Skip to content

Commit d57d2be

Browse files
authored
Merge pull request #112237 from MicrosoftDocs/master
4/21 PM Publish
2 parents 31e9f36 + cf927a7 commit d57d2be

File tree

170 files changed

+2243
-1164
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

170 files changed

+2243
-1164
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
"redirect_url": "/previous-versions/azure/virtual-network/virtual-networks-create-vnet-classic-cli",
2121
"redirect_document_id": false
2222
},
23-
23+
2424
{
2525
"source_path": "articles/virtual-network/virtual-networks-specifying-a-dns-settings-in-a-virtual-network-configuration-file.md",
2626
"redirect_url": "/previous-versions/azure/virtual-network/virtual-networks-specifying-a-dns-settings-in-a-virtual-network-configuration-file",
@@ -727,6 +727,13 @@
727727
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
728728
"redirect_document_id": false
729729
},
730+
731+
{
732+
"source_path": "articles/cognitive-services/LUIS/luis-migration-api-authoring.md",
733+
"redirect_url": "/azure/cognitive-services/LUIS/luis-migration-authoring-entities",
734+
"redirect_document_id": false
735+
},
736+
730737
{
731738
"source_path": "articles/cognitive-services/LUIS/luis-resources-faq.md",
732739
"redirect_url": "/azure/cognitive-services/LUIS/troubleshooting",
@@ -5291,7 +5298,7 @@
52915298
"source_path": "articles/event-grid/event-sources.md",
52925299
"redirect_url": "/azure/event-grid/overview#event-sources",
52935300
"redirect_document_id": false
5294-
},
5301+
},
52955302
{
52965303
"source_path": "articles/event-grid/event-subscription-template.md",
52975304
"redirect_url": "/azure/event-grid/template-samples",

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,8 @@ To complete this article, you need the following resources and privileges:
3838
* You need *global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
3939
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
4040
* [Azure AD Premium P1 or P2][azuread-licensing]
41-
* [Microsoft 365 F1 or F3][m365-firstline-workers-licensing]
41+
* [Microsoft 365 (M365) F1 or F3][m365-firstline-workers-licensing]
42+
* [Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
4243

4344
## Limitations
4445

@@ -159,3 +160,5 @@ For additional ways to sign in to Azure AD without a password, such as the Micro
159160
[office]: https://www.office.com
160161
[m365-firstline-workers-licensing]: https://www.microsoft.com/licensing/news/m365-firstline-workers
161162
[azuread-licensing]: https://azure.microsoft.com/pricing/details/active-directory/
163+
[ems-licensing]: https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing
164+
[m365-licensing]: https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.assetid: ef2797d7-d440-4a9a-a648-db32ad137494
88
ms.service: active-directory
99
ms.topic: reference
1010
ms.workload: identity
11-
ms.date: 04/20/2020
11+
ms.date: 04/21/2020
1212
ms.subservice: hybrid
1313
ms.author: billmath
1414

@@ -61,12 +61,6 @@ This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filte
6161

6262
> [!IMPORTANT]
6363
> If you have cloned the **In from AD - Group Join** sync rule and have not cloned the **In from AD - Group Common** sync rule and plan to upgrade, complete the following steps as part of the upgrade:
64-
> 1. During Upgrade, on the configure page, uncheck the option **Start the synchronization process when configuration completes**.
65-
> 2. Edit cloned join sync rule and add the following two transformations:
66-
- direct flow `objectGUID` to `sourceAnchorBinary`
67-
- expression flow `ConvertToBase64([objectGUID])` to `sourceAnchor`
68-
> 3. Enable the scheduler using `Set-ADSyncScheduler -SyncCycleEnabled $true`
69-
> If you use mS-DS-ConsistencyGuid as the source anchor, and you have cloned the **In from AD - Group Join** sync rule and plan to upgrade, complete the following steps as part of the upgrade:
7064
> 1. During Upgrade, uncheck the option **Start the synchronization process when configuration completes**.
7165
> 2. Edit the cloned join sync rule and add the following two transformations:
7266
> - Set direct flow `objectGUID` to `sourceAnchorBinary`.

articles/active-directory/manage-apps/application-proxy-wildcard.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,6 @@ For example: `http(s)://*.adventure-works.com`.
4646

4747
While the internal and external URLs can use different domains, as a best practice, they should be same. When publishing the application, you see an error if one of the URLs doesn't have a wildcard.
4848

49-
If you have additional applications with different configuration settings, you must publish these exceptions as separate applications to overwrite the defaults set for the wildcard. Applications without a wildcard do always take precedence over wildcard applications. From the configuration perspective, these are "just" regular applications.
50-
5149
Creating a wildcard application is based on the same [application publishing flow](application-proxy-add-on-premises-application.md) that is available for all other applications. The only difference is that you include a wildcard in the URLs and potentially the SSO configuration.
5250

