Skip to content

Commit c629a34

Browse files
authored
Merge branch 'main' into jasonshave/known-issues
2 parents 2381a89 + 622ca7c commit c629a34

File tree

450 files changed

+6324
-4564
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

450 files changed

+6324
-4564
lines changed

.openpublishing.redirection.defender-for-iot.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,12 +142,12 @@
142142
},
143143
{
144144
"source_path_from_root": "/articles/defender-for-iot/how-to-create-and-manage-users.md",
145-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-create-and-manage-users",
145+
"redirect_url": "/azure/defender-for-iot/organizations/manage-users-overview",
146146
"redirect_document_id": false
147147
},
148148
{
149149
"source_path_from_root": "/articles/defender-for-iot/how-to-define-global-user-access-control.md",
150-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-define-global-user-access-control",
150+
"redirect_url": "/azure/defender-for-iot/organizations/manage-users-on-premises-management-console#define-global-access-permission-for-on-premises-users",
151151
"redirect_document_id": false
152152
},
153153
{

.openpublishing.redirection.healthcare-apis.json

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -554,6 +554,34 @@
554554
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-iot-jsonpath-content-mappings",
555555
"redirect_document_id": false
556556
},
557+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-iot-connector-in-azure.md",
558+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-choose",
559+
"redirect_document_id": false
560+
},
561+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-02-new-button.md",
562+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-button",
563+
"redirect_document_id": false
564+
},
565+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-03-new-manual.md",
566+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-manual",
567+
"redirect_document_id": false
568+
},
569+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-05-new-config.md",
570+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-config",
571+
"redirect_document_id": false
572+
},
573+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-06-new-deploy.md",
574+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-deploy",
575+
"redirect_document_id": false
576+
},
577+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-08-new-ps-cli.md",
578+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-powershell-cli",
579+
"redirect_document_id": false
580+
},
581+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-new-bicep-ps-cli.md",
582+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-bicep-powershell-cli",
583+
"redirect_document_id": false
584+
},
557585
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
558586
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
559587
"redirect_document_id": false

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16323,6 +16323,11 @@
1632316323
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1632416324
"redirect_document_id": ""
1632516325
},
16326+
{
16327+
"source_path_from_root": "/articles/search/search-how-to-index-power-query-data-sources.md",
16328+
"redirect_url": "/previous-versions/azure/search/search-how-to-index-power-query-data-sources",
16329+
"redirect_document_id": false
16330+
},
1632616331
{
1632716332
"source_path_from_root": "/articles/search/cognitive-search-quickstart-ocr.md",
1632816333
"redirect_url": "/azure/search/cognitive-search-quickstart-blob",

articles/active-directory-b2c/partner-gallery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Microsoft partners with the following ISVs to provide secure hybrid access to on
7676

7777
| ISV partner | Description and integration walkthroughs |
7878
|:-------------------------|:--------------|
79-
| ![Screenshot of an Akamai logo.](./media/partner-gallery/akamai-logo.png) | [Akamai](./partner-akamai-secure-hybrid-access.md) is a Zero Trust Network Access (ZTNA) solution that enables secure remote access to modern and legacy applications that reside in private datacenters. |
79+
| ![Screenshot of an Akamai logo.](./media/partner-gallery/akamai-logo.png) | [Akamai](./partner-akamai-secure-hybrid-access.md) provides a Zero Trust Network Access (ZTNA) solution that enables secure remote access to modern and legacy applications that reside in private datacenters. |
8080
| ![Screenshot of a Datawiza logo](./media/partner-gallery/datawiza-logo.png) | [Datawiza](./partner-datawiza.md) enables SSO and granular access control for your applications and extends Azure AD B2C to protect on-premises legacy applications. |
8181
| ![Screenshot of a F5 logo](./media/partner-gallery/f5-logo.png) | [F5](./partner-f5.md) enables legacy applications to securely expose to the internet through BIG-IP security combined with Azure AD B2C pre-authentication, Conditional Access (CA) and SSO. |
8282
| ![Screenshot of a Ping logo](./media/partner-gallery/ping-logo.png) | [Ping Identity](./partner-ping-identity.md) enables secure hybrid access to on-premises legacy applications across multiple clouds. |

