Skip to content

Commit ca9bb22

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vm-nic
2 parents 14baeee + e7a30f7 commit ca9bb22

File tree

368 files changed

+2232
-1294
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

368 files changed

+2232
-1294
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -790,7 +790,7 @@
790790
},
791791
{
792792
"source_path_from_root": "/articles/aks/concepts-diagnostics.md",
793-
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
793+
"redirect_url": "/azure/aks/aks-diagnostics",
794794
"redirect_document_id": false
795795
},
796796
{

articles/active-directory-b2c/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ conceptualContent:
244244
url: azure-sentinel.md
245245
itemType: how-to-guide
246246
- text: Regulations
247-
url: https://docs.microsoft.com/azure/compliance/
247+
url: ../compliance/index.yml
248248
itemType: concept
249249
#- text: 'Manage user access: Minors and parental consent'
250250
# url: manage-user-access.md
@@ -364,4 +364,4 @@ tools:
364364
- title: MSAL React
365365
url: https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/3-Authorization-II/2-call-api-b2c
366366
imageSrc: ../active-directory/develop/media/hub/react.svg
367-
## BAND 4 - TOOLS END #######################################################################################################################################
367+
## BAND 4 - TOOLS END #######################################################################################################################################

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 04/04/2022
10+
ms.date: 11/12/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616
# Troubleshoot on-premises application provisioning
1717

1818
## Troubleshoot test connection issues
19-
After you configure the provisioning agent and ECMA host, it's time to test connectivity from the Azure Active Directory (Azure AD) provisioning service to the provisioning agent, the ECMA host, and the application. To perform this end-to-end test, select **Test connection** in the application in the Azure portal. When the test connection fails, try the following troubleshooting steps:
19+
After you configure the provisioning agent and ECMA host, it's time to test connectivity from the Azure Active Directory (Azure AD) provisioning service to the provisioning agent, the ECMA host, and the application. To perform this end-to-end test, select **Test connection** in the application in the Azure portal. Be sure to wait 10 to 20 minutes after assigning an initial agent or changing the agent before testing the connection. If after this time the test connection fails, try the following troubleshooting steps:
2020

2121
1. Check that the agent and ECMA host are running:
2222
1. On the server with the agent installed, open **Services** by going to **Start** > **Run** > **Services.msc**.
@@ -31,7 +31,8 @@ After you configure the provisioning agent and ECMA host, it's time to test conn
3131
6. After you assign an agent, you need to wait 10 to 20 minutes for the registration to complete. The connectivity test won't work until the registration completes.
3232
7. Ensure that you're using a valid certificate. Go to the **Settings** tab of the ECMA host to generate a new certificate.
3333
8. Restart the provisioning agent by going to the taskbar on your VM by searching for the Microsoft Azure AD Connect provisioning agent. Right-click **Stop**, and then select **Start**.
34-
9. When you provide the tenant URL in the Azure portal, ensure that it follows the following pattern. You can replace `localhost` with your host name, but it isn't required. Replace `connectorName` with the name of the connector you specified in the ECMA host. The error message 'invalid resource' generally indicates that the URL does not follow the expected format.
34+
1. If you continue to see `The ECMA host is currently importing data from the target application` even after restarting the ECMA Connector Host and the provisioning agent, and waiting for the initial import to complete, then you may need to cancel and re-start configuring provisioning to the application in the Azure portal.
35+
1. When you provide the tenant URL in the Azure portal, ensure that it follows the following pattern. You can replace `localhost` with your host name, but it isn't required. Replace `connectorName` with the name of the connector you specified in the ECMA host. The error message 'invalid resource' generally indicates that the URL does not follow the expected format.
3536

