Skip to content

Commit c0fc144

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work1
2 parents 2a2fdf9 + 33b7ada commit c0fc144

File tree

97 files changed

+917
-782
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+917
-782
lines changed

articles/active-directory-b2c/partner-gallery.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4545
|:-------------------------|:--------------|
4646
| ![Screenshot of a asignio logo](./media/partner-gallery/asignio-logo.png) | [Asignio](./partner-asignio.md) is a passwordless, soft biometric, and MFA solution. Asignio uses a combination of the patented Asignio Signature and live facial verification for user authentication. The changeable biometric signature eliminates passwords, fraud, phishing, and credential reuse through omni-channel authentication. |
4747
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
48+
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
4849
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4950
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |
5051
| ![Screenshot of a idemia logo](./media/partner-gallery/idemia-logo.png) | [IDEMIA](./partner-idemia.md) is a passwordless authentication provider, which provides real-time consent-based services with biometric authentication like faceID and fingerprinting eliminating fraud and credential reuse. |
@@ -111,7 +112,7 @@ Microsoft partners with the following ISVs for tools that can help with implemen
111112
| ISV partner | Description and integration walkthroughs |
112113
|:-------------------------|:--------------|
113114
| ![Screenshot of a grit ief editor logo.](./media/partner-gallery/grit-logo.png) | [Grit Visual Identity Experience Framework Editor](./partner-grit-editor.md) provides a low code/no code experience for developers to create sophisticated authentication user journeys. The tool comes with integrated debugger and templates for the most used scenarios.|
114-
| ![Screenshot of a grit biometric authentication logo.](./media/partner-gallery/grit-logo.png) | [Grit biometric authentication](./partner-grit-authentication.md) provides users the option to sign in using finger print, face ID or [Windows Hello](https://support.microsoft.com/windows/learn-about-windows-hello-and-set-it-up-dae28983-8242-bb2a-d3d1-87c9d265a5f0) for enhanced security.
115+
115116

116117
## Additional information
117118

articles/active-directory/cloud-sync/custom-attribute-mapping.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ For additional information on directory extensions see [Using directory extensio
3030
3131
## Syncing directory extensions for Azure Active Directory Connect cloud sync
3232

33-
You can use [directory extensions](https://learn.microsoft.com/graph/api/resources/extensionproperty?view=graph-rest-1.0) to extend the synchronization schema directory definition in Azure Active Directory (Azure AD) with your own attributes.
33+
You can use [directory extensions](/graph/api/resources/extensionproperty?view=graph-rest-1.0&preserve-view=true) to extend the synchronization schema directory definition in Azure Active Directory (Azure AD) with your own attributes.
3434

3535
>[!Important]
3636
> Directory extension for Azure Active Directory Connect cloud sync is only supported for applications with the identifier URI “api://<tenantId>/CloudSyncCustomExtensionsApp” and the [Tenant Schema Extension App](../hybrid/how-to-connect-sync-feature-directory-extensions.md#configuration-changes-in-azure-ad-made-by-the-wizard) created by Azure AD Connect
3737
3838
### Create application and service principal for directory extension
3939

40-
You need to create an [application](https://learn.microsoft.com/graph/api/resources/application?view=graph-rest-1.0) with the identifier URI "api://<tenantId>/CloudSyncCustomExtensionsApp" if it doesn't exist and create a service principal for the application if it doesn't exist.
40+
You need to create an [application](/graph/api/resources/application?view=graph-rest-1.0&preserve-view=true) with the identifier URI "api://<tenantId>/CloudSyncCustomExtensionsApp" if it doesn't exist and create a service principal for the application if it doesn't exist.
4141

