Skip to content

Commit bcf4750

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents a903311 + 497e832 commit bcf4750

File tree

48 files changed

+520
-203
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+520
-203
lines changed

articles/active-directory/develop/mobile-app-quickstart-portal-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Applications must be represented by an app object in Azure Active Directory so t
3434
### Step 1: Configure your application in the Azure portal
3535
For the code sample in this quickstart to work, add a **Redirect URI** compatible with the Auth broker.
3636
> [!div id="makechanges" class="nextstepaction" class="configure-app-button"]
37-
> [Make these changes for me]()
37+
> <button>Make this change for me</button>
3838
3939
> [!div id="appconfigured" class="alert alert-info"]
4040
> ![Already configured](media/quickstart-v2-android/green-check.png) Your application is configured with these attributes

articles/active-directory/develop/mobile-app-quickstart-portal-ios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ The quickstart applies to both iOS and macOS apps. Some steps are needed only fo
3535
![Shows how the sample app generated by this quickstart works](media/quickstart-v2-ios/ios-intro.svg)
3636

3737
#### Step 1: Configure your application
38-
For the code sample for this quickstart to work, add a **Redirect URI** compatible with the Auth broker.
38+
For the code sample in this quickstart to work, add a **Redirect URI** compatible with the Auth broker.
3939
> [!div id="makechanges" class="nextstepaction" class="configure-app-button"]
40-
> [Make this change for me]()
40+
> <button>Make this change for me</button>
4141
4242
> [!div id="appconfigured" class="alert alert-info"]
4343
> ![Already configured](media/quickstart-v2-ios/green-check.png) Your application is configured with these attributes

articles/active-directory/manage-apps/f5-big-ip-oracle-jde-easy-button.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The secure hybrid access solution for this scenario is made up of several compon
4343

4444
**Azure AD:** Security Assertion Markup Language (SAML) Identity Provider (IdP) responsible for verification of user credentials, Conditional Access (CA), and SSO to the BIG-IP.
4545

46-
**BIG-IP APM:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle service.
46+
**BIG-IP:** Reverse proxy and SAML service provider (SP) to the application, delegating authentication to the SAML IdP before performing header-based SSO to the Oracle service.
4747

4848
SHA for this scenario supports both SP and IdP initiated flows. The following image illustrates the SP initiated flow.
4949

@@ -146,9 +146,9 @@ Initiate the **Easy Button** configuration to set up a SAML Service Provider (SP
146146

147147
### Configuration Properties
148148

149-
The **Configuration Properties** tab creates up a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IP to programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
149+
The **Configuration Properties** tab creates a new application config and SSO object. Consider **Azure Service Account Details** section to be the client application you registered in your Azure AD tenant earlier. These settings allow a BIG-IP to programmatically register a SAML application directly in your tenant, along with the properties you would normally configure manually. Easy Button does this for every BIG-IP APM service being enabled for SHA.
150150

151-
Some of these are global settings so can be re-used for publishing more applications, further reducing deployment time and effort.
151+
Some of these are global settings can be re-used for publishing more applications, further reducing deployment time and effort.
152152

153153
1. Provide a unique **Configuration Name** that enables an admin to easily distinguish between Easy Button configurations
154154

articles/active-directory/reports-monitoring/howto-download-logs.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: active-directory
1212
ms.topic: how-to
1313
ms.workload: identity
1414
ms.subservice: report-monitor
15-
ms.date: 05/14/2021
15+
ms.date: 02/25/2022
1616
ms.author: markvi
1717
ms.reviewer: besiler
1818

@@ -39,8 +39,6 @@ This article explains how to download activity logs in Azure AD.
3939

4040
- By downloading the logs, you can control for how long logs are stored.
4141

42-
- You can download up to 250 000 records. If you want to download more data, use the reporting API.
43-
4442
- Your download is based on the filter you have set.
4543

4644
- Azure AD supports the following formats for your download:
@@ -51,6 +49,7 @@ This article explains how to download activity logs in Azure AD.
5149

