Skip to content

Commit ccec18e

Browse files
authored
Merge branch 'release-umc-rebranding' into release-umc-rebranding
2 parents 81fbb8a + 952fca1 commit ccec18e

File tree

1,718 files changed

+13280
-8954
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,718 files changed

+13280
-8954
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 153 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1715,6 +1715,21 @@
17151715
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-daemon-node-call-api-prepare-tenant",
17161716
"redirect_document_id": false
17171717
},
1718+
{
1719+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-tenant.md",
1720+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-tenant",
1721+
"redirect_document_id": false
1722+
},
1723+
{
1724+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-prepare-app.md",
1725+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-prepare-app",
1726+
"redirect_document_id": false
1727+
},
1728+
{
1729+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-web-app-dotnet-sign-in-sign-out.md",
1730+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-web-app-dotnet-sign-in-sign-out",
1731+
"redirect_document_id": false
1732+
},
17181733
{
17191734
"source_path_from_root": "/articles/active-directory/external-identities/conditional-access.md",
17201735
"redirect_url": "/azure/active-directory/external-identities/authentication-conditional-access",
@@ -5250,6 +5265,61 @@
52505265
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
52515266
"redirect_document_id": true
52525267
},
5268+
{
5269+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-use-azure-monitor-workbooks.md",
5270+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-use-workbooks",
5271+
"redirect_document_id": true
5272+
},
5273+
{
5274+
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md",
5275+
"redirect_url": "/azure/active-directory/reports-monitoring/concept-log-monitoring-integration-options-considerations",
5276+
"redirect_document_id": true
5277+
},
5278+
{
5279+
"source_path_from_root": "/articles/active-directory/reports-monitoring/tutorial-log-analytics-wizard.md",
5280+
"redirect_url": "/azure/active-directory/reports-monitoring/tutorial-configure-log-analytics-workspace",
5281+
"redirect_document_id": true
5282+
},
5283+
{
5284+
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-azure-monitor-route-logs-to-storage-account.md",
5285+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-archive-logs-to-storage-account",
5286+
"redirect_document_id": true
5287+
},
5288+
{
5289+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-monitoring.md",
5290+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5291+
"redirect_document_id": false
5292+
},
5293+
{
5294+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-reports.md",
5295+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring-health",
5296+
"redirect_document_id": true
5297+
},
5298+
{
5299+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-sumologic.md",
5300+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5301+
"redirect_document_id": true
5302+
},
5303+
{
5304+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-splunk.md",
5305+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5306+
"redirect_document_id": false
5307+
},
5308+
{
5309+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-arcsight.md",
5310+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-stream-logs-to-event-hub",
5311+
"redirect_document_id": false
5312+
},
5313+
{
5314+
"source_path_from_root": "/articles/active-directory/reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md",
5315+
"redirect_url": "/azure/active-directory/reports-monitoring/howto-integrate-activity-logs-with-azure-monitor-logs",
5316+
"redirect_document_id": true
5317+
},
5318+
{
5319+
"source_path_from_root": "/articles/active-directory/reports-monitoring/overview-service-health-notifications.md",
5320+
"redirect_url": "/azure/service-health/service-health-portal-update",
5321+
"redirect_document_id": true
5322+
},
52535323
{
52545324
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-configure-named-locations.md",
52555325
"redirect_url": "/azure/active-directory/conditional-access/location-condition",
@@ -13479,10 +13549,93 @@
1347913549
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/services-id-authentication-support",
1348013550
"redirect_document_id": false
1348113551
},
13552+
{
13553+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-accesscontrol-requirements.md",
13554+
"redirect_url": "/azure/active-directory/hybrid/index",
13555+
"redirect_document_id": false
13556+
},
13557+
{
13558+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-business-needs.md",
13559+
"redirect_url": "/azure/active-directory/hybrid/index",
13560+
"redirect_document_id": false
13561+
},
13562+
{
13563+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-contentmgt-requirements.md",
13564+
"redirect_url": "/azure/active-directory/hybrid/index",
13565+
"redirect_document_id": false
13566+
},
13567+
{
13568+
"source_path_from_root": "/articles/active-directory/hybrid/connect/aplan-hybrid-identity-design-considerations-data-protection-strategy.md",
13569+
"redirect_url": "/azure/active-directory/hybrid/index",
13570+
"redirect_document_id": false
13571+
},
13572+
{
13573+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-dataprotection-requirements.md",
13574+
"redirect_url": "/azure/active-directory/hybrid/index",
13575+
"redirect_document_id": false
13576+
},
13577+
{
13578+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-hybrid-id-management-tasks.md",
13579+
"redirect_url": "/azure/active-directory/hybrid/index",
13580+
"redirect_document_id": false
13581+
},
13582+
{
13583+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-identity-adoption-strategy.md",
13584+
"redirect_url": "/azure/active-directory/hybrid/index",
13585+
"redirect_document_id": false
13586+
},
13587+
{
13588+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-lifecycle-adoption-strategy.md",
13589+
"redirect_url": "/azure/active-directory/hybrid/index",
13590+
"redirect_document_id": false
13591+
},
13592+
{
13593+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-data-protection-strategy.md",
13594+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13595+
"redirect_document_id": false
13596+
},
13597+
{
13598+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-directory-sync-requirements.md",
13599+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13600+
"redirect_document_id": false
13601+
},
13602+
{
13603+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-multifactor-auth-requirements.md",
13604+
"redirect_url": "/azure/active-directory/hybrid/index",
13605+
"redirect_document_id": false
13606+
},
13607+
{
13608+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-incident-response-requirements.md",
13609+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13610+
"redirect_document_id": false
13611+
},
13612+
13613+
{
13614+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-nextsteps.md",
13615+
"redirect_url": "/azure/active-directory/hybrid/index",
13616+
"redirect_document_id": false
13617+
},
13618+
{
13619+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-overview.md",
13620+
"redirect_url": "/azure/active-directory/hybrid/index",
13621+
"redirect_document_id": false
13622+
},
13623+
{
13624+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-tools-comparison.md",
13625+
"redirect_url": "/azure/active-directory/hybrid/index",
13626+
"redirect_document_id": false
13627+
},
13628+
13629+
1348213630
{
1348313631
"source_path_from_root": "/articles/active-directory/fundamentals/add-users-azure-active-directory.md",
1348413632
"redirect_url": "/azure/active-directory/fundamentals/add-users",
1348513633
"redirect_document_id": false
13634+
},
13635+
{
13636+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/subscription-requirements.md",
13637+
"redirect_url": "/azure/active-directory/governance/licensing-fundamentals",
13638+
"redirect_document_id": false
1348613639
}
1348713640