3637
```
3738
https://localhost:8585/ecma2host_connectorName/scim
@@ -142,7 +143,7 @@ After the ECMA Connector Host schema mapping has been configured, start the serv
142143
| Error | Resolution |
143144
| ----------- | ----------- |
144145
| Could not load file or assembly 'file:///C:\Program Files\Microsoft ECMA2Host\Service\ECMA\Cache\8b514472-c18a-4641-9a44-732c296534e8\Microsoft.IAM.Connector.GenericSql.dll' or one of its dependencies. Access is denied. | Ensure that the network service account has 'full control' permissions over the cache folder. |
145-
| Invalid LDAP style of object's DN. DN: [email protected]" | Ensure the 'DN is Anchor' checkbox is not checked in the 'connectivity' page of the ECMA host. Ensure the 'autogenerated' checkbox is selected in the 'object types' page of the ECMA host. See [About anchor attributes and distinguished names](on-premises-application-provisioning-architecture.md#about-anchor-attributes-and-distinguished-names) for more information.|
146+
| Invalid LDAP style of object's DN. DN: [email protected]" or `Target Site: ValidByLdapStyle` | Ensure the 'DN is Anchor' checkbox is not checked in the 'connectivity' page of the ECMA host. Ensure the 'autogenerated' checkbox is selected in the 'object types' page of the ECMA host. See [About anchor attributes and distinguished names](on-premises-application-provisioning-architecture.md#about-anchor-attributes-and-distinguished-names) for more information.|
146147
147148
## Understand incoming SCIM requests
148149
@@ -232,7 +233,7 @@ By using Azure AD, you can monitor the provisioning service in the cloud and col
232233
```
233234

234235
### I am getting an Invalid LDAP style DN error when trying to configure the ECMA Connector Host with SQL
235-
By default, the genericSQL connector expects the DN to be populated using the LDAP style (when the 'DN is anchor' attribute is left unchecked in the first connectivity page). In the error message above, you can see that the DN is a UPN, rather than an LDAP style DN that the connector expects.
236+
By default, the generic SQL connector expects the DN to be populated using the LDAP style (when the 'DN is anchor' attribute is left unchecked in the first connectivity page). In the error message `Invalid LDAP style DN` or `Target Site: ValidByLdapStyle`, you may see that the DN field contains a user principal name (UPN), rather than an LDAP style DN that the connector expects.
236237

237238
To resolve this, ensure that **Autogenerated** is selected on the object types page when you configure the connector.
238239