5250
- The timestamps in the downloaded files are always based on UTC.
5351

52+
- For large data sets (> 250 000 records), you should use the reporting API to download the data.
5453

5554

5655
## What license do you need?
Loading
Loading

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 23 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: karenhoran
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 10/08/2021
10+
ms.date: 02/24/2022
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -31,7 +31,7 @@ The following diagram illustrates the Azure AD Verifiable Credentials architectu
3131

3232
![Diagram that illustrates the Azure AD Verifiable Credentials architecture.](media/verifiable-credentials-configure-tenant/verifiable-credentials-architecture.png)
3333

34-
See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c) of setting up the Azure AD Verifiable Credential service, including all prerequisites, like Azure AD and an Azure subscription.
34+
See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c) going over the setup of the Azure AD Verifiable Credential service.
3535

3636
## Prerequisites
3737

@@ -82,6 +82,8 @@ After you create your key vault, Verifiable Credentials generates a set of keys
8282
8383
A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) defines whether a specified security principal can perform operations on Key Vault secrets and keys. Set access policies in your key vault for both the administrator account of the Azure AD Verifiable Credentials service, and for the Request Service API principal that you created.
8484
85+
### Set access policies for the Verifiable Credentials Admin user
86+
8587
1. In the [Azure portal](https://portal.azure.com/), go to the key vault you use for this tutorial.
8688
8789
1. Under **Settings**, select **Access policies**.
@@ -94,20 +96,34 @@ A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) def
9496
9597
1. To save the changes, select **Save**.
9698
99+
### Set access policies for the Verifiable Credentials Issuer and Request services
100+
97101
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Request Service**.
98102
99103
1. In **Add access policy**:
100104
101105
1. For **Key permissions**, select **Get** and **Sign**.
102106
103-
1. For **Secret permissions**, select **Get**.
104-
105107
1. For **Select principal**, select **Verifiable Credential Request Service**.
106108
107109
1. Select **Add**.
108110
109-
![Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service.](media/verifiable-credentials-configure-tenant/set-key-vault-service-principal-access-policy.png)
111+
:::image type="content" source="media/verifiable-credentials-configure-tenant/request-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Issuer Service." :::
112+
113+
The access policies for the Verifiable Credentials Issuer service should be added automatically. If the **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
114+
115+
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Issuer Service**.
116+
117+
1. In **Add access policy**:
118+
119+
1. For **Key permissions**, select **Get** and **Sign**.
120+
121+
1. For **Select principal**, select **Verifiable Credential Issuer Service**.
122+
123+
1. Select **Add**.
110124
125+
:::image type="content" source="media/verifiable-credentials-configure-tenant/issuer-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
126+
111127
1. Select **Save** to save the new policy you created.
112128
113129
## Register an application in Azure AD
@@ -166,7 +182,7 @@ To set up Azure AD Verifiable Credentials, follow these steps:
166182
167183
1. **Organization name**: Enter a name to reference your business within Verifiable Credentials. Your customers don't see this name.
168184
169-
1. **Domain**: Enter a domain that's added to a service endpoint in your decentralized identity (DID) document. The domain is what binds your DID to something tangible that the user might know about your business. Microsoft Authenticator and other digital wallets use this information to validate that your DID is linked to your domain. If the wallet can verify the DID, it displays a verified symbol. If the wallet can't verify the DID, it informs the user that the credential was issued by an organization it couldn't validate.
185+
1. **Domain**: Enter a domain that's added to a service endpoint in your decentralized identity (DID) document. The domain is what binds your DID to something tangible that the user might know about your business. Microsoft Authenticator and other digital wallets use this information to validate that your DID is linked to your domain. If the wallet can verify the DID, it displays a verified symbol. If the wallet can't verify the DID, it informs the user that the credential was issued by an organization it couldn't validate.
170186
171187
>[!IMPORTANT]
172188
> The domain can't be a redirect. Otherwise, the DID and domain can't be linked. Make sure to use HTTPS for the domain. For example: `https://contoso.com`.
@@ -180,4 +196,4 @@ To set up Azure AD Verifiable Credentials, follow these steps:
180196
## Next steps
181197
182198
- [Learn how to issue Azure AD Verifiable Credentials from a web application](verifiable-credentials-configure-issuer.md).
183-
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).
199+
- [Learn how to verify Azure AD Verifiable Credentials](verifiable-credentials-configure-verifier.md).

