Skip to content

Commit bc2c7b5

Browse files
committed
Merge branch 'main' into release-enhanced-soft-delete
2 parents 1befc73 + 08e6d54 commit bc2c7b5

File tree

419 files changed

+6306
-5942
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

419 files changed

+6306
-5942
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1189,11 +1189,14 @@
11891189
"articles/data-catalog/.openpublishing.redirection.data-catalog.json",
11901190
"articles/data-factory/.openpublishing.redirection.data-factory.json",
11911191
"articles/data-lake-analytics/.openpublishing.redirection.data-lake-analytics.json",
1192+
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json",
1193+
"articles/dev-box/.openpublishing.redirection.dev-box.json",
11921194
"articles/digital-twins/.openpublishing.redirection.digital-twins.json",
11931195
"articles/event-grid/.openpublishing.redirection.event-grid.json",
11941196
"articles/event-hubs/.openpublishing.redirection.event-hubs.json",
11951197
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
11961198
"articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json",
1199+
"articles/internet-peering/.openpublishing.redirection.internet-peering.json",
11971200
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
11981201
"articles/iot-central/.openpublishing.redirection.iot-central.json",
11991202
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",
@@ -1208,9 +1211,12 @@
12081211
"articles/mariadb/.openpublishing.redirection.mariadb.json",
12091212
"articles/marketplace/.openpublishing.redirection.marketplace.json",
12101213
"articles/mysql/.openpublishing.redirection.mysql.json",
1214+
"articles/network-watcher/.openpublishing.redirection.network-watcher.json",
12111215
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
1216+
"articles/peering-service/.openpublishing.redirection.peering-service.json",
12121217
"articles/postgresql/.openpublishing.redirection.postgresql.json",
12131218
"articles/purview/.openpublishing.redirection.purview.json",
1219+
"articles/route-server/.openpublishing.redirection.route-server.json",
12141220
"articles/sap/.openpublishing.redirection.sap.json",
12151221
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
12161222
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
@@ -1220,9 +1226,6 @@
12201226
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
12211227
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
12221228
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
1223-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
1224-
"articles/dev-box/.openpublishing.redirection.dev-box.json",
1225-
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json",
1226-
"articles/network-watcher/.openpublishing.redirection.network-watcher.json"
1229+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
12271230
]
12281231
}

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5460,6 +5460,11 @@
54605460
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
54615461
"redirect_document_id": true
54625462
},
5463+
{
5464+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-azure-ad-sla-performance.md",
5465+
"redirect_url": "/azure/active-directory/reports-monitoring/reference-sla-performance",
5466+
"redirect_document_id": true
5467+
},
54635468
{
54645469
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-filter-audit-log.md",
54655470
"redirect_url": "/azure/active-directory/reports-monitoring/howto-customize-filter-logs",

.openpublishing.redirection.json

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,6 @@
2020
"redirect_URL": "tutorial-assess-webapps",
2121
"redirect_document_id": false
2222
},
23-
{
24-
"source_path": "articles/route-server/tutorial-protect-route-server.md",
25-
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
26-
"redirect_document_id": false
27-
},
28-
{
29-
"source_path": "articles/route-server/routing-preference.md",
30-
"redirect_url": "/azure/route-server/overview",
31-
"redirect_document_id": false
32-
},
3323
{
3424
"source_path": "articles/cloud-services-extended-support/deploy-visual-studio.md",
3525
"redirect_url": "/visualstudio/azure/cloud-services-extended-support?context=%2Fazure%2Fcloud-services-extended-support%2Fcontext%2Fcontext",
@@ -24553,22 +24543,22 @@
2455324543
},
2455424544
{
2455524545
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-01-register-app.md",
24556-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app.md",
24546+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app",
2455724547
"redirect_document_id": false
2455824548
},
2455924549
{
2456024550
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-02-prepare-spa.md",
24561-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa.md",
24551+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa",
2456224552
"redirect_document_id": false
2456324553
},
2456424554
{
2456524555
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md",
24566-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users.md",
24556+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users",
2456724557
"redirect_document_id": false
2456824558
},
2456924559
{
2457024560
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-04-call-api.md",
24571-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api.md",
24561+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api",
2457224562
"redirect_document_id": false
2457324563
}
2457424564
]

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.reviewer: chmutali
2424
This article explains how the integration works and how you can customize the provisioning behavior for different HR scenarios.
2525

