Skip to content

Commit c993944

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fix
2 parents 3f328f1 + d6c496b commit c993944

File tree

96 files changed

+1053
-940
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+1053
-940
lines changed

articles/active-directory/develop/custom-extension-configure-saml-app.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Source claims from an external store (SAML app)
33
titleSuffix: Microsoft identity platform
44
description: Use a custom claims provider to augment tokens with claims from an external identity system. Configure a SAML app to receive tokens with external claims.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -40,9 +40,11 @@ The following steps are for registering a demo [XRayClaims](https://adfshelp.mic
4040

4141
Add a new, non-gallery SAML application in your tenant:
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com).
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4444

45-
1. Go to **Azure Active Directory** and then **Enterprise applications**. Select **New application** and then **Create your own application**.
45+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
46+
47+
1. Select **New application** and then **Create your own application**.
4648

4749
1. Add a name for the app. For example, **AzureADClaimsXRay**. Select the **Integrate any other application you don't find in the gallery (Non-gallery)** option and select **Create**.
4850

articles/active-directory/develop/custom-extension-get-started.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Get started with custom claims providers (preview)
33
titleSuffix: Microsoft identity platform
44
description: Learn how to develop and register an Azure Active Directory custom authentication extensions REST API. The custom authentication extension allows you to source claims from a data store that is external to Azure Active Directory.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -157,14 +157,11 @@ The following screenshot demonstrates how to configure the Azure HTTP trigger fu
157157

158158
In this step, you configure a custom authentication extension, which will be used by Azure AD to call your Azure function. The custom authentication extension contains information about your REST API endpoint, the claims that it parses from your REST API, and how to authenticate to your REST API. Follow these steps to register a custom authentication extension:
159159

160-
# [Azure portal](#tab/azure-portal)
160+
# [Microsoft Entra admin center](#tab/entra-admin-center)
161161

162-
1. Sign in to the [Azure portal](https://portal.azure.com).
163-
1. Under **Azure services**, select **Azure Active Directory**.
164-
1. Ensure your user account has the Global Administrator or Application Administrator and Authentication Extensibility Administrator role. Otherwise, learn how to [assign a role](../roles/manage-roles-portal.md).
165-
1. From the menu, select **Enterprise applications**.
166-
1. Under **Manage**, select the **Custom authentication extensions**.
167-
1. Select **Create a custom authentication extension**.
162+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer) and [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
163+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
164+
1. Select **Custom authentication extensions**, and then select **Create a custom authentication extension**.
168165
1. In **Basics**, select the **tokenIssuanceStart** event and select **Next**.
169166
1. In **Endpoint Configuration**, fill in the following properties:
170167

@@ -361,8 +358,9 @@ Follow these steps to register the **jwt.ms** web application:
361358

362359
### 3.1 Register a test web application
363360

364-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
365-
1. Select **App registrations**, and then select **New registration**.
361+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer).
362+
1. Browse to **Identity** > **Applications** > **Application registrations**.
363+
1. Select **New registration**.
366364
1. Enter a **Name** for the application. For example, **My Test application**.
367365
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
368366
1. In the **Select a platform** dropdown in **Redirect URI**, select **Web** and then enter `https://jwt.ms` in the URL text box.
@@ -414,12 +412,12 @@ For tokens to be issued with claims incoming from the custom authentication exte
414412

415413
Follow these steps to connect the *My Test application* with your custom authentication extension:
416414

417-
# [Azure portal](#tab/azure-portal)
415+
# [Microsoft Entra admin center](#tab/entra-admin-center)
418416

419417
First assign the custom authentication extension as a custom claims provider source:
420418

421-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
422-
1. Select **App registrations**, and find the *My Test application* registration you created.
419+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-administrator).
420+
1. Browse to **Identity** > **Applications** > **Application registrations**.
423421
1. In the **Overview** page, under **Managed application in local directory**, select **My Test application**.
424422
1. Under **Manage**, select **Single sign-on**.
425423
1. Under **Attributes & Claims**, select **Edit**.
@@ -630,7 +628,7 @@ If you configured the [Microsoft identity provider](#step-5-protect-your-azure-f
630628

631629
1. Under the **App registration**, enter the application ID (client ID) of the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
632630

633-
1. Go to your Azure AD tenant in which your custom authentication extension is registered, and select **Azure Active Directory** > **App registrations**.
631+
1. In the Microsoft Entra admin center:
634632
1. Select the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
635633
1. Select **Certificates & secrets** > **Client secrets** > **New client secret**.
636634
1. Add a description for your client secret.

articles/active-directory/develop/custom-extension-troubleshoot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot a custom claims provider
33
titleSuffix: Microsoft identity platform
44
description: Troubleshoot and monitor your custom claims provider API. Learn how to use logging and Azure AD sign-in logs to find errors and issues in your custom claims provider API.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -44,9 +44,9 @@ Azure AD sign-in logs also integrate with [Azure Monitor](../../azure-monitor/in
4444

4545
To access the Azure AD sign-in logs:
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com).
48-
1. In the **Enterprise apps** experience for your given application, select on the **Sign-in** logs tab.
49-
1. Select the latest sign-in log.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
48+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
49+
1. Select **Sign-in logs**, and then select the latest sign-in log.
5050
1. For more details, select the **Authentication Events** tab. Information related to the custom authentication extension REST API call is displayed, including any [error codes](#error-codes-reference).
5151

5252
:::image type="content" source="media/custom-extension-troubleshoot/authentication-events.png" alt-text="Screenshot that shows the authentication events information." :::
@@ -89,8 +89,8 @@ Use the following table to diagnose an error code.
8989

9090
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom authentiction extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
9191