4242

4343
1. Check if application with the identifier URI "api://<tenantId>/CloudSyncCustomExtensionsApp" exists.
@@ -48,15 +48,15 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
4848
GET /applications?$filter=identifierUris/any(uri:uri eq 'api://<tenantId>/CloudSyncCustomExtensionsApp')
4949
```
5050
51-
For more information, see [Get application](https://learn.microsoft.com/graph/api/application-get?view=graph-rest-1.0&tabs=http)
51+
For more information, see [Get application](/graph/api/application-get?view=graph-rest-1.0&tabs=http&preserve-view=true)
5252
5353
- Using PowerShell
5454
5555
```
5656
Get-AzureADApplication -Filter "identifierUris/any(uri:uri eq 'api://<tenantId>/CloudSyncCustomExtensionsApp')"
5757
```
5858
59-
For more information, see [Get-AzureADApplication](https://learn.microsoft.com/powershell/module/azuread/get-azureadapplication?view=azureadps-2.0)
59+
For more information, see [Get-AzureADApplication](/powershell/module/azuread/get-azureadapplication?view=azureadps-2.0&preserve-view=true)
6060
6161
2. If the application doesn't exist, create the application with identifier URI “api://&LT;tenantId&GT;/CloudSyncCustomExtensionsApp.”
6262
@@ -70,13 +70,13 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
7070
"identifierUris": ["api://<tenant id>/CloudSyncCustomExtensionsApp"]
7171
}
7272
```
73-
For more information, see [create application](https://learn.microsoft.com/graph/api/application-post-applications?view=graph-rest-1.0&tabs=http)
73+
For more information, see [create application](/graph/api/application-post-applications?view=graph-rest-1.0&tabs=http&preserve-view=true)
7474
7575
- Using PowerShell
7676
```
7777
New-AzureADApplication -DisplayName "CloudSyncCustomExtensionsApp" -IdentifierUris "api://<tenant id>/CloudSyncCustomExtensionsApp"
7878
```
79-
For more information, see [New-AzureADApplication](https://learn.microsoft.com/powershell/module/azuread/new-azureadapplication?view=azureadps-2.0)
79+
For more information, see [New-AzureADApplication](/powershell/module/azuread/new-azureadapplication?view=azureadps-2.0&preserve-view=true)
8080
8181
8282
@@ -86,13 +86,13 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
8686
```
8787
GET /servicePrincipals?$filter=(appId eq '{appId}')
8888
```
89-
For more information, see [get service principal](https://learn.microsoft.com/graph/api/serviceprincipal-get?view=graph-rest-1.0&tabs=http)
89+
For more information, see [get service principal](/graph/api/serviceprincipal-get?view=graph-rest-1.0&tabs=http&preserve-view=true)
9090
9191
- Using PowerShell
9292
```
9393
Get-AzureADServicePrincipal -ObjectId '<application objectid>'
9494
```
95-
For more information, see [Get-AzureADServicePrincipal](https://learn.microsoft.com/powershell/module/azuread/get-azureadserviceprincipal?view=azureadps-2.0)
95+
For more information, see [Get-AzureADServicePrincipal](/powershell/module/azuread/get-azureadserviceprincipal?view=azureadps-2.0&preserve-view=true&preserve-view=true)
9696
9797
9898
4. If a service principal doesn't exist, create a new service principal for the application with identifier URI “api://&LT;tenantId&GT;/CloudSyncCustomExtensionsApp”
@@ -107,31 +107,31 @@ You need to create an [application](https://learn.microsoft.com/graph/api/resour
107107
"<application appId>"
108108
}
109109
```
110-
For more information, see [create servicePrincipal](https://learn.microsoft.com/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http)
110+
For more information, see [create servicePrincipal](/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http&preserve-view=true)
111111
112112
- Using PowerShell
113113
114114
```
115115
New-AzureADServicePrincipal -AppId '<appId>'
116116
```
117-
For more information, see [New-AzureADServicePrincipal](https://learn.microsoft.com/powershell/module/azuread/new-azureadserviceprincipal?view=azureadps-2.0)
117+
For more information, see [New-AzureADServicePrincipal](/powershell/module/azuread/new-azureadserviceprincipal?view=azureadps-2.0&preserve-view=true)
118118
119119
5. You can create directory extensions in Azure AD in several different ways.
120120
121121
|Method|Description|URL|
122122
|-----|-----|-----|
123-
|MS Graph|Create extensions using GRAPH|[Create extensionProperty](https://learn.microsoft.com/graph/api/application-post-extensionproperty?view=graph-rest-1.0&tabs=http)|
124-
|PowerShell|Create extensions using PowerShell|[New-AzureADApplicationExtensionProperty](https://learn.microsoft.com/powershell/module/azuread/new-azureadapplicationextensionproperty?view=azureadps-2.0)|
125-
Using Cloud Sync and Azure AD Connect|Create extensions using Azure AD Connect|[Create an extension attribute using Azure AD Connect](https://learn.microsoft.com/azure/active-directory/app-provisioning/user-provisioning-sync-attributes-for-mapping#create-an-extension-attribute-using-azure-ad-connect)|
126-
|Customizing attributes to sync|Information on customizing which attributes to synch|[Customize which attributes to synchronize with Azure AD](https://learn.microsoft.com/azure/active-directory/hybrid/how-to-connect-sync-feature-directory-extensions#customize-which-attributes-to-synchronize-with-azure-ad)
