Skip to content

Commit d1743b3

Browse files
authored
Merge pull request #253471 from MicrosoftDocs/main
10/02 AM Publishing
2 parents 1a7b8ee + 0992d0a commit d1743b3

File tree

96 files changed

+649
-261
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

96 files changed

+649
-261
lines changed

articles/active-directory-b2c/custom-policies-series-sign-up-or-sign-in.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 01/30/2023
13+
ms.date: 10/03/2023
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -301,7 +301,7 @@ When the custom policy runs:
301301
- **Orchestration Step 3** - This step runs if the user signs up (`objectId` doesn't exist), and that a user doesn't select a company `accountType`. So we've to ask the user to input an `accessCode` by invoking the *AccessCodeInputCollector* self-asserted technical profile.
302302

303303
- **Orchestration Step 4** - This step runs if the user signs up (objectId doesn't exist), so we display the sign-up form by invoking the
304-
*UserInformationCollector* self-asserted technical profile. This step runs whether a user signs up or signs in.
304+
*UserInformationCollector* self-asserted technical profile.
305305

306306
- **Orchestration Step 5** - This step reads account information from Microsoft Entra ID (we invoke `AAD-UserRead` Microsoft Entra technical profile), so it runs whether a user signs up or signs in.
307307

@@ -327,4 +327,4 @@ You can sign in by entering the **Email Address** and **Password** of an existin
327327

328328
- Learn how to [Remove the sign-up link](add-sign-in-policy.md), so users can just sign in.
329329

330-
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).
330+
- Learn more about [OpenID Connect technical profile](openid-connect-technical-profile.md).

articles/active-directory/app-proxy/application-proxy-faq.yml

Lines changed: 31 additions & 29 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 09/27/2023
9+
ms.date: 10/02/2023
1010

1111

1212
ms.author: justinha
@@ -16,6 +16,7 @@ ms.reviewer: vimrang
1616

1717
ms.collection: M365-identity-device-management
1818
ms.custom: has-adal-ref
19+
ms.localizationpriority: high
1920
---
2021

2122
# Microsoft Entra certificate-based authentication technical deep dive

articles/active-directory/develop/quickstart-single-page-app-javascript-sign-in.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ To obtain the sample application, you can either clone it from GitHub or downloa
5959

6060
## Configure the project
6161

62-
1. In your IDE, open the project folder, *ms-identity-javascript-tutorial/angular-spa*, containing the sample.
62+
1. In your IDE, open the project folder, *ms-identity-javascript-tutorial*, containing the sample.
6363
1. Open *1-Authentication/1-sign-in/App/authConfig.js* and replace the file contents with the following snippet:
6464

6565
:::code language="csharp" source="~/ms-identity-docs-code-javascript/js-spa/App/authConfig.js":::
@@ -95,4 +95,4 @@ Run the project with a web server by using Node.js:
9595

9696
- [Quickstart: Protect an ASP.NET Core web API with the Microsoft identity platform](./quickstart-web-api-aspnet-core-protect-api.md).
9797

98-
- Learn more by building this JavaScript SPA from scratch with the following series - [Tutorial: Sign in users and call Microsoft Graph](./tutorial-v2-javascript-spa.md)
98+
- Learn more by building this JavaScript SPA from scratch with the following series - [Tutorial: Sign in users and call Microsoft Graph](./tutorial-v2-javascript-spa.md)

articles/active-directory/fundamentals/data-storage-eu.md

Lines changed: 35 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -11,79 +11,72 @@ ms.subservice: fundamentals
1111
ms.workload: identity
1212
ms.topic: conceptual
1313
ms.date: 08/17/2023
14-
ms.custom: "it-pro, seodec18"
14+
ms.custom: 'it-pro, seodec18, references-regions'
1515
ms.collection: M365-identity-device-management
1616
---
1717

1818
# Customer data storage and processing for European customers in Microsoft Entra ID
1919

20-
Microsoft Entra ID stores customer data in a geographic location based on how a tenant was created and provisioned. The following list provides information about how the location is defined:
20+
Microsoft Entra stores customer data in a geographic location based on how a tenant was created and provisioned. The following list provides information about how the location is defined:
2121

