupType = null```, to ensure backwards compatibility with older version of group writeback, the group is written back to your on-premises Active Directory as a distribution group.
39+
- **Azure AD security groups**: if the group ```IsEnabled = null``` and ```onPremisesGroupType = null``` then the group is not written back to your on-premises Active Directory.
2740

2841
## Show writeback columns
2942

@@ -39,15 +52,14 @@ The **Writeback enabled** column allows you to turn off the writeback capability
3952

4053
## Writeback settings in group properties
4154

42-
You can also configure writeback settings for a group on the property page for the group. There's a **Group writeback state** setting allows you to turn off writeback for the group or to specify the writeback group type. When **No writeback** is selected, the group isn't being written back at all. If you select one of the other writeback types as an option (for example, Security), then you have:
55+
You can also configure writeback settings for a group on the property page for the group. There's a **Group writeback state** setting that allows you to turn off writeback for the group or to specify the writeback group type. When **No writeback** is selected, the group isn't written back. If you select one of the other writeback types as an option (for example, Security), then you have:
4356

4457
- Enabled the group for writeback
4558
- Targeted the writeback type as a security group
4659

4760
:::image type="content" source="./media/groups-write-back-portal/groups-properties-view.png" alt-text="Screenshot of changing writeback settings in the group properties." lightbox="media/groups-write-back-portal/groups-properties-view.png":::
48-
49-
## Next steps
5061

51-
Check out the groups REST API documentation for the [preview writeback property on the settings template](../hybrid/how-to-connect-group-writeback.md).
62+
## Next steps
5263

53-
For more about group writeback operations, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback.md)
64+
- Check out the groups REST API documentation for the [preview writeback property on the settings template](/graph/api/resources/group?view=graph-rest-beta&preserve-view=true).
65+
- For more about group writeback operations, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback.md)

articles/active-directory/fundamentals/active-directory-data-storage-eu.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,13 @@ ms.service: active-directory
1010
ms.subservice: fundamentals
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 01/20/2022
13+
ms.date: 07/20/2022
1414
ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

1818
# Identity data storage for European customers in Azure Active Directory
19+
1920
Identity data is stored by Azure AD in a geographical location based on the address provided by your organization when it subscribed for a Microsoft Online service such as Microsoft 365 and Azure. For information on where your identity data is stored, you can use the [Where your data is located](https://www.microsoft.com/trust-center/privacy/data-location) section of the Microsoft Trust Center.
2021

2122
For customers who provided an address in Europe, Azure AD keeps most of the identity data within European datacenters. This document provides information on any data that is stored outside of Europe by Azure AD services.
@@ -32,10 +33,6 @@ For cloud-based Azure AD Multi-Factor Authentication, authentication is complete
3233

3334
For more information about what user information is collected by Azure Multi-Factor Authentication Server (MFA Server) and cloud-based Azure AD MFA, see [Azure Multi-Factor Authentication user data collection](../authentication/howto-mfa-reporting-datacollection.md).
3435

35-
## Password-based Single Sign-On for Enterprise Applications
36-
37-
If a customer creates a new enterprise application (whether through Azure AD Gallery or non-Gallery) and enables password-based SSO, the Application sign in URL, and custom capture sign in fields are stored in the United States. For more information, see [Configure password-based single sign-on](../manage-apps/configure-password-single-sign-on-non-gallery-applications.md)
38-
3936
## Microsoft Azure Active Directory B2B (Azure AD B2B)
4037

4138
Azure AD B2B stores invitations with redeem link and redirect URL information in US datacenters. In addition, email address of users that unsubscribe from receiving B2B invitations are also stored in U.S. datacenters.

0 commit comments

Comments
 (0)