92-
1. Sign in to the [Azure portal](https://portal.azure.com) with your Azure administrator account.
93-
1. Select **Azure Active Directory** > **App registrations**.
92+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
93+
1. Browse to **Identity** > **Applications** > **Application registrations**.
9494
1. Select the *Azure Functions authentication events API* app registration [you created previously](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension).
9595
1. Copy the [application ID](custom-extension-get-started.md#22-grant-admin-consent).
9696
1. If you haven't created an app secret, follow these steps:

articles/active-directory/develop/developer-support-help-options.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ If you need an answer to a question or help in solving a problem not covered in
2323
<img alt='Azure support' src='./media/common/logo_azure.svg'>
2424
</div>
2525

26-
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Azure portal:
26+
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Microsoft Entra admin center:
2727

28-
- If you already have an Azure Support Plan, [open a support request here](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
28+
- If you already have an Azure Support Plan, [open a support request here](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
2929

30-
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
30+
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
3131

3232
- If you're not an Azure customer, you can open a support request with [Microsoft Support for business](https://support.serviceshub.microsoft.com/supportforbusiness).
3333

articles/active-directory/multi-tenant-organizations/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,6 @@
4141
href: cross-tenant-synchronization-configure-graph.md
4242
- name: Scoping users or groups to be provisioned
4343
href: ../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md?toc=/azure/active-directory/multi-tenant-organizations/toc.json&pivots=cross-tenant-synchronization
44-
- name: Skip deletion for out-of-scope users
45-
href: ../app-provisioning/skip-out-of-scope-deletions.md?toc=/azure/active-directory/multi-tenant-organizations/toc.json&pivots=cross-tenant-synchronization
4644
- name: Enable accidental deletions prevention
4745
href: ../app-provisioning/accidental-deletions.md?toc=/azure/active-directory/multi-tenant-organizations/toc.json&pivots=cross-tenant-synchronization
4846
- name: Provision on-demand

articles/ai-services/computer-vision/language-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ Some features of the [Analyze - Image](https://westcentralus.dev.cognitive.micro
136136
|Language | Language code | Categories | Tags | Description | Adult | Brands | Color | Faces | ImageType | Objects | Celebrities | Landmarks | Captions/Dense captions|
137137
|:---|:---:|:----:|:---:|:---:|:---:|:---:|:---:|:---:|:---:|:---:|:---:|:---:|:--:|
138138
|Arabic |`ar`| || |||||| ||||
139-
|Azeri (Azerbaijani) |`az`| || |||||| ||||
139+
|Azerbaijani |`az`| || |||||| ||||
140140
|Bulgarian |`bg`| || |||||| ||||
141141
|Bosnian Latin |`bs`| || |||||| ||||
142142
|Catalan |`ca`| || |||||| ||||

articles/ai-services/content-moderator/language-support.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,11 @@ ms.author: pafarley
3232
|Assamese | |✔️ | | |
3333
|Azerbaijani | |✔️ | | |
3434
|Bangla - Bangladesh | |✔️ | | |
35-
|Bangla - India | |✔️ | | |
3635
|Balinese |✔️ | | | |
3736
|Basque | |✔️ | | |
3837
|Belarusian | |✔️ | | |
3938
|Bengali | ✔️| | | |
39+
|Bengali - India | |✔️ | | |
4040
|Bosnian - Cyrillic | |✔️ | | |
4141
|Bosnian - Latin | |✔️ | | |
4242
|Buginese |✔️ | | | |

articles/ai-services/document-intelligence/concept-custom-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -351,6 +351,7 @@ The following table lists the supported languages for print text by the most rec
351351
|:-----|:----:|
352352
|`Rwa`|`rwk`|
353353
|Sadri (Devanagari)|`sck`|
354+
|Sakha|`sah`|
354355
|Samburu|`saq`|
355356
|Samoan (Latin)|`sm`|
356357
|Sango|`sg`|
@@ -419,7 +420,6 @@ The following table lists the supported languages for print text by the most rec
419420
|Western Frisian|`fy`|
420421
|Wolof|`wo`|
421422
|Xhosa|`xh`|
422-
|Yakut|`sah`|
423423
|Yucatec Maya|`yua`|
424424
|Zapotec|`zap`|
425425
|Zarma|`dje`|

articles/ai-services/document-intelligence/concept-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -477,6 +477,7 @@ The following table lists the supported languages for print text by the most rec
477477
|Russian|ru|
478478
|Rwa|rwk|
479479
|Sadri (Devanagari)|sck|
480+
|Sakha|sah|
480481
|Samburu|saq|
481482
|Samoan (Latin)|sm|
482483
|Sango|sg|
@@ -549,7 +550,6 @@ The following table lists the supported languages for print text by the most rec
549550
|Western Frisian|fy|
550551
|Wolof|wo|
551552
|Xhosa|xh|
552-
|Yakut|sah|
553553
|Yucatec Maya|yua|
554554
|Zapotec|zap|
555555
|Zarma|dje|

articles/ai-services/document-intelligence/concept-invoice.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ See how data, including customer information, vendor details, and line items, is
172172
| &bullet; Italian (`it`) | Italy (`it`)|
173173
| &bullet; Portuguese (`pt`) | Portugal (`pt`), Brazil (`br`)|
174174
| &bullet; Dutch (`nl`) | Netherlands (`nl`)|
175-
| &bullet; Czech (`cs`) | Czechoslovakia (`cz`)|
175+
| &bullet; Czech (`cs`) | Czech Republic (`cz`)|
176176
| &bullet; Danish (`da`) | Denmark (`dk`)|
177177
| &bullet; Estonian (`et`) | Estonia (`ee`)|
178178
| &bullet; Finnish (`fi`) | Finland (`fl`)|

0 commit comments

Comments
 (0)