Skip to content

Commit c4b05d6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into fixNewReg
2 parents b2870c8 + 0b32348 commit c4b05d6

File tree

2,194 files changed

+37240
-16469
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,194 files changed

+37240
-16469
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1018,7 +1018,7 @@
10181018
},
10191019
{
10201020
"path_to_root": "microsoft-graph",
1021-
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs",
1021+
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs-contrib",
10221022
"branch": "main",
10231023
"branch_mapping": {}
10241024
},

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/active-directory/saas-apps/gainsight-tutorial",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path_from_root": "/articles/active-directory/saas-apps/postman-provisioning-tutorialy.md",
110+
"redirect_url": "/azure/active-directory/saas-apps/postman-provisioning-tutorial",
111+
"redirect_document_id": false
112+
},
108113
{
109114
"source_path_from_root": "/articles/active-directory/saas-apps/iauditor-tutorial.md",
110115
"redirect_url": "/azure/active-directory/saas-apps/safety-culture-tutorial",

.openpublishing.redirection.azure-vmware.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@
99
"source_path_from_root": "/articles/azure-vmware/attach-disk-pools-to-azure-vmware-solution-hosts.md",
1010
"redirect_url": "/azure/storage/elastic-san/elastic-san-introduction",
1111
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-vmware/migrate-sql-server-always-on-cluster.md",
15+
"redirect_url": "/azure/azure-vmware/migrate-sql-server-always-on-availability-group",
16+
"redirect_document_id": false
1217
}
1318
]
1419
}

.openpublishing.redirection.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14897,6 +14897,11 @@
1489714897
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1489814898
"redirect_document_id": ""
1489914899
},
14900+
{
14901+
"source_path_from_root": "/articles/search/semantic-ranking.md",
14902+
"redirect_url": "/azure/search/semantic-search-overview",
14903+
"redirect_document_id": true
14904+
},
1490014905
{
1490114906
"source_path_from_root": "/articles/search/tutorial-csharp-create-first-app.md",
1490214907
"redirect_url": "/previous-versions/azure/search/tutorial-csharp-create-first-app",
@@ -23347,6 +23352,56 @@
2334723352
"redirect_url": "/azure/active-directory/develop/quickstart-register-app",
2334823353
"redirect_document_id": false
2334923354
},
23355+
{
23356+
"source_path_from_root": "/articles/active-directory/develop/migrate-adal-msal-java.md",
23357+
"redirect_url": "/entra/msal/java/advanced/support-for-adfs",
23358+
"redirect_document_id": false
23359+
},
23360+
{
23361+
"source_path_from_root": "/articles/active-directory/develop/msal-logging-java.md",
23362+
"redirect_url": "/entra/msal/java/advanced/msal-logging-java",
23363+
"redirect_document_id": false
23364+
},
23365+
{
23366+
"source_path_from_root": "/articles/active-directory/develop/msal-error-handling-java.md",
23367+
"redirect_url": "/entra/msal/java/advanced/msal-error-handling-java",
23368+
"redirect_document_id": false
23369+
},
23370+
{
23371+
"source_path_from_root": "/articles/active-directory/develop/msal-java-token-cache-serialization.md",
23372+
"redirect_url": "/entra/msal/java/advanced/msal-java-token-cache-serialization",
23373+
"redirect_document_id": false
23374+
},
23375+
{
23376+
"source_path_from_root": "/articles/active-directory/develop/msal-java-adfs-support.md",
23377+
"redirect_url": "/entra/msal/java/advanced/msal-java-adfs-support",
23378+
"redirect_document_id": false
23379+
},
23380+
{
23381+
"source_path_from_root": "/articles/active-directory/develop/msal-java-get-remove-accounts-token-cache.md",
23382+
"redirect_url": "/entra/msal/java/advanced/msal-java-get-remove-accounts-token-cache",
23383+
"redirect_document_id": false
23384+
},
23385+
{
23386+
"source_path_from_root": "/articles/active-directory/develop/migrate-python-adal-msal.md",
23387+
"redirect_url": "/entra/msal/python/advanced/migrate-python-adal-msal",
23388+
"redirect_document_id": false
23389+
},
23390+
{
23391+
"source_path_from_root": "/articles/active-directory/develop/msal-logging-python.md",
23392+
"redirect_url": "/entra/msal/python/advanced/msal-logging-python",
23393+
"redirect_document_id": false
23394+
},
23395+
{
23396+
"source_path_from_root": "/articles/active-directory/develop/msal-error-handling-python.md",
23397+
"redirect_url": "/entra/msal/python/advanced/msal-error-handling-python",
23398+
"redirect_document_id": false
23399+
},
23400+
{
23401+
"source_path_from_root": "/articles/active-directory/develop/msal-python-token-cache-serialization.md",
23402+
"redirect_url": "/entra/msal/python/advanced/msal-python-token-cache-serialization",
23403+
"redirect_document_id": false
23404+
},
2335023405
{
2335123406
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
2335223407
"redirect_url": "/azure/orbital/overview",