2626
## Establishing connectivity
27-
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://apps.support.sap.com/sap/support/knowledge/en/2215682).
27+
Microsoft Entra provisioning service uses basic authentication to connect to Employee Central OData API endpoints. When setting up the SuccessFactors provisioning app, use the *Tenant URL* parameter in the *Admin Credentials* section to configure the [API data center URL](https://help.sap.com/docs/SAP_SUCCESSFACTORS_PLATFORM/d599f15995d348a1b45ba5603e2aba9b/af2b8d5437494b12be88fe374eba75b6.html).
2828

2929
To further secure the connectivity between Microsoft Entra provisioning service and SuccessFactors, add the Microsoft Entra IP ranges in the SuccessFactors IP allowlist:
3030

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,10 @@ Copy the Response into a text file. It looks like the JSON text shown, with valu
5959
Here's the JSON block to add to the mapping.
6060

6161
```json
62-
{
63-
"key": "SkipOutOfScopeDeletions",
64-
"value": "True"
65-
}
62+
{
63+
"key": "SkipOutOfScopeDeletions",
64+
"value": "True"
65+
}
6666
```
6767

6868
## Step 4: Update the secrets endpoint with the SkipOutOfScopeDeletions flag

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 09/25/2023
9+
ms.date: 09/27/2023
1010

1111

1212
ms.author: justinha
@@ -49,15 +49,21 @@ Now we'll walk through each step:
4949

5050
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
5151

52-
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) or [`https://t<tenant id>.certauth.login.microsoftonline.com`](`https://t<tenant id>.certauth.login.microsoftonline.com`) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
52+
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
5353

54-
The endpoint performs TLS mutual authentication, and requests the client certificate as part of the TLS handshake. You'll see an entry for this request in the Sign-ins log.
54+
However, with the issue hints feature enabled (coming soon), the new certauth endpoint will change to `https://t{tenantid}.certauth.login.microsoftonline.com`.
55+
56+
The endpoint performs TLS mutual authentication, and requests the client certificate as part of the TLS handshake. You'll see an entry for this request in the Sign-ins log.
5557

56-
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-ins log in Microsoft Entra ID." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
57-
5858
>[!NOTE]
59-
>The network administrator should allow access to the User sign-in page and certauth endpoint *.certauth.login.microsoftonline.com for the customer’s cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
59+
>The network administrator should allow access to the User sign-in page and certauth endpoint `*.certauth.login.microsoftonline.com` for the customer's cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
60+
61+
Customers should make sure their TLS inspection disablement also work for the new url with issuer hints. Our recommendation is not to hardcode the url with tenantId as for B2B users the tenantId might change. Use a regular expression to allow both the old and new URL to work for TLS inspection disablement. For example, use `*.certauth.login.microsoftonline.com` or `*certauth.login.microsoftonline.com`for Azure Global tenants, and `*.certauth.login.microsoftonline.us` or `*certauth.login.microsoftonline.us` for Azure Government tenants, depending on the proxy used.
6062

63+
Without this change, certificate-based authentication will fail when you enable Issuer Hints feature.
64+
65+
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-ins log in Microsoft Entra ID." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
66+
6167
Click the log entry to bring up **Activity Details** and click **Authentication Details**. You'll see an entry for the X.509 certificate.
6268

6369
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/entry.png" alt-text="Screenshot of the entry for X.509 certificate.":::

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: ignite-2022
99
ms.topic: conceptual
10-
ms.date: 09/27/2023
10+
ms.date: 09/28/2023
1111

1212
ms.author: justinha
1313
author: mjsantani
@@ -134,7 +134,7 @@ Here are a few sample JSONs you can use to get started!
134134

135135
- Include all users
136136

137-
If you want to include ALL users in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/All%20Users%20Enabled.json) and paste it in Graph Explorer and run `PATCH` on the endpoint.
137+
If you want to include ALL users in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste it in Graph Explorer and run `PATCH` on the endpoint.
138138

139139
```json
140140
{
@@ -158,7 +158,7 @@ Here are a few sample JSONs you can use to get started!
158158

159159
- Include specific users or groups of users
160160

161-
If you want to include certain users or groups in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/Multiple%20Includes.json) and update it with the relevant GUIDs of your users and groups. Then paste the JSON in Graph Explorer and run `PATCH` on the endpoint.
161+
If you want to include certain users or groups in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste the JSON in Graph Explorer and run `PATCH` on the endpoint.
162162

163163
```json
164164
{
@@ -182,11 +182,12 @@ Here are a few sample JSONs you can use to get started!
182182
]
183183
}
184184
}
185+
}
185186
```
186187

187-
- Include and exclude specific users/groups of users
188+
- Include and exclude specific users or groups
188189

189-
If you want to include AND exclude certain users/groups of users in your tenant, [download this JSON](https://download.microsoft.com/download/1/4/E/14E6151E-C40A-42FB-9F66-D8D374D13B40/Multiple%20Includes%20and%20Excludes.json) and paste it in Graph Explorer and run `PATCH` on the endpoint. Enter the correct GUIDs for your users and groups.
190+
If you want to include AND exclude certain users or groups in your tenant, update the following JSON example with the relevant GUIDs of your users and groups. Then paste it in Graph Explorer and run `PATCH` on the endpoint.
190191

191192
```json
192193
{
@@ -286,13 +287,13 @@ No. The snooze duration for the prompt is a tenant-wide setting and applies to a
286287

