Skip to content

Commit cdbc856

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into v-ssaunders-quickstart-logs-metrics-tracing
2 parents 27dbaa3 + 58f582c commit cdbc856

File tree

515 files changed

+4576
-2325
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

515 files changed

+4576
-2325
lines changed

articles/active-directory-b2c/extensions-app.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
3636
> [!NOTE]
3737
> An application can only be restored if it has been deleted within the last 30 days. If it has been more than 30 days, data will be permanently lost. For more assistance, file a support ticket.
3838
39+
<!--Hide portal steps until SP bug is fixed
3940
### Recover the extensions app using the Azure portal
4041
4142
1. Sign in to your Azure AD B2C tenant.
@@ -44,18 +45,18 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
4445
1. Select **Restore app registration**.
4546
4647
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
47-
48+
-->
4849
### Recover the extensions app using Microsoft Graph
49-
To restore the app using Microsoft Graph, you must restore both the application and the service principal.
50+
To restore the app using Microsoft Graph, you must restore both the application object and the service principal. For more information, see the [Restore deleted item](/graph/api/directory-deleteditems-restore) API.
5051

51-
To restore the application:
52+
To restore the application object:
5253
1. Browse to [https://developer.microsoft.com/en-us/graph/graph-explorer](https://developer.microsoft.com/en-us/graph/graph-explorer).
5354
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
5455
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.application?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
5556
1. Find the application in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
5657
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.]
5758

58-
To restore the service principal:
59+
To restore the service principal object:
5960
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.servicePrincipal`. This operation will list all of the service principals that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
6061
1. Find the service principal in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
6162
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 07/26/2022
4+
ms.date: 08/08/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 56 additions & 63 deletions
Large diffs are not rendered by default.

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ All policies are enforced in two phases:
3636
- Use the session details gathered in phase 1 to identify any requirements that haven't been met.
3737
- If there's a policy that is configured to block access, with the block grant control, enforcement will stop here and the user will be blocked.
3838
- The user will be prompted to complete more grant control requirements that weren't satisfied during phase 1 in the following order, until policy is satisfied:
39-
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multifactor-authentication)
39+
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multi-factor-authentication)
4040
- [Device to be marked as compliant](./concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant)
4141
- [Hybrid Azure AD joined device](./concept-conditional-access-grant.md#require-hybrid-azure-ad-joined-device)
4242
- [Approved client app](./concept-conditional-access-grant.md#require-approved-client-app)

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The public preview supports the following scenarios:
8181

8282
- Require user reauthentication during [Intune device enrollment](/mem/intune/fundamentals/deployment-guide-enrollment), regardless of their current MFA status.
8383
- Require user reauthentication for risky users with the [require password change](concept-conditional-access-grant.md#require-password-change) grant control.
84-
- Require user reauthentication for risky sign-ins with the [require multifactor authentication](concept-conditional-access-grant.md#require-multifactor-authentication) grant control.
84+
- Require user reauthentication for risky sign-ins with the [require multifactor authentication](concept-conditional-access-grant.md#require-multi-factor-authentication) grant control.
8585

8686
When administrators select **Every time**, it will require full reauthentication when the session is evaluated.
8787

articles/active-directory/devices/concept-azure-ad-join-hybrid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Hybrid Azure AD joined devices require network line of sight to your on-premises
2727
| **Primary audience** | Suitable for hybrid organizations with existing on-premises AD infrastructure |
2828
| | Applicable to all users in an organization |
2929
| **Device ownership** | Organization |
30-
| **Operating Systems** | Windows 11, Windows 10 or 8.1 |
30+
| **Operating Systems** | Windows 11, Windows 10 or 8.1 except Home editions |
3131
| | Windows Server 2008/R2, 2012/R2, 2016, 2019 and 2022 |
3232
| **Provisioning** | Windows 11, Windows 10, Windows Server 2016/2019/2022 |
3333
| | Domain join by IT and autojoin via Azure AD Connect or ADFS config |

articles/active-directory/fundamentals/active-directory-data-storage-japan.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: fundamentals
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 04/12/2022
13+
ms.date: 08/08/2022
1414
ms.custom: "it-pro, seodec18, references_regions"
1515
ms.collection: M365-identity-device-management
1616
---
@@ -21,9 +21,7 @@ Azure Active Directory (Azure AD) stores its Customer Data in a geographical loc
2121

2222
For information about where Azure AD and other Microsoft services' data is located, see the [Where your data is located](https://www.microsoft.com/trust-center/privacy/data-location) section of the Microsoft Trust Center.
2323

24-
From April 15, 2022, Microsoft began storing Azure AD’s Customer Data for new tenants with a Japan billing address within the Japanese datacenters. From April 15, 2022 to June 30, 2022 a backup copy of the Azure AD’s Customer Data for these new tenants will be stored in Asia to ensure a smooth transition to the Japanese datacenters. This copy will be destroyed on June 30, 2022.
25-
26-
Additionally, certain Azure AD features do not yet support storage of Customer Data in Japan. Please go to the [Azure AD data map](https://msit.powerbi.com/view?r=eyJrIjoiYzEyZTc5OTgtNTdlZS00ZTVkLWExN2ItOTM0OWU4NjljOGVjIiwidCI6IjcyZjk4OGJmLTg2ZjEtNDFhZi05MWFiLTJkN2NkMDExZGI0NyIsImMiOjV9), for specific feature information. For example, Microsoft Azure AD Multi-Factor Authentication stores Customer Data in the US and processes it globally. See [Data residency and customer data for Azure AD Multi-Factor Authentication](../authentication/concept-mfa-data-residency.md).
24+
Additionally, certain Azure AD features do not yet support storage of Customer Data in Japan. Please go to the [Azure AD data map](https://aka.ms/aaddatamap), for specific feature information. For example, Microsoft Azure AD Multi-Factor Authentication stores Customer Data in the US and processes it globally. See [Data residency and customer data for Azure AD Multi-Factor Authentication](../authentication/concept-mfa-data-residency.md).
2725

2826
> [!NOTE]
2927
> Microsoft products, services, and third-party applications that integrate with Azure AD have access to Customer Data. Evaluate each product, service, and application you use to determine how Customer Data is processed by that specific product, service, and application, and whether they meet your company's data storage requirements. For more information about Microsoft services' data residency, see the [Where your data is located](https://www.microsoft.com/trust-center/privacy/data-location) section of the Microsoft Trust Center.

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Tutorial - Manage access to resources in Azure AD entitlement management
33
description: Step-by-step tutorial for how to create your first access package using the Azure portal in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: owinfreyatl
6+
author: owinfreyATL
77
manager: karenhoran
88
editor: markwahl-msft
99
ms.service: active-directory

0 commit comments

Comments
 (0)