Skip to content

Commit c7d4ba5

Browse files
authored
Merge pull request #179793 from MicrosoftDocs/master
11/12 PM Publish
2 parents e1037fa + 1fa7d42 commit c7d4ba5

File tree

188 files changed

+2931
-961
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

188 files changed

+2931
-961
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -591,12 +591,6 @@
591591
"branch": "master",
592592
"branch_mapping": {}
593593
},
594-
{
595-
"path_to_root": "samples-cosmosdb-dotnet-v2",
596-
"url": "https://github.com/Azure/azure-cosmos-dotnet-v2",
597-
"branch": "master",
598-
"branch_mapping": {}
599-
},
600594
{
601595
"path_to_root": "samples-cosmosdb-java-v4-web-app",
602596
"url": "https://github.com/Azure-Samples/azure-cosmos-java-sql-api-todo-app",
@@ -717,12 +711,6 @@
717711
"branch": "master",
718712
"branch_mapping": {}
719713
},
720-
{
721-
"path_to_root": "azure-cosmosdb-java-v2",
722-
"url": "https://github.com/Azure/azure-cosmosdb-java",
723-
"branch": "master",
724-
"branch_mapping": {}
725-
},
726714
{
727715
"path_to_root": "azure-cosmosdb-graph-dotnet",
728716
"url": "https://github.com/Azure-Samples/azure-cosmos-db-graph-gremlindotnet-getting-started",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -463,6 +463,16 @@
463463
"redirect_url": "/azure/frontdoor/edge-locations-by-abbreviation",
464464
"redirect_document_id": false
465465
},
466+
{
467+
"source_path_from_root": "/articles/frontdoor/standard-premium/troubleshoot-route-issues.md",
468+
"redirect_url": "/azure/frontdoor/troubleshoot-issues",
469+
"redirect_document_id": false
470+
},
471+
{
472+
"source_path_from_root": "/articles/frontdoor/front-door-troubleshoot-routing.md",
473+
"redirect_url": "/azure/frontdoor/troubleshoot-issues",
474+
"redirect_document_id": false
475+
},
466476
{
467477
"source_path_from_root": "/articles/azure-sql/database/doc-changes-updates-release-notes.md",
468478
"redirect_url": "/azure/azure-sql/database/doc-changes-updates-release-notes-whats-new",

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/29/2021
9+
ms.date: 11/12/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -58,7 +58,10 @@ To enable the authentication method for passwordless phone sign-in, complete the
5858
1. Each added group or user is enabled by default to use Microsoft Authenticator in both passwordless and push notification modes ("Any" mode). To change this, for each row:
5959
1. Browse to **...** > **Configure**.
6060
1. For **Authentication mode** - choose **Any**, or **Passwordless**. Choosing **Push** prevents the use of the passwordless phone sign-in credential.
61-
1. To apply the new policy, select **Save**.
61+
1. To apply the new policy, click **Save**.
62+
63+
>[!NOTE]
64+
>If you see an error when you try to save, the cause might be due to the number of users or groups being added. As a workaround, replace the users and groups you are trying to add with a single group, in the same operation, and then click **Save** again.
6265
6366
## User registration and management of Microsoft Authenticator
6467

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/03/2021
9+
ms.date: 11/12/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -52,6 +52,9 @@ Registration features for passwordless authentication methods rely on the combin
5252
1. **Target** - All users or Select users
5353
1. **Save** the configuration.
5454

55+
>[!NOTE]
56+
>If you see an error when you try to save, the cause might be due to the number of users or groups being added. As a workaround, replace the users and groups you are trying to add with a single group, in the same operation, and then click **Save** again.
57+
5558

