Skip to content

Commit dad29e8

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-horizontal-rbac-terms
2 parents 3fb9a2e + d913897 commit dad29e8

File tree

84 files changed

+1324
-1260
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+1324
-1260
lines changed

articles/active-directory/manage-apps/configure-authentication-for-federated-users-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ In the following examples, you create, update, link, and delete policies on appl
163163

164164
If nothing is returned, it means you have no policies created in your tenant.
165165

166-
### Example: Set HRD policy for an application
166+
### Example: Set an HRD policy for an application
167167

168168
In this example, you create a policy that when it is assigned to an application either:
169169
- Auto-accelerates users to an AD FS sign-in screen when they are signing in to an application when there is a single domain in your tenant.
@@ -246,7 +246,7 @@ Note the **ObjectID** of the policy that you want to list assignments for.
246246
Get-AzureADPolicyAppliedObject -id <ObjectId of the Policy>
247247
```
248248

249-
### Example: Remove an HRD policy for an application
249+
### Example: Remove an HRD policy from an application
250250
#### Step 1: Get the ObjectID
251251
Use the previous example to get the **ObjectID** of the policy, and that of the application service principal from which you want to remove it.
252252

articles/active-directory/saas-apps/float-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ To learn more about SaaS app integration with Azure AD, see [What is application
3434
To get started, you need the following items:
3535

3636
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
37-
* Float single sign-on (SSO) enabled subscription.
37+
* A Float subscription. If you don't have a subscription, you can get a [free account](https://app.float.com/join?).
3838

3939
## Scenario description
4040

@@ -89,7 +89,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8989
In the **Sign-on URL** text box, type a URL in the pattern `https://<hostname>.float.com/login`.
9090

9191
> [!NOTE]
92-
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [Float Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
92+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Replace <hostname> with your Float hostname. Contact [Float Client support team](mailto:[email protected]) if you are unsure. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9393
9494
1. Float application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.
9595

@@ -140,11 +140,11 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
140140

141141
## Configure Float SSO
142142

143-
To configure single sign-on on **Float** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [Float support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
143+
To configure single sign-on on **Float** side, visit the Float Team Settings section and select Configure from the Authentication module. Paste the Azure AD Login URL in the SAML 2.0 Endpoint URL field, paste the Azure AD Indentifier in the Identity Provider Issuer URL field, paste the full text from the downloaded **Certificate (Base64)** in the X.509 Certificate field, and Save.
144144

145145
### Create Float test user
146146

147-
In this section, you create a user called Britta Simon in Float. Work with [Float support team](mailto:[email protected]) to add the users in the Float platform. Users must be created and activated before you use single sign-on.
147+
In this section, create a user called Britta Simon in Float. Add the user from the People section or Team Settings Guest section, and grant them an access right. Users must be created and accept the invitation before you use single sign-on.
148148

149149
## Test SSO
150150

articles/active-directory/users-groups-roles/my-staff-configure.md

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: article
99
ms.service: active-directory
1010
ms.subservice: user-help
1111
ms.workload: identity
12-
ms.date: 04/23/2020
12+
ms.date: 05/01/2020
1313
ms.author: curtand
1414
ms.reviewer: sahenry
1515
ms.custom: oldportal;it-pro;
@@ -21,10 +21,29 @@ My Staff enables you to delegate to a figure of authority, such as a store manag
2121

2222
Before you configure My Staff for your organization, we recommend that you review this documentation as well as the [user documentation](../user-help/my-staff-team-manager.md) to ensure you understand the functionality and impact of this feature on your users. You can leverage the user documentation to train and prepare your users for the new experience and help to ensure a successful rollout.
2323

24+
SMS-based authentication for users is a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)
25+
2426
## How My Staff works
2527

2628