22-
* **Azure portal or Microsoft Entra API** - A customer selects a location from the pre-defined list.
22+
* **Microsoft Entra admin center or Microsoft Entra API** - A customer selects a location from the pre-defined list.
2323
* **Dynamics 365 and Power Platform** - A customer provisions their tenant in a pre-defined location.
24-
* **EU Data Residency** - For customers who provided a location in Europe, Microsoft Entra ID stores most of the customer data in Europe, except where noted later in this article.
25-
* **EU Data Boundary** - For customers who provided a location that is within the EU Data Boundary (members of the EU and EFTA), Microsoft Entra ID stores and processes most of the customer data in the EU Data Boundary, except where noted later in this article.
24+
* **EU Data Residency** - For customers who provided a location in Europe, Microsoft Entra stores most of the customer data in Europe, except where noted later in this article.
25+
* **EU Data Boundary** - For customers who provided a location that is within the [EU Data Boundary](/privacy/eudb/eu-data-boundary-learn#eu-data-boundary-countries-and-datacenter-locations) (members of the EU and EFTA), Microsoft Entra stores and processes most of the customer data in the EU Data Boundary, except where noted later in this article.
2626
* **Microsoft 365** - The location is based on a customer provided billing address.
2727

2828
The following sections provide information about customer data that doesn't meet the EU Data Residency or EU Data Boundary commitments.
2929

30-
## Services permanently excluded from the EU Data Residency and EU Data Boundary
30+
## Services that will temporarily transfer a subset of customer data out of the EU Data Residency and EU Data Boundary
3131

32-
* **Reason for customer data egress** - Some forms of communication, such as phone calls or text messaging platforms like SMS, RCS, or WhatsApp, rely on a network that is operated by global providers. Device vendor-specific services, such as push notifications from Apple or Google, may be outside of Europe.
33-
* **Types of customer data being egressed** - User account data (phone number).
34-
* **Customer data location at rest** - In EU Data Boundary.
35-
* **Customer data processing** - Some processing may occur globally.
36-
* **Services** - multifactor Authentication
32+
For some components of a service, work is in progress to be included in the EU Data Residency and EU Data Boundary, but completion of this work is delayed. The following sections in this article explain the customer data that these services currently transfer out of Europe as part of their service operations.
3733

38-
## Services temporarily excluded from the EU Data Residency and EU Data Boundary
34+
**EU Data Residency:**
3935

40-
Some services have work in progress to be EU Data Residency and EU Data Boundary compliant, but this work is delayed beyond January 1, 2023. The following details explain the customer data that these features currently transfer out of the EU as part of their service operations:
36+
- **Reason for customer data egress** - A few of the tenants are stored outside of the EU location due one of the following reasons:
4137

42-
* **Reason for customer data egress** - To provide reliable and scalable service, Microsoft performs regular analytics that involve transfers of data outside the EU location.
43-
* **Types of customer data being egressed** - User and device account data, usage data, and service configuration (application, policy, and group).
44-
* **Customer data location at rest** - US
45-
* **Customer data processing** - US
46-
* **Services** - Microsoft Entra Connect, Microsoft Entra Connect Health, Device Registration, Directory Core Store, Dynamic Groups Service, Self-Service Group Management
47-
48-
Some services incorrectly stored data out of the EU Data Boundary. The following details explain the customer data that these features currently transfer out of the EU as part of their service operations:
49-
50-
* **Reason for customer data egress** - A small number of tenants created in the EU location prior to March 2019 were incorrectly stored out of the EU Data Boundary due to an issue that is now fixed. Microsoft is in the process of migrating tenants to the correct location.
51-
* **Types of customer data being egressed** - User and device account data, and service configuration (application, policy, and group).
52-
* **Customer data location at rest** - US and Asia/Pacific.
38+
- The tenants were initially created with a country code that is NOT in Europe and later the tenant country code was changed to the one in Europe. The Microsoft Entra directory data location is decided during the tenant creation time and not changed when the country code for the tenant is updated. Starting March 2019 Microsoft has blocked updating the country code on a tenant to avoid such confusion.
39+
- There are 13 country codes (Countries include: Azerbaijan, Bahrain, Israel, Jordan, Kazakhstan, Kuwait, Lebanon, Oman, Pakistan, Qatar, Saudi Arabia, Turkey, UAE) that were mapped to Asia region until 2013 and later mapped to Europe. Tenants that were created before July 2013 from this country code are provisioned in Asia instead of Europe.
40+
- There are seven country codes (Countries include: Armenia, Georgia, Iraq, Kyrgyzstan, Tajikistan, Turkmenistan, Uzbekistan) that were mapped to Asia region until 2017 and later mapped to Europe. Tenants that were created before February 2017 from this country code are provisioned in Asia instead of Europe.
41+
* **Types of customer data being egressed** - User and device account data, and service configuration (application, policy, and group).
42+
* **Customer data location at rest** - US and Asia/Pacific.
5343
* **Customer data processing** - The same as the location at rest.
5444
* **Services** - Directory Core Store
5545

