Skip to content

Commit db4d227

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afdcompare
2 parents 5882005 + 85ce440 commit db4d227

11 files changed

+189
-171
lines changed

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ In this article, you'll learn how to configure the admin consent workflow to ena
2222

2323
The admin consent workflow gives admins a secure way to grant access to applications that require admin approval. When a user tries to access an application but is unable to provide consent, they can send a request for admin approval. The request is sent via email to admins who have been designated as reviewers. A reviewer takes action on the request, and the user is notified of the action.
2424

25-
To approve requests, a reviewer must be a global administrator, cloud application administrator, or application administrator. The reviewer must already have one of these admin roles assigned; simply designating them as a reviewer doesn't elevate their privileges.
25+
To approve requests, a reviewer must have the [permissions required](grant-admin-consent.md#prerequisites) to grant admin consent for the application requested. Simply designating them as a reviewer doesn't elevate their privileges.
2626

2727
## Prerequisites
2828

@@ -53,7 +53,7 @@ To enable the admin consent workflow and choose reviewers:
5353
1. Select **Save**. It can take up to an hour for the workflow to become enabled.
5454

5555
> [!NOTE]
56-
> You can add or remove reviewers for this workflow by modifying the **Who can review admin consent requests** list. A current limitation of this feature is that a reviewer can retain the ability to review requests that were made while they were designated as a reviewer.
56+
> You can add or remove reviewers for this workflow by modifying the **Who can review admin consent requests** list. A current limitation of this feature is that a reviewer retains the ability to review requests that were made while they were designated as a reviewer. Additionally, new reviewers will not be assigned to requests that were created before they were set as a reviewer.
5757
5858
## Configure the admin consent workflow using Microsoft Graph
5959

articles/active-directory/manage-apps/user-admin-consent-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 09/28/2022
11+
ms.date: 04/04/2023
1212
ms.author: jomondi
1313
ms.reviewer: phsignor
1414
ms.collection: M365-identity-device-management
@@ -48,13 +48,13 @@ For most organizations, one of the built-in options will be appropriate. Some ad
4848

4949
## Admin consent
5050

51-
During admin consent, a Privileged Administrator may grant an application access on behalf of other users (usually, on behalf of the entire organization). Also during admin consent, applications or services provide direct access to an API, which can be used by the application if there's no signed-in user.
51+
During admin consent, a Privileged Administrator may grant an application access on behalf of other users (usually, on behalf of the entire organization). Also during admin consent, applications or services provide direct access to an API, which can be used by the application if there's no signed-in user. The specific role needed to grant admin consent differs based on the permissions requested, which are outlined [here.](grant-admin-consent.md#prerequisites)
5252

5353
When your organization purchases a license or subscription for a new application, you might proactively want to set up the application so that all users in the organization can use it. To avoid the need for user consent, an administrator can grant consent for the application on behalf of all users in the organization.
5454

5555
After an administrator grants admin consent on behalf of the organization, users aren't usually prompted for consent for that application. In certain cases, a user might be prompted for consent even after consent was granted by an administrator. An example might be if an application requests another permission that the administrator hasn't already granted.
5656

57-
Granting admin consent on behalf of an organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of the organization's data, or the permission to do highly privileged operations. Examples of such operations might be role management, full access to all mailboxes or all sites, and full user impersonation.
57+
Granting admin consent on behalf of an organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of the organization's data, or the permission to do highly privileged operations. Examples of such operations might be role management, full access to all mailboxes or all sites, and full user impersonation.
5858

5959
Before you grant tenant-wide admin consent, ensure that you trust the application and the application publisher, for the level of access you're granting. If you aren't confident that you understand who controls the application and why the application is requesting the permissions, do *not* grant consent.
6060

@@ -90,4 +90,4 @@ After the admin consent workflow is enabled, users can request admin approval fo
9090
## Next steps
9191

9292
- [Configure user consent settings](configure-user-consent.md)
93-
- [Configure the admin consent workflow](configure-admin-consent-workflow.md)
93+
- [Configure the admin consent workflow](configure-admin-consent-workflow.md)

articles/active-directory/reports-monitoring/howto-manage-inactive-user-accounts.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -36,24 +36,24 @@ The last successful sign-in provides potential insights into a user's continued
3636

3737
You detect inactive accounts by evaluating the **lastSignInDateTime** property exposed by the **signInActivity** resource type of the **Microsoft Graph** API. The **lastSignInDateTime** property shows the last time a user made a successful interactive sign-in to Azure AD. Using this property, you can implement a solution for the following scenarios:
3838

39-
- **Users by name**: In this scenario, you search for a specific user by name, which enables you to evaluate the lastSignInDateTime: `https://graph.microsoft.com/beta/users?$filter=startswith(displayName,'markvi')&$select=displayName,signInActivity`
39+
- **Users by name**: In this scenario, you search for a specific user by name, which enables you to evaluate the lastSignInDateTime: `https://graph.microsoft.com/v1.0/users?$filter=startswith(displayName,'markvi')&$select=displayName,signInActivity`
4040