articles/active-directory/authentication/overview-authentication.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Persistent session tokens are stored as persistent cookies on the web browser's
9999
| ESTSAUTHPERSISTENT | Common | Contains user's session information to facilitate SSO. Persistent. |
100100
| ESTSAUTHLIGHT | Common | Contains Session GUID Information. Lite session state cookie used exclusively by client-side JavaScript in order to facilitate OIDC sign-out. Security feature. |
101101
| SignInStateCookie | Common | Contains list of services accessed to facilitate sign-out. No user information. Security feature. |
102-
| CCState | Common | Contains session information state to be used between Azure AD and the [Azure AD Backup Authentication Service](/azure/active-directory/conditional-access/resilience-defaults). |
102+
| CCState | Common | Contains session information state to be used between Azure AD and the [Azure AD Backup Authentication Service](../conditional-access/resilience-defaults.md). |
103103
| buid | Common | Tracks browser related information. Used for service telemetry and protection mechanisms. |
104104
| fpc | Common | Tracks browser related information. Used for tracking requests and throttling. |
105105
| esctx | Common | Session context cookie information. For CSRF protection. Binds a request to a specific browser instance so the request can't be replayed outside the browser. No user information. |
@@ -116,15 +116,15 @@ Persistent session tokens are stored as persistent cookies on the web browser's
116116
| wlidperf | Common | Client-side cookie (set by JavaScript) that tracks local time for performance purposes. |
117117
| x-ms-gateway-slice | Common | Azure AD Gateway cookie used for tracking and load balance purposes. |
118118
| stsservicecookie | Common | Azure AD Gateway cookie also used for tracking purposes. |
119-
| x-ms-refreshtokencredential | Specific | Available when [Primary Refresh Token (PRT)](/azure/active-directory/devices/concept-primary-refresh-token) is in use. |
119+
| x-ms-refreshtokencredential | Specific | Available when [Primary Refresh Token (PRT)](../devices/concept-primary-refresh-token.md) is in use. |
120120
| estsStateTransient | Specific | Applicable to new session information model only. Transient. |
121121
| estsStatePersistent | Specific | Same as estsStateTransient, but persistent. |
122122
| ESTSNCLOGIN | Specific | National Cloud Login related Cookie. |
123123
| UsGovTraffic | Specific | US Gov Cloud Traffic Cookie. |
124124
| ESTSWCTXFLOWTOKEN | Specific | Saves flowToken information when redirecting to ADFS. |
125-
| CcsNtv | Specific | To control when Azure AD Gateway will send requests to [Azure AD Backup Authentication Service](/azure/active-directory/conditional-access/resilience-defaults). Native flows. |
126-
| CcsWeb | Specific | To control when Azure AD Gateway will send requests to [Azure AD Backup Authentication Service](/azure/active-directory/conditional-access/resilience-defaults). Web flows. |
127-
| Ccs* | Specific | Cookies with prefix Ccs*, have the same purpose as the ones without prefix, but only apply when [Azure AD Backup Authentication Service](/azure/active-directory/conditional-access/resilience-defaults) is in use. |
125+
| CcsNtv | Specific | To control when Azure AD Gateway will send requests to [Azure AD Backup Authentication Service](../conditional-access/resilience-defaults.md). Native flows. |
126+
| CcsWeb | Specific | To control when Azure AD Gateway will send requests to [Azure AD Backup Authentication Service](../conditional-access/resilience-defaults.md). Web flows. |
127+
| Ccs* | Specific | Cookies with prefix Ccs*, have the same purpose as the ones without prefix, but only apply when [Azure AD Backup Authentication Service](../conditional-access/resilience-defaults.md) is in use. |
128128
| threxp | Specific | Used for throttling control. |
129129
| rrc | Specific | Cookie used to identify a recent B2B invitation redemption. |
130130
| debug | Specific | Cookie used to track if user's browser session is enabled for DebugMode. |
@@ -147,4 +147,4 @@ To learn more about multi-factor authentication concepts, see [How Azure AD Mult
147147
[tutorial-sspr]: tutorial-enable-sspr.md
148148
[tutorial-azure-mfa]: tutorial-enable-azure-mfa.md
149149
[concept-sspr]: concept-sspr-howitworks.md
150-
[concept-mfa]: concept-mfa-howitworks.md
150+
[concept-mfa]: concept-mfa-howitworks.md

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Customers can right-size permissions based on usage, grant new permissions on-de
5555

5656
### Monitor
5757

58-
Customers can detect anomalous activities with machine language-powered (ML-powered) alerts and generate detailed forensic reports.
58+
Customers can detect anomalous activities with machine learning-powered (ML-powered) alerts and generate detailed forensic reports.
5959

6060
- ML-powered anomaly detections.
6161
- Context-rich forensic reports around identities, actions, and resources to support rapid investigation and remediation.

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,7 @@ Applications must have the Intune SDK with policy assurance implemented and must
144144

145145
The following client apps are confirmed to support this setting, this list isn't exhaustive and is subject to change:
146146

147+
- iAnnotate for Office 365
147148
- Microsoft Cortana
148149
- Microsoft Edge
149150
- Microsoft Excel
@@ -158,9 +159,11 @@ The following client apps are confirmed to support this setting, this list isn't
158159
- Microsoft PowerApps
159160
- Microsoft PowerPoint
160161
- Microsoft SharePoint
162+
- Microsoft Stream Mobile Native 2.0
161163
- Microsoft Teams
162164
- Microsoft To Do
163165
- Microsoft Word
166+
- Microsoft Whiteboard Services
164167
- Microsoft Field Service (Dynamics 365)
165168
- MultiLine for Intune
166169
- Nine Mail - Email and Calendar

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -247,11 +247,11 @@ The error message displayed will be: "Due to a configuration change made by your
247247

248248
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the user risk state is determined to be ‘AtRisk’, an error, “You're unable to add a verified publisher to this application. Contact your administrator for assistance” will be returned. Please investigate the user risk and take the appropriate steps to remediate the risk (guidance below):
249249