articles/aks/private-clusters.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -97,11 +97,6 @@ The following parameters can be leveraged to configure Private DNS Zone.
9797
```azurecli-interactive
9898
az aks create -n <private-cluster-name> -g <private-cluster-resource-group> --load-balancer-sku standard --enable-private-cluster --enable-managed-identity --assign-identity <ResourceId> --private-dns-zone [system|none]
9999
```
100-
### Create a private AKS cluster with a BYO Private DNS SubZone
101-
102-
Prerequisites:
103-
104-
* Azure CLI >= 2.32.0 or later.
105100

106101
### Create a private AKS cluster with Custom Private DNS Zone or Private DNS SubZone
107102

articles/api-management/api-management-howto-aad.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,11 @@ In this article, you'll learn how to:
2626
## Prerequisites
2727

2828
- Complete the [Create an Azure API Management instance](get-started-create-service-instance.md) quickstart.
29+
2930
- [Import and publish](import-and-publish.md) an Azure API Management instance.
3031

32+
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](../../includes/azure-cli-prepare-your-environment-no-header.md)]
33+
3134
[!INCLUDE [premium-dev-standard.md](../../includes/api-management-availability-premium-dev-standard.md)]
3235

3336
## Authorize developer accounts by using Azure AD
@@ -104,8 +107,9 @@ Follow these steps to grant:
104107
* `Directory.Read.All` application permission for Microsoft Graph API and Azure Active Directory Graph API.
105108
* `User.Read` delegated permission for Microsoft Graph API.
106109

107-
1. Update the first 3 lines of the following PowerShell script to match your environment and run it.
108-
```powershell
110+
1. Update the first 3 lines of the following Azure CLI script to match your environment and run it.
111+
112+
```azurecli
109113
$subId = "Your Azure subscription ID" #e.g. "1fb8fadf-03a3-4253-8993-65391f432d3a"
110114
$tenantId = "Your Azure AD Tenant or Organization ID" #e.g. 0e054eb4-e5d0-43b8-ba1e-d7b5156f6da8"
111115
$appObjectID = "Application Object ID that has been registered in AAD" #e.g. "2215b54a-df84-453f-b4db-ae079c0d2619"
@@ -115,9 +119,10 @@ Follow these steps to grant:
115119
#Assign the following permissions: Microsoft Graph Delegated Permission: User.Read, Microsoft Graph Application Permission: Directory.ReadAll, Azure Active Directory Graph Application Permission: Directory.ReadAll (legacy)
116120
az rest --method PATCH --uri "https://graph.microsoft.com/v1.0/$($tenantId)/applications/$($appObjectID)" --body "{'requiredResourceAccess':[{'resourceAccess': [{'id': 'e1fe6dd8-ba31-4d61-89e7-88639da4683d','type': 'Scope'},{'id': '7ab1d382-f21e-4acd-a863-ba3e13f7da61','type': 'Role'}],'resourceAppId': '00000003-0000-0000-c000-000000000000'},{'resourceAccess': [{'id': '5778995a-e1bf-45b8-affa-663a9f3f4d04','type': 'Role'}], 'resourceAppId': '00000002-0000-0000-c000-000000000000'}]}"
117121
```
122+
118123
2. Log out and log back in to the Azure portal.
119124
3. Navigate to the App Registration page for the application you registered in [the previous section](#authorize-developer-accounts-by-using-azure-ad).
120-
4. Click **API Permissions**. You should see the permissions granted by the PowerShell script in step 1.
125+
4. Click **API Permissions**. You should see the permissions granted by the Azure CLI script in step 1.
121126
5. Select **Grant admin consent for {tenantname}** so that you grant access for all users in this directory.
122127

123128
Now you can add external Azure AD groups from the **Groups** tab of your API Management instance.

0 commit comments

Comments
 (0)