5659
### FIDO Security Key optional settings
5760

articles/active-directory/governance/create-access-review.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create an access review of groups & applications - Azure AD
33
description: Learn how to create an access review of group members or application access in Azure Active Directory access reviews.
44
services: active-directory
55
author: ajburnle
6-
manager: daveba
6+
manager: karenhoran
77
editor: markwahl-msft
88
ms.service: active-directory
99
ms.workload: identity
@@ -117,7 +117,7 @@ For more information, see [License requirements](access-reviews-overview.md#lice
117117
> [!NOTE]
118118
> Action to apply on denied guest users isn't configurable on reviews scoped to more than guest users. It's also not configurable for reviews of **All Microsoft 365 groups with guest users.** When not configurable, the default option of removing user's membership from the resource is used on denied users.
119119
120-
13. Use **(Preview) At end of review, send notification to** to send notifications to other users or groups with completion updates. This feature allows for stakeholders other than the review creator to be updated on the progress of the review. To use this feature, select **Select User(s) or Group(s)** and add an additional user or group upon you want to receive the status of completion.
120+
13. Use **At end of review, send notification to** to send notifications to other users or groups with completion updates. This feature allows for stakeholders other than the review creator to be updated on the progress of the review. To use this feature, select **Select User(s) or Group(s)** and add an additional user or group upon you want to receive the status of completion.
121121

122122
14. In the **Enable review decision helpers** choose whether you would like your reviewer to receive recommendations during the review process. When enabled, users who have signed in during the previous 30-day period are recommended to be approved, while users who have not signed in during the past 30 days are recommended to be denied.
123123

articles/active-directory/privileged-identity-management/groups-role-settings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 11/09/2021
14+
ms.date: 11/12/2021
1515
ms.author: curtand
1616
ms.custom: pim
1717
ms.collection: M365-identity-device-management
@@ -91,7 +91,7 @@ Privileged Identity Management provides optional enforcement of Azure AD Multi-F
9191

9292
### Require multifactor authentication on active assignment
9393

94-
This option requires admins must complete a multifactor authentication before creating an active (as opposed to eligible) role assignment. Privileged Identity Management can't enforce multifactor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
94+
This option requires admins must complete multifactor authentication before creating an active (as opposed to eligible) role assignment. Privileged Identity Management can't enforce multifactor authentication when the user uses their role assignment because they are already active in the role from the time that it is assigned.
9595

9696
To require multifactor authentication when creating an active role assignment, select the **Require Multi-Factor Authentication on active assignment** check box.
9797

@@ -105,7 +105,7 @@ For more information, see [Multifactor authentication and Privileged Identity Ma
105105

106106
## Activation maximum duration
107107

108-
Use the **Activation maximum duration** slider to set the maximum time, in hours, that a role stays active before it expires. This value can be from one to 24 hours.
108+
Use the **Activation maximum duration** slider to set the maximum time, in hours, that an activation request for a role assignment remains active before it expires. This value can be from one to 24 hours.
109109

110110
## Require justification
111111

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.topic: how-to
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 11/12/2021
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim
@@ -82,7 +82,7 @@ For more information, see [Multifactor authentication and Privileged Identity Ma
8282

8383
## Activation maximum duration
8484

85-
Use the **Activation maximum duration** slider to set the maximum time, in hours, that a role stays active before it expires. This value can be from one to 24 hours.
85+
Use the **Activation maximum duration** slider to set the maximum time, in hours, that an activation request for a role assignment remains active before it expires. This value can be from one to 24 hours.
8686

8787
## Require justification
8888

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: how-to
1111
ms.tgt_pltfrm: na
1212
ms.workload: identity
1313
ms.subservice: pim
14-
ms.date: 10/07/2021
14+
ms.date: 11/12/2021
1515
ms.author: curtand
1616
ms.reviewer: shaunliu
1717
ms.custom: pim
@@ -109,7 +109,7 @@ For more information, see [Multifactor authentication and Privileged Identity Ma
109109

110110
## Activation maximum duration
111111

112-
Use the **Activation maximum duration** slider to set the maximum time, in hours, that a role assignment stays active before it expires. This value can be from one to 24 hours.
112+
Use the **Activation maximum duration** slider to set the maximum time, in hours, that an activation request for a role assignment remains active before it expires. This value can be from one to 24 hours.
113113

114114
## Require justification
115115

articles/active-directory/reports-monitoring/overview-flagged-sign-ins.md

Lines changed: 24 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,20 @@
22

33
title: What are flagged sign-ins in Azure Active Directory?
44
description: Provides a general overview of flagged sign-ins in Azure Active Directory.
5+
services: active-directory
6+
documentationcenter: ''
57
author: MarkusVi
68
manager: karenhoran
9+
editor: ''
10+
711
ms.assetid: e2b3d8ce-708a-46e4-b474-123792f35526
812
ms.service: active-directory
13+
ms.devlang: na
914
ms.topic: overview
15+
ms.tgt_pltfrm: na
1016
ms.workload: identity
1117
ms.subservice: report-monitor
12-
ms.date: 10/27/2021
18+
ms.date: 11/12/2021
1319
ms.author: markvi
1420
ms.reviewer: tspring
1521