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 11/12/2022
10+
ms.date: 11/29/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -44,7 +44,15 @@ After you configure the provisioning agent and ECMA host, it's time to test conn
4444
7. Ensure that you're using a valid certificate that has not expired. Go to the **Settings** tab of the ECMA host to view the certificate expiration date. If the certificate has expired, click `Generate certificate` to generate a new certificate.
4545
8. Restart the provisioning agent by going to the taskbar on your VM by searching for the Microsoft Azure AD Connect provisioning agent. Right-click **Stop**, and then select **Start**.
4646
1. If you continue to see `The ECMA host is currently importing data from the target application` even after restarting the ECMA Connector Host and the provisioning agent, and waiting for the initial import to complete, then you may need to cancel and start over configuring provisioning to the application in the Azure portal.
47-
1. When you provide the tenant URL in the Azure portal, ensure that it follows the following pattern. You can replace `localhost` with your host name, but it isn't required. Replace `connectorName` with the name of the connector you specified in the ECMA host. The error message 'invalid resource' generally indicates that the URL does not follow the expected format.
47+
1. When configuring the ECMA host, ensure that you provide a certificate with a subject that matches the hostname of your windows server. The certificate that is generated by the ECMA host will do this for you automatically, but should only be used for testing purposes.
48+
49+
```
50+
Error code: SystemForCrossDomainIdentityManagementCredentialValidationUnavailable
51+
52+
Details: We received this unexpected response from your application: Received response from Web resource. Resource: https://localhost/Users?filter=PLACEHOLDER+eq+"8646d011-1693-4cd3-9ee6-0d7482ca2219" Operation: GET Response Status Code: InternalServerError Response Headers: Response Content: An error occurred while sending the request. Please check the service and try again.
53+
```
54+
55+
1. When you provide the tenant URL in the Azure portal, ensure that it follows the following pattern. You can replace `localhost` with your host name, but it isn't required. Replace `connectorName` with the name of the connector you specified in the ECMA host. The error message 'invalid resource' generally indicates that the URL does not follow the expected format.
4856
4957
```
5058
https://localhost:8585/ecma2host_connectorName/scim

articles/active-directory/authentication/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -310,8 +310,12 @@
310310
href: /samples/browse/?products=azure
311311
- name: Azure PowerShell cmdlets
312312
href: /powershell/azure/
313-
- name: Microsoft Graph REST API beta
313+
- name: Authentication methods APIs - Microsoft Graph
314314
href: /graph/api/resources/authenticationmethods-overview
315+
- name: Authentication strengths APIs - Microsoft Graph (preview)
316+
href: /graph/api/resources/authenticationstrengths-overview
317+
- name: Authentication methods policy - Microsoft Graph
318+
href: /graph/api/resources/authenticationmethodspolicies-overview
315319
- name: Service limits and restrictions
316320
href: ../enterprise-users/directory-service-limits-restrictions.md
317321
- name: FIDO2 compatibility

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ To map the pattern supported by certificateUserIds, administrators must use expr
134134
You can use the following expression for mapping to SKI and SHA1-PUKEY:
135135

136136
```
137-
IF(IsPresent([alternativeSecurityId]),
137+
IIF(IsPresent([alternativeSecurityId]),
138138
Where($item,[alternativeSecurityId],BitOr(InStr($item, "x509:<SKI>"),InStr($item, "x509:<SHA1-PUKEY>"))>0),[alternativeSecurityId]
139139
)
140140
```

articles/active-directory/external-identities/api-connectors-overview.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: conceptual
8-
ms.date: 06/16/2020
8+
ms.date: 11/28/2022
99

1010
ms.author: mimart
1111
author: msmimart
1212
manager: celestedg
1313
ms.custom: "it-pro"
14-
ms.collection: M365-identity-device-management
14+
ms.collection: engagement-fy23, M365-identity-device-management
1515
---
1616

1717
# Use API connectors to customize and extend self-service sign-up
@@ -25,7 +25,7 @@ As a developer or IT administrator, you can use [API connectors](self-service-si
2525
- **Overwrite user attributes**. Reformat or assign a value to an attribute collected from the user. For example, if a user enters the first name in all lowercase or all uppercase letters, you can format the name with only the first letter capitalized.
2626
- **Run custom business logic**. You can trigger downstream events in your cloud systems to send push notifications, update corporate databases, manage permissions, audit databases, and perform other custom actions.
2727

28-
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the sign up flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to re-enter information, or overwrite and append user attributes.