My Staff is based on administrative units (AUs), which are a container of resources which can be used to restrict the scope of a role assignment's administrative control. In My Staff, AUs are used to define a subset of an organization's users such as a store or department. Then, for example, a team manager could be assigned to a role whose scope is one or more AUs. In the example below, the user has been granted the Authentication Administrative role, and the three AUs are the scope of the role. For more information about administrative units, see [Administrative units management in Azure Active Directory](directory-administrative-units.md).
2729

30+
## Before you begin
31+
32+
To complete this article, you need the following resources and privileges:
33+
34+
* An active Azure subscription.
35+
36+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
37+
* An Azure Active Directory tenant associated with your subscription.
38+
39+
* If needed, [create an Azure Active Directory tenant](../fundamentals/sign-up-organization.md) or [associate an Azure subscription with your account](../fundamentals/active-directory-how-subscriptions-associated-directory.md).
40+
* You need *Global administrator* privileges in your Azure AD tenant to enable SMS-based authentication.
41+
* Each user that's enabled in the text message authentication method policy must be licensed, even if they don't use it. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
42+
43+
* [Azure AD Premium P1 or P2](https://azure.microsoft.com/pricing/details/active-directory/)
44+
* [Microsoft 365 (M365) F1 or F3](https://www.microsoft.com/licensing/news/m365-firstline-workers)
45+
* [Enterprise Mobility + Security (EMS) E3 or E5](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/compare-plans-and-pricing) or [Microsoft 365 (M365) E3 or E5](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans)
46+
2847
## How to enable My Staff
2948

3049
Once you have configured AUs, you can apply this scope to your users who access My Staff. Only users who are assigned an administrative role can access My Staff. To enable My Staff, complete the following steps:
@@ -42,7 +61,7 @@ You can protect the My Staff portal using Azure AD Conditional Access policy. Us
4261

4362
We strongly recommend that you protect My Staff using [Azure AD Conditional Access policies](https://docs.microsoft.com/azure/active-directory/conditional-access/). To apply a Conditional Access policy to My Staff, you must manually create the My Staff service principal using PowerShell.
4463

45-
### Apply a Conditional Access policy to My Staff
64+
### Apply a Conditional Access policy to My Staff
4665

4766
1. Install the [Microsoft Graph Beta PowerShell cmdlets](https://github.com/microsoftgraph/msgraph-sdk-powershell/blob/dev/samples/0-InstallModule.ps1).
4867
1. Run the following commands:
@@ -58,13 +77,6 @@ We strongly recommend that you protect My Staff using [Azure AD Conditional Acce
5877

5978
When a user goes to My Staff, they are shown the names of the [administrative units](directory-administrative-units.md) over which they have administrative permissions. In the [My Staff user documentation](../user-help/my-staff-team-manager.md), we use the term "location" to refer to administrative units. If an administrator's permissions do not have an AU scope, the permissions apply across the organization. After My Staff has been enabled, the users who are enabled and have been assigned an administrative role can access it through [https://mystaff.microsoft.com](https://mystaff.microsoft.com). They can select an AU to view the users in that AU, and select a user to open their profile.
6079

61-
## Licenses
62-
63-
Each user who's enabled in My Staff must be licensed, even if they don't use the My Staff portal. Each enabled user must have one of the following Azure AD or Microsoft 365 licenses:
64-
65-
- Azure AD Premium P1 or P2
66-
- Microsoft 365 F1 or F3
67-
6880
## Reset a user's password
6981

7082
The following roles have permission to reset a user's password:

articles/data-lake-store/data-lake-store-archive-eventhub-capture.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,9 @@
11
---
2-
title: Capture data from Event Hubs into Azure Data Lake Storage Gen1 | Microsoft Docs
3-
description: Use Azure Data Lake Storage Gen1 to capture data from Event Hubs
4-
services: data-lake-store
5-
documentationcenter: ''
6-
author: twooley
7-
manager: mtillman
8-
editor: cgronlun
2+
title: Capture data from Event Hubs to Azure Data Lake Storage Gen1
3+
description: Use Azure Data Lake Storage Gen1 to capture data that's received by Azure Event Hubs.
94

5+
author: twooley
106
ms.service: data-lake-store
11-
ms.devlang: na
127
ms.topic: conceptual
138
ms.date: 05/29/2018
149
ms.author: twooley

articles/data-lake-store/data-lake-store-comparison-with-blob-storage.md

Lines changed: 8 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,9 @@
11
---
2-
title: Azure Data Lake Storage Gen1 comparison with Azure Storage Blob | Microsoft Docs
3-
description: Azure Data Lake Storage Gen1 comparison with Azure Storage Blob
4-
services: data-lake-store
5-
documentationcenter: ''
6-
author: twooley
7-
manager: mtillman
8-
editor: cgronlun
2+