250-
> [Investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk#risky-users)
250+
> [Investigate risk](../identity-protection/howto-identity-protection-investigate-risk.md#risky-users)
251251
252-
> [Remediate risk/unblock users](/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock)
252+
> [Remediate risk/unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
253253
254-
> [Self-remediation guidance](/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock)
254+
> [Self-remediation guidance](../identity-protection/howto-identity-protection-remediate-unblock.md)
255255
256256
> Self-serve password reset (SSPR): If the organization allows SSPR, use aka.ms/sspr to reset the password for remediation. Please choose a strong password; Choosing a weak password may not reset the risk state.
257257
@@ -275,4 +275,4 @@ If you've reviewed all of the previous information and are still receiving an er
275275
- TenantId where app is registered
276276
- MPN ID
277277
- REST request being made
278-
- Error code and message being returned
278+
- Error code and message being returned

articles/active-directory/develop/v2-protocols-oidc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ The value of `{tenant}` varies based on the application's sign-in audience as sh
7171
| `8eaef023-2b34-4da1-9baa-8bc8c9d6a490` or `contoso.onmicrosoft.com` | Only users from a specific Azure AD tenant (directory members with a work or school account or directory guests with a personal Microsoft account) can sign in to the application. <br/><br/>The value can be the domain name of the Azure AD tenant or the tenant ID in GUID format. You can also use the consumer tenant GUID, `9188040d-6c67-4c5b-b112-36a304b66dad`, in place of `consumers`. |
7272

7373
> [!TIP]
74-
> Note that when using the `common` or `consumers` authority for personal Microsoft accounts, the consuming resource application must be configured to support such type of accounts in accordance with [signInAudience](/azure/active-directory/develop/supported-accounts-validation).
74+
> Note that when using the `common` or `consumers` authority for personal Microsoft accounts, the consuming resource application must be configured to support such type of accounts in accordance with [signInAudience](./supported-accounts-validation.md).
7575
7676
You can also find your app's OpenID configuration document URI in its app registration in the Azure portal.
7777

@@ -347,4 +347,4 @@ When you redirect the user to the `end_session_endpoint`, the Microsoft identity
347347

348348
* Review the [UserInfo endpoint documentation](userinfo.md).
349349
* [Populate claim values in a token](active-directory-claims-mapping.md) with data from on-premises systems.
350-
* [Include your own claims in tokens](active-directory-optional-claims.md).
350+
* [Include your own claims in tokens](active-directory-optional-claims.md).

articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -274,14 +274,14 @@ az identity federated-credential delete --name $ficId --identity-name $uaId --re
274274
::: zone pivot="identity-wif-mi-methods-powershell"
275275
## Prerequisites
276276

277-
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](/azure/active-directory/managed-identities-azure-resources/overview). Be sure to review the [difference between a system-assigned and user-assigned managed identity](/azure/active-directory/managed-identities-azure-resources/overview#managed-identity-types).
277+
- If you're unfamiliar with managed identities for Azure resources, check out the [overview section](../managed-identities-azure-resources/overview.md). Be sure to review the [difference between a system-assigned and user-assigned managed identity](../managed-identities-azure-resources/overview.md#managed-identity-types).
278278
- If you don't already have an Azure account, [sign up for a free account](https://azure.microsoft.com/free/) before you continue.
279279
- Get the information for your external IdP and software workload, which you need in the following steps.
280-
- To create a user-assigned managed identity and configure a federated identity credential, your account needs the [Managed Identity Contributor](/azure/role-based-access-control/built-in-roles#managed-identity-contributor) role assignment.
280+
- To create a user-assigned managed identity and configure a federated identity credential, your account needs the [Managed Identity Contributor](../../role-based-access-control/built-in-roles.md#managed-identity-contributor) role assignment.
281281
- To run the example scripts, you have two options:
282282
- Use [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open by using the **Try It** button in the upper-right corner of code blocks.
283283
- Run scripts locally with Azure PowerShell, as described in the next section.
284-
- [Create a user-assigned manged identity](/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell#list-user-assigned-managed-identities-2)
284+
- [Create a user-assigned manged identity](../managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-powershell#list-user-assigned-managed-identities-2)
285285
- Find the object ID of the user-assigned managed identity, which you need in the following steps.
286286

287287
### Configure Azure PowerShell locally

0 commit comments

Comments
 (0)