Skip to content

Commit d7cdd4d

Browse files
authored
Merge pull request #196841 from MicrosoftDocs/main
5/02 PM Publish
2 parents ab0e2c0 + 04f4020 commit d7cdd4d

File tree

232 files changed

+3293
-1338
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+3293
-1338
lines changed

.openpublishing.redirection.json

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24204,7 +24204,22 @@
2420424204
"redirect_document_id": false
2420524205
},
2420624206
{
24207-
"source_path_from_root": "/articles/sql-database/sql-database-managed-instance-create-manage",
24207+
"source_path_from_root": "/articles/virtual-machines/windows/sql/virtual-machines-windows-portal-sql-availability-group-tutorial.md",
24208+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-manually-configure-tutorial-multi-subnet",
24209+
"redirect_document_id": false
24210+
},
24211+
{
24212+
"source_path_from_root": "/articles/virtual-machines/windows/sql/virtual-machines-windows-sql-server-iaas-overview.md",
24213+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/sql-server-on-azure-vm-iaas-what-is-overview",
24214+
"redirect_document_id": false
24215+
},
24216+
{
24217+
"source_path_from_root": "/articles/sql-database/index.md",
24218+
"redirect_url": "/azure/azure-sql/database/index",
24219+
"redirect_document_id": false
24220+
},
24221+
{
24222+
"source_path_from_root": "/articles/sql-database/sql-database-managed-instance-create-manage.md",
2420824223
"redirect_url": "/azure/azure-sql/managed-instance/instance-create-quickstart",
2420924224
"redirect_document_id": false
2421024225
},

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 7 additions & 5 deletions
Large diffs are not rendered by default.
-4.18 KB
Loading
-4.94 KB
Loading

articles/active-directory/external-identities/whats-new-docs.md

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory External Identities"
33
description: "New and updated documentation for the Azure Active Directory External Identities."
4-
ms.date: 03/31/2022
4+
ms.date: 05/02/2022
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: reference
@@ -15,6 +15,22 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory External Identities documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the External Identities service, see [What's new in Azure Active Directory](../fundamentals/whats-new.md).
1717

18+
## April 2022
19+
20+
### Updated articles
21+
22+
- [Email one-time passcode authentication](one-time-passcode.md)
23+
- [Configure external collaboration settings](external-collaboration-settings-configure.md)
24+
- [Add a self-service sign-up user flow to an app](self-service-sign-up-user-flow.md)
25+
- [B2B direct connect overview (Preview)](b2b-direct-connect-overview.md)
26+
- [Azure Active Directory B2B collaboration invitation redemption](redemption-experience.md)
27+
- [Federation with SAML/WS-Fed identity providers for guest users (preview)](direct-federation.md)
28+
- [Azure Active Directory External Identities: What's new](whats-new-docs.md)
29+
- [Azure Active Directory B2B best practices](b2b-fundamentals.md)
30+
- [Troubleshooting Azure Active Directory B2B collaboration](troubleshoot.md)
31+
- [Properties of an Azure Active Directory B2B collaboration user](user-properties.md)
32+
- [B2B collaboration overview](what-is-b2b.md)
33+
1834
## March 2022
1935

2036
### New articles
@@ -61,10 +77,3 @@ Welcome to what's new in Azure Active Directory External Identities documentatio
6177
- [Troubleshooting Azure Active Directory B2B collaboration](troubleshoot.md)
6278
- [Properties of an Azure Active Directory B2B collaboration user](user-properties.md)
6379
- [Authentication and Conditional Access for External Identities](authentication-conditional-access.md)
64-
65-
## January 2022
66-
67-
### Updated articles
68-
69-
- [Properties of an Azure Active Directory B2B collaboration user](user-properties.md)
70-
- [Azure Active Directory B2B collaboration invitation redemption](redemption-experience.md)

articles/active-directory/governance/create-access-review.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -63,17 +63,18 @@ For more information, see [License requirements](access-reviews-overview.md#lice
6363

6464
![Screenshot that shows the interface that appears if you selected applications instead of groups.](./media/create-access-review/select-application-detailed.png)
6565