56-
## Services temporarily excluded from the EU Data Boundary
46+
**EU Data Boundary:**
47+
48+
See more information on Microsoft Entra temporary partial customer data transfers from the EU Data Boundary [Services that temporarily transfer a subset of customer data out of the EU Data Boundary](/privacy/eudb/eu-data-boundary-temporary-partial-transfers.md#security-services).
49+
50+
## Services that will permanently transfer a subset of customer data out of the EU Data Residency and EU Data Boundary
5751

58-
Some services have work in progress to be EU Data Boundary compliant. This work is delayed beyond January 1, 2023. The following details explain the customer data that these features currently transfer out of the EU Data Boundary as part of their service operations:
52+
Some components of a service will continue to transfer a limited amount of customer data out of the EU Data Residency and EU Data Boundary because this transfer is by design to facilitate the function of the services.
5953

60-
* **Reason for customer data egress** - These features haven't completed changes to fully process user or admin transactions, such as sign-in or object and application configuration actions within the EU Data Boundary.
61-
* **Types of customer data being egressed** - User and device account data, usage data, and service configuration (application, policy, group, and terms of use).
62-
* **Customer data location at rest** - In the EU Data Boundary.
63-
* **Customer data processing** - Some processing may occur globally.
64-
* **Services** - Microsoft Entra Connect, Microsoft Entra Connect Health, Enterprise Application Management, Dynamic Groups Service, MyAccount, MyApps, MySign-Ins, Reporting and Audit Insights, Self-Service Credentials Management, Self-Service Group Management, Sign-In, Terms of Use
54+
**EU Data Residency:**
6555

66-
Some services have email specific data that will become compliant in the coming months. The following details explain the customer data that these features currently transfer out of the EU Data Boundary as part of their service operations:
56+
[Microsoft Entra ID](/azure/active-directory/fundamentals/whatis): When an IP Address or phone number is determined to be used in fraudulent activities, they are published globally to block access from any workloads using them.
6757

68-
* **Reason for customer data egress** - To provide email notifications, some data is processed outside of the EU location.
69-
* **Types of customer data being egressed** - User account data (email address).
70-
* **Customer data location at rest** - In EU Data Boundary.
71-
* **Customer data processing**- Some processing may occur globally.
72-
* **Services** - Azure Active Directory Sync Fabric, Azure Certificate Service, Enterprise App Management, Identity Governance, Azure Customer Lockbox
58+
**EU Data Boundary:**
59+
60+
See more information on Microsoft Entra permanent partial customer data transfers from the EU Data Boundary [Services that will permanently transfer a subset of customer data out of the EU Data Boundary](/privacy/eudb/eu-data-boundary-permanent-partial-transfers.md#security-services).
7361

7462
## Other considerations
7563

7664
### Optional service capabilities that transfer data out of the EU Data Residency and EU Data Boundary
7765

78-
Administrators can choose to enable or disable certain Microsoft Entra features. If the following features are enabled and used by the customer, they will result in data transfers out of the EU Data Residency and EU Data Boundary as described:
66+
**EU Data Residency:**
67+
68+
Some services include capabilities that are optional (in some cases requiring a customer subscription), and where customer administrators can choose to enable or disable these capabilities for their service tenancies. If made available and used by a customer's users, these capabilities will result in data transfers out of Europe as described in the following sections in this article.
69+
70+
- [Mulitenant administration](/azure/active-directory/multi-tenant-organizations/overview): An organization may choose to create a multitenant organization within Microsoft Entra ID. For example, a customer can invite users to their tenant in a B2B context. A customer can create a multitenant SaaS application that allows other third-party tenants to provision the application in the third-party tenant. A customer can make two or more tenants affiliated with one another and act as a single tenant in certain scenarios, such as multitenant organization (MTO) formation, tenant to tenant sync, and shared e-mail domain sharing. Administrator configuration and use of multitenant collaboration may occur with tenants outside of the EU Data Residency and EU Data Boundary resulting in some customer data, such as user and device account data, usage data, and service configuration (application, policy, and group) being stored and processed in the location of the collaborating tenant.
71+
- [Application Proxy](/azure/active-directory/app-proxy/application-proxy): Application proxy allows customers to access both cloud and on-premises applications through an external URL or an internal application portal. Customers may choose advanced routing configurations that would cause Customer Data to egress outside of the EU Data Residency and EU Data Boundary, including user account data, usage data, and application configuration data.
72+
73+
**EU Data Boundary:**
7974