28+
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the sign-up flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to reenter information, or overwrite and append user attributes.
2929

3030
## Where you can enable an API connector in a user flow
3131

@@ -39,7 +39,7 @@ There are two places in a user flow where you can enable an API connector:
3939
4040
### After federating with an identity provider during sign-up
4141

42-
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the ***attribute collection page***, which is the form presented to the user to collect user attributes. This step is not invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
42+
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the [***attribute collection page***](self-service-sign-up-user-flow.md#select-the-layout-of-the-attribute-collection-form), which is the form presented to the user to collect user attributes. This step isn't invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
4343

4444
- Use the email or federated identity that the user provided to look up claims in an existing system. Return these claims from the existing system, pre-fill the attribute collection page, and make them available to return in the token.
4545
- Implement an allow or blocklist based on social identity.
@@ -55,4 +55,5 @@ An API connector at this step in the sign-up process is invoked after the attrib
5555

5656
## Next steps
5757
- Learn how to [add an API connector to a user flow](self-service-sign-up-add-api-connector.md)
58+
- Learn about [Azure AD entitlement management](self-service-portal.md)
5859
- Learn how to [add a custom approval system to self-service sign-up](self-service-sign-up-add-approvals.md)

articles/active-directory/external-identities/self-service-portal.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: conceptual
8-
ms.date: 02/12/2020
8+
ms.date: 11/25/2022
99

1010
ms.author: mimart
1111
author: msmimart
1212
manager: celestedg
1313

14-
ms.collection: M365-identity-device-management
14+
ms.collection: engagement-fy23, M365-identity-device-management
1515
---
1616

1717
# Self-service for Azure AD B2B collaboration sign-up
@@ -20,14 +20,14 @@ Customers can do a lot with the built-in features that are exposed through the [
2020

2121
## Azure AD entitlement management for B2B guest user sign-up
2222

23-
As an inviting organization, you might not know ahead of time who the individual external collaborators are who need access to your resources. You need a way for users from partner companies to sign themselves up with policies that you control. If you want to enable users from other organizations to request access, and upon approval be provisioned with guest accounts and assigned to groups, apps and SharePoint Online sites, you can use [Azure AD entitlement management](../governance/entitlement-management-overview.md) to configure policies that [manage access for external users](../governance/entitlement-management-external-users.md#how-access-works-for-external-users).
23+
As an inviting organization, you might not know ahead of time who the individual external collaborators are who need access to your resources. You need a way for users from partner companies to sign themselves up with policies that you control. You can use [Azure AD entitlement management](../governance/entitlement-management-overview.md) to configure policies, which [manage access for external users](../governance/entitlement-management-external-users.md#how-access-works-for-external-users). This will enable users from other organizations to request access, and upon approval be provisioned with guest accounts and assigned to groups, apps and SharePoint Online sites.
2424

2525
## Azure Active Directory B2B invitation API
2626

2727
Organizations can use the [Microsoft Graph invitation manager API](/graph/api/resources/invitation) to build their own onboarding experiences for B2B guest users. When you want to offer self-service B2B guest user sign-up, we recommend that you use [Azure AD entitlement management](../governance/entitlement-management-overview.md). But if you want to build your own experience, you can use the [create invitation API](/graph/api/invitation-post?tabs=http) to automatically send your customized invitation email directly to the B2B user, for example. Or your app can use the inviteRedeemUrl returned in the creation response to craft your own invitation (through your communication mechanism of choice) to the invited user.
2828

2929
## Next steps
3030

31-
* [What is Azure AD B2B collaboration?](what-is-b2b.md)
32-
* [External Identities pricing](external-identities-pricing.md)
33-
* [Azure Active Directory B2B collaboration frequently asked questions (FAQ)](faq.yml)
31+
- [Self-service sign-up user flows](self-service-sign-up-overview.md)
32+
- [What is Azure AD B2B collaboration?](what-is-b2b.md)
33+
- [External Identities pricing](external-identities-pricing.md)

0 commit comments

Comments
 (0)