66-
> [!NOTE]
67-
> Selecting multiple groups or applications results in the creation of multiple access reviews. For example, if you select five groups to review, the result is five separate access reviews.
68-
69-
1. Now you can select a scope for the review. Your options are:
66+
> [!NOTE]
67+
> Selecting multiple groups or applications results in the creation of multiple access reviews. For example, if you select five groups to review, the result is five separate access reviews.
7068
69+
7. Now you can select a scope for the review. Your options are:
7170
- **Guest users only**: This option limits the access review to only the Azure AD B2B guest users in your directory.
7271
- **Everyone**: This option scopes the access review to all user objects associated with the resource.
7372

7473
> [!NOTE]
7574
> If you selected **All Microsoft 365 groups with guest users**, your only option is to review **Guest users only**.
7675
76+
1. Or if you are conducting group membership review, you can create access reviews only for inactive users in the group (preview). In the *Users scope* section, check the box next to **Inactive users (on tenant level)**. If you check the box, the scope of the review will focus on inactive users only. Then, specify **Days inactive** with a number of days inactive up to 730 days (two years). Users in the group inactive for the specified number of days will be the only users in the review.
77+
7778
1. Select **Next: Reviews**.
7879

7980
### Next: Reviews
@@ -213,9 +214,9 @@ B2B direct connect users and teams are included in access reviews of the Teams-e
213214
- User administrator
214215
- Identity Governance Administrator
215216

216-
Ue the following instructions to create an access review on a team with shared channels:
217+
Use the following instructions to create an access review on a team with shared channels:
217218

218-
1. Sign in to the Azure Portal as a Global Admin, User Admin or Identity Governance Admin.
219+
1. Sign in to the Azure portal as a Global Admin, User Admin or Identity Governance Admin.
219220

220221
1. Open the [Identity Governance](https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/) page.
221222

articles/active-directory/manage-apps/migrate-application-authentication-to-azure-active-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: 'Migrate application authentication to Azure Active Directory'
33
description: This whitepaper details the planning for and benefits of migrating your application authentication to Azure AD.
44
services: active-directory
5-
author: omondiatieno
5+
author: CelesteDG
66
manager: CelesteDG
77
ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.topic: how-to
1010
ms.workload: identity
1111
ms.date: 02/05/2021
12-
ms.author: jamondi
12+
ms.author: celested
1313
ms.reviewer: alamaral
1414
ms.collection: M365-identity-device-management
1515
---

articles/active-directory/manage-apps/toc.yml

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -166,44 +166,44 @@
166166
href: secure-hybrid-access-integrations.md
167167
- name: Datawiza
168168
href: datawiza-with-azure-ad.md
169-
- name: F5
170-
items:
171-
- name: Deploy F5 BIG-IP in Azure
172-
href: f5-bigip-deployment-guide.md
173-
- name: F5 BIG-IP and Azure AD integration
169+
- name: F5
174170
items:
175-
- name: Integrate F5 BIG-IP with Azure AD
176-
href: f5-aad-integration.md
177-
- name: Easy Button guided configuration
178-
items:
179-
- name: Kerberos
180-
href: f5-big-ip-kerberos-easy-button.md
181-
- name: Headers
182-
href: f5-big-ip-headers-easy-button.md
183-
- name: Headers and LDAP
184-
href: f5-big-ip-ldap-header-easybutton.md
185-
- name: Oracle EBS
186-
href: f5-big-ip-oracle-enterprise-business-suite-easy-button.md
187-
- name: Oracle JDE
188-
href: f5-big-ip-oracle-jde-easy-button.md
189-
- name: Oracle PeopleSoft
190-
href: f5-big-ip-oracle-peoplesoft-easy-button.md
191-
- name: SAP ERP
192-
href: f5-big-ip-sap-erp-easy-button.md
193-
- name: Advanced configuration
171+
- name: Deploy F5 BIG-IP in Azure
172+
href: f5-bigip-deployment-guide.md
173+
- name: F5 BIG-IP and Azure AD integration
194174
items:
195-
- name: Headers
196-
href: f5-big-ip-header-advanced.md
175+
- name: Integrate F5 BIG-IP with Azure AD
176+
href: f5-aad-integration.md
177+
- name: Easy Button guided configuration
178+
items:
197179
- name: Kerberos
198-
href: f5-big-ip-kerberos-advanced.md
199-
- name: Form-based
200-
href: f5-big-ip-forms-advanced.md
201-
- name: SSL-VPN
202-
href: f5-aad-password-less-vpn.md
203-
- name: B2C
204-
href: ../../active-directory-b2c/partner-f5.md
205-
- name: Silverfort
206-
href: silverfort-azure-ad-integration.md
180+
href: f5-big-ip-kerberos-easy-button.md
181+
- name: Headers
182+
href: f5-big-ip-headers-easy-button.md
183+
- name: Headers and LDAP
184+
href: f5-big-ip-ldap-header-easybutton.md
185+
- name: Oracle EBS
186+
href: f5-big-ip-oracle-enterprise-business-suite-easy-button.md
187+
- name: Oracle JDE
188+
href: f5-big-ip-oracle-jde-easy-button.md
189+
- name: Oracle PeopleSoft
190+
href: f5-big-ip-oracle-peoplesoft-easy-button.md
191+
- name: SAP ERP
192+
href: f5-big-ip-sap-erp-easy-button.md
193+
- name: Advanced configuration
194+
items:
195+
- name: Headers
196+
href: f5-big-ip-header-advanced.md
197+
- name: Kerberos
198+
href: f5-big-ip-kerberos-advanced.md
199+
- name: Form-based
200+
href: f5-big-ip-forms-advanced.md
201+
- name: SSL-VPN
202+
href: f5-aad-password-less-vpn.md
203+
- name: B2C
204+
href: ../../active-directory-b2c/partner-f5.md
205+
- name: Silverfort
206+
href: silverfort-azure-ad-integration.md
207207
- name: Single sign-on
208208
items:
209209
- name: Linked