123+
|MS Graph|Create extensions using GRAPH|[Create extensionProperty](/graph/api/application-post-extensionproperty?view=graph-rest-1.0&tabs=http&preserve-view=true)|
124+
|PowerShell|Create extensions using PowerShell|[New-AzureADApplicationExtensionProperty](/powershell/module/azuread/new-azureadapplicationextensionproperty?view=azureadps-2.0&preserve-view=true)|
125+
Using Cloud Sync and Azure AD Connect|Create extensions using Azure AD Connect|[Create an extension attribute using Azure AD Connect](../app-provisioning/user-provisioning-sync-attributes-for-mapping.md#create-an-extension-attribute-using-azure-ad-connect)|
126+
|Customizing attributes to sync|Information on customizing which attributes to synch|[Customize which attributes to synchronize with Azure AD](../hybrid/how-to-connect-sync-feature-directory-extensions.md#customize-which-attributes-to-synchronize-with-azure-ad)
127127
128128
## Use attribute mapping to map Directory Extensions
129129
If you have extended Active Directory to include custom attributes, you can add these attributes and map them to users.
130130
131131
To discover and map attributes, click **Add attribute mapping**. The attributes will automatically be discovered and will be available in the drop-down under **source attribute**. Fill in the type of mapping you want and click **Apply**.
132132
[![Custom attribute mapping](media/custom-attribute-mapping/schema-1.png)](media/custom-attribute-mapping/schema-1.png#lightbox)
133133
134-
For information on new attributes that are added and updated in Azure AD see the [user resource type](https://docs.microsoft.com/graph/api/resources/user?view=graph-rest-1.0#properties) and consider subscribing to [change notifications](https://docs.microsoft.com/graph/webhooks).
134+
For information on new attributes that are added and updated in Azure AD see the [user resource type](/graph/api/resources/user?view=graph-rest-1.0#properties&preserve-view=true) and consider subscribing to [change notifications](/graph/webhooks).
135135
136136
For more information on extension attributes, see [Syncing extension attributes for Azure Active Directory Application Provisioning](../app-provisioning/user-provisioning-sync-attributes-for-mapping.md)
137137

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ ms.workload: identity
1212
ms.topic: how-to
1313
ms.date: 11/11/2021
1414
ms.author: davidmu
15+
ms.reviewer: jeedes
1516
---
1617

1718
# Configure the role claim issued in the SAML token for enterprise applications

articles/active-directory/develop/active-directory-jwt-claims-customization.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.topic: how-to
1111
ms.date: 12/19/2022
1212
ms.author: davidmu
1313
ms.custom: aaddev
14+
ms.reviewer: rahulnagraj, alamaral
1415
---
1516

1617
# Customize claims issued in the JSON web token (JWT) for enterprise applications (Preview)

articles/active-directory/governance/check-status-workflow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 03/10/2022
10+
ms.date: 01/26/2023
1111
ms.subservice: compliance
1212
ms.custom: template-how-to
1313
---

articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ author: owinfreyATL
55
ms.author: owinfrey
66
ms.service: active-directory
77
ms.topic: reference
8-
ms.date: 08/28/2022
9-
ms.custom: template-how-to
8+
ms.date: 01/26/2023
9+
ms.custom: template-how-to
1010
---
1111

1212

articles/active-directory/governance/create-lifecycle-workflow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 02/15/2022
10+
ms.date: 01/26/2023
1111
ms.subservice: compliance
1212
ms.custom: template-how-to
1313
---

articles/active-directory/governance/customize-workflow-schedule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 01/20/2022
10+
ms.date: 01/26/2023
1111
ms.subservice: compliance
1212
ms.author: owinfrey
1313
ms.reviewer: krbain

articles/active-directory/governance/delete-lifecycle-workflow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 01/20/2022
10+
ms.date: 01/26/2023
1111
ms.subservice: compliance
1212
ms.author: owinfrey
1313
ms.reviewer: krbain

articles/active-directory/governance/identity-governance-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,16 @@ title: Identity Governance - Microsoft Entra | Microsoft Docs
33
description: Microsoft Entra Identity Governance allows you to balance your organization's need for security and employee productivity with the right processes and visibility.
44
services: active-directory
55
documentationcenter: ''
6-
author: amsliu
6+
author: owinfreyATL
77
manager: amycolannino
88
editor: markwahl-msft
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.topic: overview
1313
ms.subservice: compliance
14-
ms.date: 8/10/2022
15-
ms.author: amsliu
14+
ms.date: 01/26/2023
15+
ms.author: owinfrey
1616
ms.reviewer: markwahl-msft
1717
ms.collection: M365-identity-device-management
1818
---

0 commit comments

Comments
 (0)