287288
The feature aims to empower admins to get users set up with MFA using the Authenticator app and not passwordless phone sign-in.
288289

289-
**Will a user who has a 3rd party authenticator app setup see the nudge?**
290+
**Will a user who signs in with a 3rd party authenticator app see the nudge?**
290291

291-
If this user doesnt have the Authenticator app set up for push notifications and is enabled for it by policy, yes, the user will see the nudge.
292+
Yes. If a user is enabled for the registration campaign and doesn't have Microsoft Authenticator set up for push notifications, the user is nudged to set up Authenticator.
292293

293-
**Will a user who has the Authenticator app setup only for TOTP codes see the nudge?** 
294+
**Will a user who has Authenticator set up only for TOTP codes see the nudge?**
294295

295-
Yes. If the Authenticator app is not set up for push notifications and the user is enabled for it by policy, yes, the user will see the nudge.
296+
Yes. If a user is enabled for the registration campaign and Authenticator app isn't set up for push notifications, the user is nudged to set up push notification with Authenticator.
296297

297298
**If a user just went through MFA registration, are they nudged in the same sign-in session?**
298299

@@ -316,9 +317,9 @@ Yes. If they have been scoped for the nudge using the policy.
316317

317318
**What if the user closes the browser?**
318319

319-
It's the same as snoozing. If setup is required for a user after they snoozed three times, the user will get prompted the next time they sign in.
320+
It's the same as snoozing. If setup is required for a user after they snoozed three times, the user is prompted the next time they sign in.
320321

321-
**Why dont some users see a nudge when there is a Conditional Access policy for "Register security information"?**
322+
**Why don't some users see a nudge when there is a Conditional Access policy for "Register security information"?**
322323

323324
A nudge won't appear if a user is in scope for a Conditional Access policy that blocks access to the **Register security information** page.
324325

articles/active-directory/develop/test-throttle-service-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The following table lists Microsoft Entra throttling limits to consider when run
5555
| Limit type | Resource unit quota | Write quota |
5656
|-------------------|----------------|----------------|
5757
| application+tenant pair | S: 3500, M:5000, L:8000 per 10 seconds | 3000 per 2 minutes and 30 seconds |
58-
| application | 150,000 per 20 seconds | 70,000 per 5 minutes |
58+
| application | 150,000 per 20 seconds | 35,000 per 5 minutes |
5959
| tenant | Not Applicable | 18,000 per 5 minutes |
6060

6161
The application + tenant pair limit varies based on the number of users in the tenant requests are run against. The tenant sizes are defined as follows: S - under 50 users, M - between 50 and 500 users, and L - above 500 users.

articles/active-directory/external-identities/customers/how-to-customize-branding-customers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following image displays the neutral default branding of the customer tenant
5757

5858
Before you customize any settings, the neutral default branding will appear in your sign-in and sign-up pages. You can customize this default experience with a custom background image or color, favicon, layout, header, and footer. You can also upload a [custom CSS](/azure/active-directory/fundamentals/reference-company-branding-css-template).
5959

60-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
60+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
6161
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
6262
1. Browse to **Company Branding** > **Default sign-in** > **Edit**.
6363

@@ -174,7 +174,7 @@ Your customer tenant name replaces the Microsoft banner logo in the neutral defa
174174

175175
:::image type="content" source="media/how-to-customize-branding-customers/tenant-name.png" alt-text="Screenshot of the tenant name." lightbox="media/how-to-customize-branding-customers/tenant-name.png":::
176176

177-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/).
177+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
178178
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
179179
1. In the search bar, type and select **Properties**.
180180
1. Edit the **Name** field.
@@ -187,7 +187,7 @@ Your customer tenant name replaces the Microsoft banner logo in the neutral defa
187187

188188
When no longer needed, you can remove the sign-in customization from your customer tenant via the Azure portal.
189189

190-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
190+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator).
191191
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the customer tenant you created earlier.
192192
1. Browse to **Company branding** > **Default sign-in experience** > **Edit**.
193193
1. Remove the elements you no longer need.

0 commit comments

Comments
 (0)