title: Comparison of Azure Data Lake Storage Gen1 with Blob storage
3+
description: Provides a summary of the differences between Azure Data Lake Storage Gen1 and Azure Blob storage.
94

10-
ms.assetid: b199525b-84de-4f79-9eb6-69a613b8b217
5+
author: twooley
116
ms.service: data-lake-store
12-
ms.devlang: na
137
ms.topic: conceptual
148
ms.date: 03/26/2018
159
ms.author: twooley
@@ -31,15 +25,15 @@ The table in this article summarizes the differences between Azure Data Lake Sto
3125
| Server-side API |[WebHDFS-compatible REST API](https://msdn.microsoft.com/library/azure/mt693424.aspx) |[Azure Blob Storage REST API](https://msdn.microsoft.com/library/azure/dd135733.aspx) |
3226
| Hadoop File System Client |Yes |Yes |
3327
| Data Operations - Authentication |Based on [Azure Active Directory Identities](../active-directory/develop/authentication-scenarios.md) |Based on shared secrets - [Account Access Keys](../storage/common/storage-account-keys-manage.md) and [Shared Access Signature Keys](../storage/common/storage-dotnet-shared-access-signature-part-1.md). |
34-
| Data Operations - Authentication Protocol |OAuth 2.0. Calls must contain a valid JWT (JSON Web Token) issued by Azure Active Directory |Hash-based Message Authentication Code (HMAC) . Calls must contain a Base64-encoded SHA-256 hash over a part of the HTTP request. |
28+
| Data Operations - Authentication Protocol |OAuth 2.0. Calls must contain a valid JWT (JSON Web Token) issued by Azure Active Directory |Hash-based Message Authentication Code (HMAC). Calls must contain a Base64-encoded SHA-256 hash over a part of the HTTP request. |
3529
| Data Operations - Authorization |POSIX Access Control Lists (ACLs). ACLs based on Azure Active Directory Identities can be set at the file and folder level. |For account-level authorization – Use [Account Access Keys](../storage/common/storage-account-keys-manage.md)<br>For account, container, or blob authorization - Use [Shared Access Signature Keys](../storage/common/storage-dotnet-shared-access-signature-part-1.md) |
3630
| Data Operations - Auditing |Available. See [here](data-lake-store-diagnostic-logs.md) for information. |Available |
3731
| Encryption data at rest |<ul><li>Transparent, Server side</li> <ul><li>With service-managed keys</li><li>With customer-managed keys in Azure KeyVault</li></ul></ul> |<ul><li>Transparent, Server side</li> <ul><li>With service-managed keys</li><li>With customer-managed keys in Azure KeyVault (preview)</li></ul><li>Client-side encryption</li></ul> |
38-
| Management operations (e.g. Account Create) |[Role-based access control](../role-based-access-control/overview.md) (RBAC) provided by Azure for account management |[Role-based access control](../role-based-access-control/overview.md) (RBAC) provided by Azure for account management |
39-
| Developer SDKs |.NET, Java, Python, Node.js |.Net, Java, Python, Node.js, C++, Ruby, PHP, Go, Android, iOS |
32+
| Management operations (for example, Account Create) |[Role-based access control](../role-based-access-control/overview.md) (RBAC) provided by Azure for account management |[Role-based access control](../role-based-access-control/overview.md) (RBAC) provided by Azure for account management |
33+
| Developer SDKs |.NET, Java, Python, Node.js |.NET, Java, Python, Node.js, C++, Ruby, PHP, Go, Android, iOS |
4034
| Analytics Workload Performance |Optimized performance for parallel analytics workloads. High Throughput and IOPS. |Optimized performance for parallel analytics workloads. |
41-
| Size limits |No limits on account sizes, file sizes or number of files |For specific limits, see [Scalability targets for standard storage accounts](../storage/common/scalability-targets-standard-account.md) and [Scalability and performance targets for Blob storage](../storage/blobs/scalability-targets.md). Larger account limits available by contacting [Azure Support](https://azure.microsoft.com/support/faq/) |
42-
| Geo-redundancy |Locally-redundant (multiple copies of data in one Azure region) |Locally redundant (LRS), zone redundant (ZRS), globally redundant (GRS), read-access globally redundant (RA-GRS). See [here](../storage/common/storage-redundancy.md) for more information |
35+
| Size limits |No limits on account sizes, file sizes, or number of files |For specific limits, see [Scalability targets for standard storage accounts](../storage/common/scalability-targets-standard-account.md) and [Scalability and performance targets for Blob storage](../storage/blobs/scalability-targets.md). Larger account limits available by contacting [Azure Support](https://azure.microsoft.com/support/faq/) |
36+
| Geo-redundancy |Locally redundant (multiple copies of data in one Azure region) |Locally redundant (LRS), zone redundant (ZRS), globally redundant (GRS), read-access globally redundant (RA-GRS). See [here](../storage/common/storage-redundancy.md) for more information |
4337
| Service state |Generally available |Generally available |
4438
| Regional availability |See [here](https://azure.microsoft.com/regions/#services) |Available in all Azure regions |