41-
- **Users by date**: In this scenario, you request a list of users with a lastSignInDateTime before a specified date: `https://graph.microsoft.com/beta/users?filter=signInActivity/lastSignInDateTime le 2019-06-01T00:00:00Z`
41+
- **Users by date**: In this scenario, you request a list of users with a lastSignInDateTime before a specified date: `https://graph.microsoft.com/v1.0/users?$filter=signInActivity/lastSignInDateTime le 2019-06-01T00:00:00Z`
4242

4343
> [!NOTE]
4444
> There may be the need to generate a report of the last sign in date of all users, if so you can use the following scenario.
45-
> **Last Sign In Date and Time for All Users**: In this scenario, you request a list of all users, and the last lastSignInDateTime for each respective user: `https://graph.microsoft.com/beta/users?$select=displayName,signInActivity`
45+
> **Last Sign In Date and Time for All Users**: In this scenario, you request a list of all users, and the last lastSignInDateTime for each respective user: `https://graph.microsoft.com/v1.0/users?$select=displayName,signInActivity`
4646
4747
## What you need to know
4848

4949
This section lists what you need to know about the lastSignInDateTime property.
5050

5151
### How can I access this property?
5252

53-
The **lastSignInDateTime** property is exposed by the [signInActivity resource type](/graph/api/resources/signinactivity?view=graph-rest-beta&preserve-view=true) of the [Microsoft Graph API](/graph/overview#whats-in-microsoft-graph).
53+
The **lastSignInDateTime** property is exposed by the [signInActivity resource type](/graph/api/resources/signinactivity) of the [Microsoft Graph API](/graph/overview#whats-in-microsoft-graph).
5454

5555
> [!NOTE]
56-
> The signInActivity resource type is available only on the Microsoft Graph `beta` endpoint and isn't yet supported in US Government GCC High environments.
56+
> The signInActivity resource type isn't yet supported in US Government GCC High environments.
5757
5858
### Is the lastSignInDateTime property available through the Get-AzureAdUser cmdlet?
5959

@@ -65,10 +65,11 @@ To access this property, you need an Azure Active Directory Premium edition.
6565

6666
### What permission do I need to read the property?
6767

68-
To read this property, you need to grant the following rights:
68+
To read this property, you need to grant the app the following Microsoft Graph permissions:
6969

7070
- AuditLog.Read.All
7171
- Directory.Read.All
72+
- User.Read.All
7273

7374

7475
### When does Azure AD update the property?

articles/azure-functions/functions-bindings-storage-table-input.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -898,7 +898,7 @@ In the [Java functions runtime library](/java/api/overview/azure/functions/runti
898898
|---------|---------|
899899
|**[name](/java/api/com.microsoft.azure.functions.annotation.tableinput.name)** | The name of the variable that represents the table or entity in function code.|
900900
|**[tableName](/java/api/com.microsoft.azure.functions.annotation.tableinput.tableName)** | The name of the table.|
901-
**[partitionKey](/java/api/com.microsoft.azure.functions.annotation.tableinput.partitionkey)** |Optional. The partition key of the table entity to read. |
901+
|**[partitionKey](/java/api/com.microsoft.azure.functions.annotation.tableinput.partitionkey)** |Optional. The partition key of the table entity to read. |
902902
|**[rowKey](/java/api/com.microsoft.azure.functions.annotation.tableinput.rowkey)** |Optional. The row key of the table entity to read.|
903903
|**[take](/java/api/com.microsoft.azure.functions.annotation.tableinput.take)** | Optional. The maximum number of entities to read.|
904904
|**[filter](/java/api/com.microsoft.azure.functions.annotation.tableinput.filter)** | Optional. An OData filter expression for table input.|

articles/dms/tutorial-mysql-azure-single-to-flex-offline-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@ With these best practices in mind, create your target flexible server and then c
108108
* Additionally, if migrating non-table objects, be sure to use the same name for the target schema as is used on the source.
109109
* Configure the server parameters on the target flexible server as follows:
110110
* Set the TLS version and require_secure_transport server parameter to match the values on the source server.
111+
* Set the sql_mode server parameter to match the values on the source server.
111112
* Configure server parameters on the target server to match any non-default values used on the source server.
112113
* To ensure faster data loads when using DMS, configure the following server parameters as described.
113114
* max_allowed_packet – set to 1073741824 (i.e., 1 GB) to prevent any connection issues due to large rows.

articles/dms/tutorial-mysql-azure-single-to-flex-online-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -117,6 +117,7 @@ With these best practices in mind, create your target flexible server, and then
117117
* Additionally, if migrating non-table objects, be sure to use the same name for the target schema as is used on the source.
118118
* Configure the server parameters on the target flexible server as follows:
119119
* Set the TLS version and require_secure_transport server parameter to match the values on the source server.
120+
* Set the sql_mode server parameter to match the values on the source server.
120121
* Configure server parameters on the target server to match any non-default values used on the source server.
121122
* To ensure faster data loads when using DMS, configure the following server parameters as described.
122123
* max_allowed_packet – set to 1073741824 (i.e., 1 GB) to prevent any connection issues due to large rows.

0 commit comments

Comments
 (0)