1348813641
]

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,11 @@
1414
"source_path_from_root": "/articles/aks/web-app-routing.md",
1515
"redirect_url": "/azure/aks/app-routing",
1616
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/aks/aks-planned-maintenance-weekly-releases.md",
20+
"redirect_url": "/azure/aks/planned-maintenance",
21+
"redirect_document_id": false
1722
}
1823
]
1924
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24137,6 +24137,11 @@
2413724137
"source_path_from_root": "/articles/flexible-server/concepts-high-availability.md",
2413824138
"redirect_url": "/azure/reliability/reliability-postgre-flexible",
2413924139
"redirect_document_id": false
24140+
},
24141+
{
24142+
"source_path": "articles/azure-cache-for-redis/cache-how-to-functions.md",
24143+
"redirect_url": "/azure/azure-functions/functions-bindings-cache",
24144+
"redirect_document_id": false
2414024145
}
2414124146

2414224147

CODEOWNERS

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,6 @@
44
# Background: https://github.blog/2017-07-06-introducing-code-owners/
55
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
66

7-
# Azure Policy: Samples and Compliance Controls
8-
/articles/**/policy-reference.md @timwarner-msft
9-
/articles/**/security-controls-policy.md @timwarner-msft
10-
/includes/policy/ @timwarner-msft
11-
127
# Azure Monitor
138
articles/azure-monitor/* @bwren
149
articles/azure-monitor/agents @guywi-ms @bwren
@@ -56,9 +51,6 @@ articles/service-health @rboucher
5651
/articles/container-instances/ @macolso @mimckitt
5752
/articles/container-registry/ @dlepow @mimckitt
5853

59-
# Governance
60-
/articles/governance/ @timwarner-msft
61-
6254
# Security
6355
/articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear
6456

articles/active-directory-b2c/enable-authentication-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ To specify your Azure AD B2C user flows, do the following:
215215

216216
1. Replace `B2C_1_SUSI` with your sign-in Azure AD B2C Policy name.
217217
1. Replace `B2C_1_EditProfile` with your edit profile Azure AD B2C policy name.
218-
1. Replace all instances of `contoso` with your [Azure AD B2C tenant name](./ tenant-management-read-tenant-name.md#get-your-tenant-name).
218+
1. Replace all instances of `contoso` with your [Azure AD B2C tenant name](./tenant-management-read-tenant-name.md#get-your-tenant-name).
219219