@@ -24,6 +30,8 @@ As an IT admin, when a user failed to sign-in, you want to resolve the issue as
2430
This article gives you an overview of a feature that significantly improves the time it takes to resolve user sign-in problems by making the related problems easy to find.
2531

2632

33+
34+
2735
## What it is
2836

2937
Azure AD sign-in events are critical to understanding what went right or wrong with user sign-ins and the authentication configuration in a tenant. However, Azure AD processes over 8 billion authentications a day, which can result in so many sign-in events that admins may find it difficult to find the ones which matter. In other words, the sheer number of sign-in events can make the signal of users who need assistance get lost in the volume of a large number of events.
@@ -35,7 +43,9 @@ Flagged sign-ins gives the user the ability to enable flagging when an error is
3543
In summary, you can use flagged sign-ins to:
3644

3745
- **Empower** users to indicate the sign-in errors they need their tenant admins help on.
46+
3847
- **Simplify** the process of locating the sign-in errors a user needs to be resolved.
48+
3949
- **Enable** help desk personal find the problems users want help with proactively- without the end user having to do anything other than flag the event.
4050

4151
## How it works
@@ -66,20 +76,27 @@ After enabling flagging, the same browser application and client must be used or
6676

6777
### Admin or Developer: Find flagged events using MS Graph
6878

69-
You can find flagged sign-ins with a filtered query using the sign-ins reporting API. A sample query is:
70-
71-
`https://graph.microsoft.com/beta/auditlogs/signins?&$filter=(flaggedForReview eq true)`
79+
You can find flagged sign-ins with a filtered query using the sign-ins reporting API.
80+
81+
Show all Flagged Sign-ins:
82+
`https://graph.microsoft.com/beta/auditLogs/signIns?&$filter=flaggedforReview eq true`
7283

73-
For more information on using the sign-ins Graph API, see [signIn resource type](/graph/api/resources/signin?view=graph-rest-1.0&preserve-view=true).
84+
Flagged Sign-ins query for specific user by UPN (e.g.: [email protected]):
85+
`https://graph.microsoft.com/beta/auditLogs/signIns?&$filter=flaggedforReview eq true and userPrincipalname eq '[email protected]'`
86+
87+
Flagged Sign-ins query for specific user and date greater than:
88+
`https://graph.microsoft.com/beta/auditLogs/signIns?&$filter=flaggedforReview eq true and createdDateTime ge 2021-10-01 and userPrincipalname eq '[email protected]'`
89+
90+
For more information on using the sign-ins Graph API, see [signIn resource type](https://docs.microsoft.com/graph/api/resources/signin?view=graph-rest-1.0&preserve-view=true).
7491

7592

7693

7794

78-
## Who can create it?
95+
## Who can create flagged sign-ins?
7996

8097
Any user signing into Azure AD via web page can use flag sign-ins for review. Member and guest users alike can flag sign-in errors for review.
8198

82-
## Who can review it?
99+
## Who can review flagged sign-ins?
83100

84101
Reviewing flagged sign-in events requires permissions to read the Sign-in Report events in the Azure AD portal. For more information, see [who can access it?](concept-sign-ins.md#who-can-access-it)
85102

articles/aks/azure-hpc-cache.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,7 @@ STORAGE_ACCOUNT_ID=$(az storage account show --name $STORAGE_ACCOUNT_NAME --quer
128128
AD_USER=$(az ad signed-in-user show --query objectId -o tsv)
129129
CONTAINER_NAME=mystoragecontainer
130130
az role assignment create --role "Storage Blob Data Contributor" --assignee $AD_USER --scope $STORAGE_ACCOUNT_ID
131-
az storage container create --name $CONTAINER_NAME --account-name jebutlaksstorage --auth-mode login
131+
az storage container create --name $CONTAINER_NAME --account-name $STORAGE_ACCOUNT_NAME --auth-mode login
132132
```
133133

134134
Provide permissions to the Azure HPC Cache service account to access your storage account and Blob container.

0 commit comments

Comments
 (0)