4539
| Price |See [Pricing](https://azure.microsoft.com/pricing/details/data-lake-store/) |See [Pricing](https://azure.microsoft.com/pricing/details/storage/) |

articles/data-lake-store/data-lake-store-data-operations-net-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: '.NET SDK: Filesystem operations on Azure Data Lake Storage Gen1'
2+
title: .NET SDK - Filesystem operations on Data Lake Storage Gen1 - Azure
33
description: Use the Azure Data Lake Storage Gen1 .NET SDK for filesystem operations on Data Lake Storage Gen1 such as create folders, etc.
44

55
author: twooley

articles/data-lake-store/data-lake-store-end-user-authenticate-java-sdk.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,9 @@
11
---
2-
title: 'End-user authentication: Java with Azure Data Lake Storage Gen1 using Azure Active Directory | Microsoft Docs'
2+
title: End-user authentication - Java with Data Lake Storage Gen1 - Azure
33
description: Learn how to achieve end-user authentication with Azure Data Lake Storage Gen1 using Azure Active Directory with Java
4-
services: data-lake-store
5-
documentationcenter: ''
6-
author: twooley
7-
manager: mtillman
8-
editor: cgronlun
94

5+
author: twooley
106
ms.service: data-lake-store
11-
ms.devlang: na
127
ms.topic: conceptual
138
ms.date: 05/29/2018
149
ms.author: twooley
@@ -52,7 +47,7 @@ In this article, you learn about how to use the Java SDK to do end-user authenti
5247
</dependency>
5348
</dependencies>
5449

55-
The first dependency is to use the Data Lake Storage Gen1 SDK (`azure-data-lake-store-sdk`) from the maven repository. The second dependency is to specify the logging framework (`slf4j-nop`) to use for this application. The Data Lake Storage Gen1 SDK uses [slf4j](https://www.slf4j.org/) logging façade, which lets you choose from a number of popular logging frameworks, like log4j, Java logging, logback, etc., or no logging. For this example, we disable logging, hence we use the **slf4j-nop** binding. To use other logging options in your app, see [here](https://www.slf4j.org/manual.html#projectDep).
50+
The first dependency is to use the Data Lake Storage Gen1 SDK (`azure-data-lake-store-sdk`) from the maven repository. The second dependency is to specify the logging framework (`slf4j-nop`) to use for this application. The Data Lake Storage Gen1 SDK uses [SLF4J](https://www.slf4j.org/) logging façade, which lets you choose from a number of popular logging frameworks, like Log4j, Java logging, Logback, etc., or no logging. For this example, we disable logging, hence we use the **slf4j-nop** binding. To use other logging options in your app, see [here](https://www.slf4j.org/manual.html#projectDep).
5651

5752
3. Add the following import statements to your application.
5853

articles/data-lake-store/data-lake-store-end-user-authenticate-net-sdk.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,9 @@
11
---
2-
title: 'End-user authentication: .NET SDK with Azure Data Lake Storage Gen1 using Azure Active Directory | Microsoft Docs'
2+
title: End-user authentication - .NET with Data Lake Storage Gen1 Azure
33
description: Learn how to achieve end-user authentication with Azure Data Lake Storage Gen1 using Azure Active Directory with .NET SDK
4-
services: data-lake-store
5-
documentationcenter: ''
6-
author: twooley
7-
manager: cgronlun
8-
editor: cgronlun
94

5+
author: twooley
106
ms.service: data-lake-store
11-
ms.devlang: na
127
ms.topic: conceptual
138
ms.date: 05/29/2018
149
ms.author: twooley

articles/data-lake-store/data-lake-store-end-user-authenticate-python.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,9 @@
11
---
2-
title: 'End-user authentication: Python with Azure Data Lake Storage Gen1 using Azure Active Directory | Microsoft Docs'
2+
title: End-user authentication - Python with Data Lake Storage Gen1 - Azure
33
description: Learn how to achieve end-user authentication with Azure Data Lake Storage Gen1 using Azure Active Directory with Python
4-
services: data-lake-store
5-
documentationcenter: ''
6-
author: twooley
7-
manager: mtillman
8-
editor: cgronlun
94

5+
author: twooley
106
ms.service: data-lake-store
11-
ms.devlang: na
127
ms.topic: conceptual
138
ms.date: 05/29/2018
149
ms.author: twooley

articles/data-lake-store/data-lake-store-end-user-authenticate-rest-api.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,9 @@
11
---
2-
title: 'End-user authentication: REST API with Azure Data Lake Storage Gen1 using Azure Active Directory | Microsoft Docs'
2+
title: End-user authentication - REST with Data Lake Storage Gen1 - Azure
33
description: Learn how to achieve end-user authentication with Azure Data Lake Storage Gen1 using Azure Active Directory using REST API
4-
services: data-lake-store
5-
documentationcenter: ''
6-
author: twooley
7-
manager: mtillman
8-
editor: cgronlun
94

5+
author: twooley
106
ms.service: data-lake-store
11-
ms.devlang: na
127
ms.topic: conceptual
138
ms.date: 05/29/2018
149
ms.author: twooley

0 commit comments

Comments
 (0)