5351
## Prerequisites

articles/active-directory/saas-apps/profitco-saml-app-tutorial.md

Lines changed: 45 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,10 @@ ms.collection: M365-identity-device-management
2424
In this tutorial, you'll learn how to integrate Profit.co SAML App with Azure Active Directory (Azure AD). When you integrate Profit.co SAML App with Azure AD, you can:
2525

2626
* Control in Azure AD who has access to Profit.co SAML App.
27-
* Enable your users to be automatically signed-in to Profit.co SAML App with their Azure AD accounts.
28-
* Manage your accounts in one central location - the Azure portal.
27+
* Enable your users to be automatically signed in to Profit.co SAML App with their Azure AD accounts.
28+
* Manage your accounts in one central location, the Azure portal.
2929

30-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
30+
To learn more about software as a service (SaaS) app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
3131

3232
## Prerequisites
3333

@@ -40,100 +40,99 @@ To get started, you need the following items:
4040

4141
In this tutorial, you configure and test Azure AD SSO in a test environment.
4242

43-
* Profit.co SAML App supports **IDP** initiated SSO
43+
* Profit.co SAML App supports IDP initiated SSO.
4444

45-
* Once you configure Profit.co SAML App you can enforce session control, which protect exfiltration and infiltration of your organizations sensitive data in real-time. Session control extend from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
45+
* After you configure Profit.co SAML App, you can enforce session control. This protects exfiltration and infiltration of your organization's sensitive data in real time. Session control extends from conditional access. [Learn how to enforce session control with Microsoft Cloud App Security](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app).
4646

47-
## Adding Profit.co SAML App from the gallery
47+
## Add Profit.co SAML App from the gallery
4848

4949
To configure the integration of Profit.co SAML App into Azure AD, you need to add Profit.co SAML App from the gallery to your list of managed SaaS apps.
5050

51-
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
51+
1. Sign in to the [Azure portal](https://portal.azure.com) by using either a work or school account, or a personal Microsoft account.
5252
1. On the left navigation pane, select the **Azure Active Directory** service.
53-
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54-
1. To add new application, select **New application**.
53+
1. Go to **Enterprise Applications**, and then select **All Applications**.
54+
1. To add a new application, select **New application**.
5555
1. In the **Add from the gallery** section, type **Profit.co SAML App** in the search box.
56-
1. Select **Profit.co SAML App** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57-
56+
1. Select **Profit.co SAML App** from the results panel, and then add the app. Wait a few seconds while the app is added to your tenant.
5857

5958
## Configure and test Azure AD single sign-on for Profit.co SAML App
6059

61-
Configure and test Azure AD SSO with Profit.co SAML App using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Profit.co SAML App.
60+
Configure and test Azure AD SSO with Profit.co SAML App by using a test user called **B.Simon**. For SSO to work, establish a linked relationship between an Azure AD user and the related user in Profit.co SAML App.
6261

63-
To configure and test Azure AD SSO with Profit.co SAML App, complete the following building blocks:
62+
Here are the general steps to configure and test Azure AD SSO with Profit.co SAML App:
6463

65-
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
66-
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
67-
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
68-
1. **[Configure Profit.co SAML App SSO](#configure-profitco-saml-app-sso)** - to configure the single sign-on settings on application side.
69-
1. **[Create Profit.co SAML App test user](#create-profitco-saml-app-test-user)** - to have a counterpart of B.Simon in Profit.co SAML App that is linked to the Azure AD representation of user.
70-
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
64+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
65+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
66+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
67+
1. **[Configure Profit.co SAML App SSO](#configure-profitco-saml-app-sso)** to configure the single sign-on settings on the application side.
68+
1. **[Create Profit.co SAML App test user](#create-a-profitco-saml-app-test-user)** to have a counterpart of B.Simon in Profit.co SAML App. This counterpart is linked to the Azure AD representation of the user.
69+
1. **[Test SSO](#test-sso)** to verify whether the configuration works.
7170

7271
## Configure Azure AD SSO
7372

7473
Follow these steps to enable Azure AD SSO in the Azure portal.
7574

76-
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co SAML App** application integration page, find the **Manage** section and select **single sign-on**.
75+
1. In the [Azure portal](https://portal.azure.com/), on the **Profit.co SAML App** application integration page, find the **Manage** section. Select **single sign-on**.
7776
1. On the **Select a single sign-on method** page, select **SAML**.
78-
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
77+
1. On the **Set up single sign-on with SAML** page, select the pencil icon for **Basic SAML Configuration** to edit the settings.
7978

80-
![Edit Basic SAML Configuration](common/edit-urls.png)
79+
![Screenshot of Set up single sign-on with SAML page, with pencil icon highlighted](common/edit-urls.png)
8180

82-
1. On the **Basic SAML Configuration** section, the application is pre-configured and the necessary URLs are already pre-populated with Azure. The user needs to save the configuration by clicking the **Save** button.
81+
1. In the **Basic SAML Configuration** section, the application is preconfigured and the necessary URLs are already prepopulated in Azure. Users need to save the configuration by selecting the **Save** button.
8382