220220
## Step 7: Use the MSAL to sign in the user
221221

articles/active-directory/app-provisioning/application-provisioning-config-problem-no-users-provisioned.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,4 +63,4 @@ For the next 3 months, the behavior will continue as it is today. Users with the
6363
For questions about these changes, please reach out to [email protected]
6464
## Next steps
6565

66-
[Azure AD Connect sync: Understanding Declarative Provisioning](../hybrid/concept-azure-ad-connect-sync-declarative-provisioning.md)
66+
[Azure AD Connect sync: Understanding Declarative Provisioning](../hybrid/connect/concept-azure-ad-connect-sync-declarative-provisioning.md)

articles/active-directory/app-provisioning/application-provisioning-log-analytics.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ AADProvisioningLogs
9191

9292
Azure Monitor lets you configure custom alerts so that you can get notified about key events related to Provisioning. For example, you might want to receive an alert on spikes in failures. Or perhaps spikes in disables or deletes. Another example of where you might want to be alerted is a lack of any provisioning, which indicates something is wrong.
9393

94-
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-log.md).
94+
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-create-new-alert-rule.md).
9595

9696
Alert when there's a spike in failures. Replace the jobID with the jobID for your application.
9797

@@ -115,5 +115,5 @@ We're taking an open source and community-based approach to application provisio
115115
- [Log analytics](../reports-monitoring/howto-analyze-activity-logs-log-analytics.md)
116116
- [Get started with queries in Azure Monitor logs](../../azure-monitor/logs/get-started-queries.md)
117117
- [Create and manage alert groups in the Azure portal](../../azure-monitor/alerts/action-groups.md)
118-
- [Install and use the log analytics views for Azure Active Directory](../reports-monitoring/howto-install-use-log-analytics-views.md)
118+
- [Install and use the log analytics views for Azure Active Directory](../../azure-monitor/visualize/workbooks-view-designer-conversion-overview.md)
119119
- [Provisioning logs API](/graph/api/resources/provisioningobjectsummary?preserve-view=true&view=graph-rest-beta)

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -348,7 +348,7 @@ Selecting this option forces a resynchronization of all users while the provisio
348348
- The attribute `IsSoftDeleted` is often part of the default mappings for an application. `IsSoftdeleted` can be true in one of four scenarios: 1) The user is out of scope due to being unassigned from the application. 2) The user is out of scope due to not meeting a scoping filter. 3) The user has been soft deleted in Azure AD. 4) The property `AccountEnabled` is set to false on the user. It's not recommended to remove the `IsSoftDeleted` attribute from your attribute mappings.
349349
- The Azure AD provisioning service doesn't support provisioning null values.
350350
- They primary key, typically "ID", shouldn't be included as a target attribute in your attribute mappings.
351-
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#Provisioning a role to a SCIM app).
351+
- The role attribute typically needs to be mapped using an expression, rather than a direct mapping. For more information about role mapping, see [Provisioning a role to a SCIM app](#provisioning-a-role-to-a-scim-app).
352352
- While you can disable groups from your mappings, disabling users isn't supported.
353353

354354
## Next steps

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -201,7 +201,7 @@ Confirm the mapping for *active* for your application. If you're using an applic
201201
**Configure your application to delete a user**
202202

203203
The scenario triggers a disable or a delete:
204-
* A user is soft-deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false). Thirty days after a user is deleted in Azure AD, they're permanently deleted from the tenant. At this point, the provisioning service sends a DELETE request to permanently delete the user in the application. At any time during the 30-day window, you can [manually delete a user permanently](../fundamentals/active-directory-users-restore.md), which sends a delete request to the application.
204+
* A user is soft-deleted in Azure AD (sent to the recycle bin / AccountEnabled property set to false). Thirty days after a user is deleted in Azure AD, they're permanently deleted from the tenant. At this point, the provisioning service sends a DELETE request to permanently delete the user in the application. At any time during the 30-day window, you can [manually delete a user permanently](../fundamentals/users-restore.md), which sends a delete request to the application.
205205
* A user is permanently deleted / removed from the recycle bin in Azure AD.
206206
* A user is unassigned from an app.
207207
* A user goes from in scope to out of scope (doesn't pass a scoping filter anymore).

0 commit comments

Comments
 (0)