articles/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -63,18 +63,20 @@ The need for access to privileged Azure resource and Azure AD roles by employees
6363

6464
:::image type="content" source="./media/pim-create-azure-ad-roles-and-resource-roles-review/users.png" alt-text="Users scope to review role membership of screenshot.":::
6565

66-
11. Under **Review role membership**, select the privileged Azure resource or Azure AD roles to review.
66+
11. Or, you can create access reviews only for inactive users (preview). In the *Users scope* section, set the **Inactive users (on tenant level) only** to **true**. If the toggle is set to *true*, the scope of the review will focus on inactive users only. Then, specify **Days inactive** with a number of days inactive up to 730 days (two years). Users inactive for the specified number of days will be the only users in the review.
67+
68+
12. Under **Review role membership**, select the privileged Azure resource or Azure AD roles to review.
6769

6870
> [!NOTE]
6971
> Selecting more than one role will create multiple access reviews. For example, selecting five roles will create five separate access reviews.
7072
7173
:::image type="content" source="./media/pim-create-azure-ad-roles-and-resource-roles-review/review-role-membership.png" alt-text="Review role memberships screenshot.":::
7274

73-
12. In **assignment type**, scope the review by how the principal was assigned to the role. Choose **eligible assignments only** to review eligible assignments (regardless of activation status when the review is created) or **active assignments only** to review active assignments. Choose **all active and eligible assignments** to review all assignments regardless of type.
75+
13. In **assignment type**, scope the review by how the principal was assigned to the role. Choose **eligible assignments only** to review eligible assignments (regardless of activation status when the review is created) or **active assignments only** to review active assignments. Choose **all active and eligible assignments** to review all assignments regardless of type.
7476

7577
:::image type="content" source="./media/pim-create-azure-ad-roles-and-resource-roles-review/assignment-type-select.png" alt-text="Reviewers list of assignment types screenshot.":::
7678

77-
13. In the **Reviewers** section, select one or more people to review all the users. Or you can select to have the members review their own access.
79+
14. In the **Reviewers** section, select one or more people to review all the users. Or you can select to have the members review their own access.
7880

7981
:::image type="content" source="./media/pim-create-azure-ad-roles-and-resource-roles-review/reviewers.png" alt-text="Reviewers list of selected users or members (self)":::
8082

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 5 additions & 85 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: conceptual
1313
ms.tgt_pltfrm: na
1414
ms.workload: identity
1515
ms.subservice: report-monitor
16-
ms.date: 12/17/2021
16+
ms.date: 05/02/2022
1717
ms.author: markvi
1818
ms.reviewer: besiler
1919

@@ -154,9 +154,7 @@ Customizing the view enables you to display additional fields or remove fields t
154154
![All interactive columns](./media/concept-all-sign-ins/all-interactive-columns.png)
155155