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/06/2023
12+
ms.date: 09/06/2023
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -133,9 +133,11 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
133133

134134
|Feature |User flow |Custom policy |Notes |
135135
|---------|:---------:|:---------:|---------|
136-
|[API connectors](api-connectors-overview.md) | Preview | GA | |
137-
|[Secure with basic authentication](secure-rest-api.md#http-basic-authentication) | Preview | GA | |
138-
|[Secure with client certificate authentication](secure-rest-api.md#https-client-certificate-authentication) | Preview | GA | |
136+
|[After federating with an identity provider during sign-up](api-connectors-overview.md?pivots=b2c-user-flow#after-federating-with-an-identity-provider-during-sign-up) | GA | GA | |
137+
|[Before creating the user](api-connectors-overview.md?pivots=b2c-user-flow#before-creating-the-user) | GA | GA | |
138+
|[Before including application claims in token](api-connectors-overview.md?pivots=b2c-user-flow#before-sending-the-token-preview)| Preview | GA | |
139+
|[Secure with basic authentication](secure-rest-api.md#http-basic-authentication) | GA | GA | |
140+
|[Secure with client certificate authentication](secure-rest-api.md#https-client-certificate-authentication) | GA | GA | |
139141
|[Secure with OAuth2 bearer authentication](secure-rest-api.md#oauth2-bearer-authentication) | NA | GA | |
140142
|[Secure API key authentication](secure-rest-api.md#api-key-authentication) | NA | GA | |
141143

articles/active-directory-domain-services/faqs.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 08/01/2023
14+
ms.date: 09/05/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Azure Active Directory (AD) Domain Services
1717
summary: This page answers frequently asked questions about Azure Active Directory Domain Services.
@@ -106,6 +106,11 @@ sections:
106106
answer: |
107107
Any user account that's part of the managed domain can join a VM. Members of the *Azure AD DC Administrators* group are granted remote desktop access to machines that have been joined to the managed domain.
108108
109+
- question: |
110+
Is there any quota for the number of machines that I can join to the domain?
111+
answer: |
112+
There's no quota in Azure AD DS for domain-joined machines.
113+
109114
- question: |
110115
Do I have domain administrator privileges for the managed domain provided by Azure AD Domain Services?
111116
answer: |

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/30/2023
4+
ms.date: 09/06/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory-domain-services/powershell-scoped-synchronization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 01/29/2023
12+
ms.date: 09/06/2023
1313
ms.author: justinha
1414
ms.custom: has-azure-ad-ps-ref
1515
---
@@ -86,7 +86,7 @@ foreach ($groupName in $groupsToAdd)
8686
Write-Output "****************************************************************************`n"
8787
Write-Output "`n****************************************************************************"
8888
89-
$currentAssignments = Get-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId
89+
$currentAssignments = Get-AzureADServiceAppRoleAssignment -ObjectId $sp.ObjectId -All $true
9090
Write-Output "Total current group-assignments: $($currentAssignments.Count), SP-ObjectId: $($sp.ObjectId)"
9191
9292
$currAssignedObjectIds = New-Object 'System.Collections.Generic.HashSet[string]'

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 05/05/2023
11+
ms.date: 08/05/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
zone_pivot_groups: app-provisioning-cross-tenant-synchronization
@@ -163,9 +163,12 @@ There are currently a few known limitations to on-demand provisioning. Post your
163163
::: zone pivot="app-provisioning"
164164
> [!NOTE]
165165
> The following limitations are specific to the on-demand provisioning capability. For information about whether an application supports provisioning groups, deletions, or other capabilities, check the tutorial for that application.
166-
167-
* On-demand provisioning of groups supports updating up to five members at a time
166+
* On-demand provisioning of groups supports updating up to five members at a time. Connectors for cross-tenant synchronization, Workday, etc. do not support group provisioning and as a result do not support on-demand provisioning of groups.
167+
::: zone-end
168+
::: zone pivot="cross-tenant-synchronization"
169+
* On-demand provisioning of groups is not supported for cross-tenant synchronization.
168170
::: zone-end
171+
* On-demand provisioning supports provisioning one user at a time through the Microsoft Entra portal.
169172
* Restoring a previously soft-deleted user in the target tenant with on-demand provisioning isn't supported. If you try to soft-delete a user with on-demand provisioning and then restore the user, it can result in duplicate users.
170173
* On-demand provisioning of roles isn't supported.
171174
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users don't appear when you search for a user.

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/17/2023
11+
ms.date: 09/08/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -888,7 +888,7 @@ organization.",
888888

889889
**TLS Protocol Versions**
890890

891-
The only acceptable protocol versions are TLS 1.2 and TLS 1.3. No other SSL/TLS versions are permitted.
891+
The only acceptable protocol version is TLS 1.2. No other SSL/TLS version is permitted.
892892

893893
- RSA keys must be at least 2,048 bits.
894894
- ECC keys must be at least 256 bits, generated using an approved elliptic curve

0 commit comments

Comments
 (0)