84-
1. On the **Set up single sign-on with SAML** page, In the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
83+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, select the **Copy** button. This copies the **App Federation Metadata Url** and saves it on your computer.
8584

86-
![The Certificate download link](common/copy-metadataurl.png)
85+
![Screenshot of the SAML Signing Certificate, with the copy button highlighted](common/copy-metadataurl.png)
8786

8887
### Create an Azure AD test user
8988

90-
In this section, you'll create a test user in the Azure portal called B.Simon.
89+
In this section, you create a test user in the Azure portal called B.Simon.
9190

92-
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
91+
1. From the left pane in the Azure portal, select **Azure Active Directory** > **Users** > **All users**.
9392
1. Select **New user** at the top of the screen.
9493
1. In the **User** properties, follow these steps:
9594
1. In the **Name** field, enter `B.Simon`.
9695
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
97-
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
98-
1. Click **Create**.
96+
1. Select the **Show password** check box, and then write down the value that's shown in the **Password** field.
97+
1. Select **Create**.
9998

10099
### Assign the Azure AD test user
101100

102-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Profit.co SAML App.
101+
In this section, you enable B.Simon to use Azure single sign-on by granting access to Profit.co SAML App.
103102

104-
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
103+
1. In the Azure portal, select **Enterprise Applications** > **All applications**.
105104
1. In the applications list, select **Profit.co SAML App**.
106-
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
105+
1. In the app's overview page, find the **Manage** section, and select **Users and groups**.
107106

108-
![The "Users and groups" link](common/users-groups-blade.png)
107+
![Screenshot of the Manage section, with Users and groups highlighted](common/users-groups-blade.png)
109108

110-
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
109+
1. Select **Add user**. In the **Add Assignment** dialog box, select **Users and groups**.
111110

112-
![The Add User link](common/add-assign-user.png)
111+
![Screenshot of Users and groups page, with Add user highlighted](common/add-assign-user.png)
113112

114-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
115-
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
116-
1. In the **Add Assignment** dialog, click the **Assign** button.
113+
1. In the **Users and groups** dialog box, select **B.Simon** from the users list. Then choose the **Select** button at the bottom of the screen.
114+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog box, select the appropriate role for the user from the list. Then choose the **Select** button at the bottom of the screen.
115+
1. In the **Add Assignment** dialog box, select **Assign**.
117116

118117
## Configure Profit.co SAML App SSO
119118

120-
To configure single sign-on on **Profit.co SAML App** side, you need to send the **App Federation Metadata Url** to [Profit.co SAML App support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
119+
To configure single sign-on on the Profit.co SAML App side, you need to send the App Federation Metadata URL to the [Profit.co SAML App support team](mailto:[email protected]). They configure this setting to have the SAML SSO connection set properly on both sides.
121120

122-
### Create Profit.co SAML App test user
121+
### Create a Profit.co SAML App test user
123122

124-
In this section, you create a user called Britta Simon in Profit.co SAML App. Work with [Profit.co SAML App support team](mailto:[email protected]) to add the users in the Profit.co SAML App platform. Users must be created and activated before you use single sign-on.
123+
In this section, you create a user called B.Simon in Profit.co SAML App. Work with the [Profit.co SAML App support team](mailto:[email protected]) to add the users in the Profit.co SAML App platform. You can't use single sign-on until you create and activate users.
125124

126-
## Test SSO
125+
## Test SSO
127126

128-
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
127+
In this section, you test your Azure AD single sign-on configuration by using Access Panel.
129128

130-
When you click the Profit.co SAML App tile in the Access Panel, you should be automatically signed in to the Profit.co SAML App for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
129+
When you select the Profit.co SAML App tile in Access Panel, you should be automatically signed in to the Profit.co SAML App for which you set up SSO. For more information, see [Introduction to Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
131130

132131
## Additional resources
133132

134-
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
133+
- [Tutorials for integrating SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
135134

136-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
135+
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
137136

138137
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
139138

@@ -142,4 +141,3 @@ When you click the Profit.co SAML App tile in the Access Panel, you should be au
142141
- [What is session control in Microsoft Cloud App Security?](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
143142

144143
- [How to protect Profit.co SAML App with advanced visibility and controls](https://docs.microsoft.com/cloud-app-security/proxy-intro-aad)
145-

articles/active-directory/user-help/my-staff-team-manager.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Managing your team members in My Staff is simple. To start, [go to My Staff](htt
2525

2626
If you manage more than one location, when you go to My Staff you must select a location to see the team member who are assigned to the location.
2727

28-
If you don't yet have sufficient permissions to access My Staff, you'll see the following message "Oops, seem you're not authorized to see My Staff at this time. Please contact your admin for more information."
28+
If you don't yet have sufficient permissions to access My Staff, you'll see the following message "Oops, seems you're not authorized to see My Staff at this time. Please contact your admin for more information."
2929

3030
### Find a staff member in My Staff
3131

0 commit comments

Comments
 (0)