156156

157-
Select an item in the list view to get more detailed information about the related sign-in.
158157

159-
![Sign-in activity](./media/concept-all-sign-ins/interactive-user-sign-in-details.png "Interactive user sign-ins")
160158

161159

162160

@@ -207,14 +205,6 @@ To make it easier to digest the data, non-interactive sign-in events are grouped
207205
- Resource ID
208206

209207

210-
You can:
211-
212-
- Expand a node to see the individual items of a group.
213-
214-
- Click an individual item to see all details
215-
216-
217-
![Non-interactive user sign-in details](./media/concept-all-sign-ins/non-interactive-sign-ins-details.png)
218208

219209

220210

@@ -267,14 +257,6 @@ To make it easier to digest the data in the service principal sign-in logs, serv
267257

268258
- Resource name or ID
269259

270-
You can:
271-
272-
- Expand a node to see the individual items of a group.
273-
274-
- Click an individual item so see all details
275-
276-
277-
![Column details](./media/concept-all-sign-ins/service-principals-sign-ins-view.png "Column details")
278260

279261

280262

@@ -388,73 +370,11 @@ To access the new sign-in logs with non-interactive and application sign-ins:
388370

389371

390372

391-
## Download sign-in activity logs
392-
393-
When you download a sign-in activity report, the following is true:
394-
395-
- You can download the sign-in report as CSV or JSON file.
396-
397-
- You can download up to 100-K records. If you want to download more data, use the reporting API.
398-
399-
- Your download is based on the filter selection you made.
400-
401-
- The number of records you can download is constrained by the [Azure Active Directory report retention policies](reference-reports-data-retention.md).
402-
403-
404-
![Download logs](./media/concept-all-sign-ins/download-reports.png "Download logs")
405-
406-
407-
Each CSV download consists of six different files:
408-
409-
- Interactive sign-ins
410-
411-
- Auth details of the interactive sign-ins
412-
413-
- Non-interactive sign-ins
414373

415-
- Auth details of the non-interactive sign-ins
416-
417-
- Service principal sign-ins
418-
419-
- Managed identity for Azure resources sign-ins
420-
421-
Each JSON download consists of four different files:
422-
423-
- Interactive sign-ins (includes auth details)
424-
425-
- Non-interactive sign-ins (includes auth details)
426-
427-
- Service principal sign-ins
428-
429-
- Managed identity for Azure resources sign-ins
430-
431-
![Download files](./media/concept-all-sign-ins/download-files.png "Download files")
432-
433-
434-
## Return log data with Microsoft Graph
435-
436-
In addition to using the Azure portal, you can query sign-in logs using the Microsoft Graph API to return different types of sign-in information. To avoid potential performance issues, scope your query to just the data you care about.
437-
438-
The following example scopes the query by the number records, by a specific time period, and by type of sign-in event:
439-
440-
```msgraph-interactive
441-
GET https://graph.microsoft.com/beta/auditLogs/signIns?$top=100&$filter=createdDateTime ge 2020-09-10T06:00:00Z and createdDateTime le 2020-09-17T06:00:00Z and signInEventTypes/any(t: t eq 'nonInteractiveUser')
442-
```
443-
444-
The query parameters in the example provide the following results:
445-
446-
- The [$top](/graph/query-parameters#top-parameter) parameter returns the top 100 results.
447-
- The [$filter](/graph/query-parameters#filter-parameter) parameter limits the time frame for results to return and uses the signInEventTypes property to return only non-interactive user sign-ins.
448-
449-
The following values are available for filtering by different sign-in types:
374+
## Next steps
450375

451-
- interactiveUser
452-
- nonInteractiveUser
453-
- servicePrincipal
454-
- managedIdentity
376+
- [Basic info in the Azure AD sign-in logs](reference-basic-info-sign-in-logs.md)
455377

456-
## Next steps
378+
- [How to download logs in Azure Active Directory](howto-download-logs.md)
457379

458-
* [Sign-in activity report error codes](./concept-sign-ins.md)
459-
* [Azure AD data retention policies](reference-reports-data-retention.md)
460-
* [Azure AD report latencies](reference-reports-latencies.md)
380+
- [How to access activity logs in Azure AD](howto-access-activity-logs.md)

0 commit comments

Comments
 (0)