80-
* **Microsoft Entra Multi Tenant Collaboration** - With multi tenant collaboration scenarios enabled, customers can configure their tenant to collaborate with users from a different tenant. For example, a customer can invite users to their tenant in a B2B context. A customer can create a multi-tenant SaaS application that allows other third party tenants to provision the application in the third party tenant. Or, the customer can make two or more tenants affiliated with one another and act as a single tenant in certain scenarios, such as multi-tenant organization (MTO) formation, tenant to tenant sync, and shared e-mail domain sharing. Customer configuration and use of multi tenant collaboration may occur with tenants outside of the EU Data Residency and EU Data Boundary resulting in some customer data, such as user and device account data, usage data, and service configuration (application, policy, and group) stored and processed in the location of the collaborating tenant.
81-
* **Application Proxy** - Allows customers to access their on-premises web applications externally. Customers may choose advanced routing configurations that allow customer data to egress outside of the EU Data Residency and EU Data Boundary, including user account data, usage data, and application configuration data.
82-
* **Microsoft 365 Multi Geo** - Microsoft 365 Multi-Geo provides customers with the ability to expand their Microsoft 365 presence to multiple geographic countries/regions within a single existing Microsoft 365 tenant. Microsoft Entra ID will egress customer data to perform backup authentication to the locations configured by the customer. Types of customer data include user and device account data, branding data, and service configuration data (application, policy, and group).
75+
See more information on optional service capabilities that transfer customer data out of the EU Data Boundary [Optional service capabilities that transfer customer data out of the EU Data Boundary](/privacy/eudb/eu-data-boundary-transfers-for-optional-capabilities.md#microsoft-entra-id).
8376

8477
### Other EU Data Boundary online services
8578

86-
Services and applications that integrate with Microsoft Entra ID have access to customer data. Review how each service and application stores and processes customer data, and verify that they meet your company's data handling requirements.
79+
Services and applications that integrate with Microsoft Entra have access to customer data. Review how each service and application stores and processes customer data, and verify that they meet your company's data handling requirements.
8780

8881
## Next steps
8982

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
---
2+
title: Microsoft Entra preview program terms
3+
description: In this article we go over the terms in effect when participating in Microsoft Entra preview programs.
4+
ms.service: active-directory
5+
author: barclayn
6+
manager: amycolannino
7+
ms.author: barclayn
8+
ms.topic: conceptual
9+
ms.date: 09/19/2023
10+
# Customer intent: I am trying to find information on the terms and conditions for Microsoft Entra preview programs.
11+
12+
---
13+
14+
15+
16+
# Microsoft Entra preview program terms
17+
18+
19+
[!INCLUDE [Entra preview terms](../includes/licensing-preview-terms.md)]

articles/active-directory/fundamentals/toc.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ items:
3434
href: how-to-create-delete-users.md
3535
- name: Apply licenses to users
3636
href: license-users-groups.md
37-
- name: Manage users
37+
- name: Users
3838
expanded: false
3939
items:
4040
- name: Assign roles to users
@@ -49,7 +49,7 @@ items:
4949
href: users-restore.md
5050
- name: Set default user permissions
5151
href: users-default-permissions.md
52-
- name: Manage groups
52+
- name: Groups
5353
expanded: false
5454
items:
5555
- name: Learn about groups
@@ -58,11 +58,13 @@ items:
5858
href: ./groups-view-azure-portal.md
5959
- name: Manage groups
6060
href: how-to-manage-groups.md
61-
- name: Manage licenses
61+
- name: Licenses
6262
expanded: false
6363
items:
6464
- name: Group-based licensing
6565
href: licensing-whatis-azure-portal.md
66+
- name: Entra preview program terms
67+
href: licensing-preview-terms.md
6668
- name: Sign up for Microsoft Entra ID P1 or P2
6769
href: get-started-premium.md
6870
- name: Quick security wins

articles/active-directory/governance/apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -283,7 +283,7 @@ Microsoft Entra ID Governance can be integrated with many other applications, us
283283
| [Robin](../../active-directory/saas-apps/robin-provisioning-tutorial.md) |||
284284
| [Rollbar](../../active-directory/saas-apps/rollbar-provisioning-tutorial.md) |||
285285
| [Rouse Sales](../../active-directory/saas-apps/rouse-sales-provisioning-tutorial.md) || |
286-
| [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md) || |
286+
| [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md) || |
287287
| [SafeGuard Cyber](../../active-directory/saas-apps/safeguard-cyber-provisioning-tutorial.md) |||
288288
| [Salesforce Sandbox](../../active-directory/saas-apps/salesforce-sandbox-provisioning-tutorial.md) |||
289289
| [Samanage](../../active-directory/saas-apps/samanage-provisioning-tutorial.md) |||

articles/active-directory/hybrid/connect/reference-connect-sync-functions-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -710,7 +710,7 @@ Returns the position where the substring was found or 0 if not found.
710710

711711
**Example:**
712712
`InStr("The quick brown fox","quick")`
713-
Evalues to 5
713+
Evaluates to 5
714714

715715
`InStr("repEated","e",3,vbBinaryCompare)`
716716
Evaluates to 7

0 commit comments

Comments
 (0)