Skip to content

Commit dc4f5af

Browse files
Merge branch 'master' into dbradish_MayMsCustomFix
2 parents bfead72 + 702de54 commit dc4f5af

File tree

401 files changed

+4428
-3817
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

401 files changed

+4428
-3817
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5240,6 +5240,11 @@
52405240
"redirect_url": "/azure/architecture/vdc/networking-virtual-datacenter",
52415241
"redirect_document_id": false
52425242
},
5243+
{
5244+
"source_path_from_root": "/articles/automation/how-to/remove-desired-state-configuration-package.md",
5245+
"redirect_url": "/azure/automation/state-configuration/remove-node-and-configuration-package",
5246+
"redirect_document_id": false
5247+
},
52435248
{
52445249
"source_path_from_root": "/articles/automation/automation-watchers-tutorial.md",
52455250
"redirect_url": "/azure/automation/automation-scenario-using-watcher-task",
@@ -13515,6 +13520,11 @@
1351513520
"redirect_url": "/azure/azure-toolkit-for-intelliJ",
1351613521
"redirect_document_id": false
1351713522
},
13523+
{
13524+
"source_path_from_root": "/articles/azure-vmware/reset-vsphere-credentials.md",
13525+
"redirect_url": "/azure/azure-vmware/rotate-cloudadmin-credentials",
13526+
"redirect_document_id": false
13527+
},
1351813528
{
1351913529
"source_path_from_root": "/articles/azure-vmware/set-up-backup-server-for-azure-vmware-solution.md",
1352013530
"redirect_url": "/azure/backup/backup-azure-microsoft-azure-backup",
@@ -64850,6 +64860,11 @@
6485064860
"redirect_url": "/azure/azure-monitor/alerts/tutorial-response",
6485164861
"redirect_document_id": false
6485264862
},
64863+
{
64864+
"source_path_from_root": "/articles/azure-monitor/alerts/tutorial-response.md",
64865+
"redirect_url": "/azure/azure-monitor/alerts/alerts-log",
64866+
"redirect_document_id": false
64867+
},
6485364868
{
6485464869
"source_path_from_root": "/articles/azure-monitor/samples/cli-samples.md",
6485564870
"redirect_url": "/azure/azure-monitor//cli-samples",

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/22/2021
12+
ms.date: 05/11/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -57,10 +57,10 @@ To enable self-service password reset for the sign-up or sign-in user flow:
5757
1. Select **User flows**.
5858
1. Select a sign-up or sign-in user flow (of type **Recommended**) that you want to customize.
5959
1. Under **Settings** in the left menu, select **Properties**.
60-
1. Under **Password complexity**, select **Self-service password reset**.
60+
1. Under **Password configuration**, select **Self-service password reset**.
6161
1. Select **Save**.
6262
1. Under **Customize** in the left menu, select **Page layouts**.
63-
1. In the **Page Layout Version**, choose **2.1.2 - Current** or above.
63+
1. In the **Page Layout Version**, choose **2.1.3** or above.
6464
1. Select **Save**.
6565

6666
::: zone-end

articles/active-directory-b2c/azure-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ The workbook will display reports in the form of a dashboard.
255255

256256
## Create alerts
257257

258-
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events are created, absence of an event, or a number of events are created within a particular time window. For example, alerts can be used to notify you when average number of sign-in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/tutorial-response.md).
258+
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events are created, absence of an event, or a number of events are created within a particular time window. For example, alerts can be used to notify you when average number of sign-in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
259259

260260

261261
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there is a 25% drop in the **Total Requests** compare to previous period. Alert will run every 5 minutes and look for the drop within last 24 hours windows. The alerts are created using Kusto query language.

articles/active-directory/app-provisioning/application-provisioning-log-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ AADProvisioningLogs
9191

9292
Azure Monitor lets you configure custom alerts so that you can get notified about key events related to Provisioning. For example, you might want to receive an alert on spikes in failures. Or perhaps spikes in disables or deletes. Another example of where you might want to be alerted is a lack of any provisioning, which indicates something is wrong.
9393

94-
To learn more about alerts, see [Respond to events with Azure Monitor Alerts](../../azure-monitor/alerts/tutorial-response.md).
94+
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-log.md).
9595

9696
Alert when there's a spike in failures. Replace the jobID with the jobID for your application.
9797

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,9 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 04/28/2021
11+
ms.date: 05/10/2021
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
14-
ms.custom: contperf-fy21q2
1514
---
1615
# Tutorial: Develop and plan provisioning for a SCIM endpoint
1716

@@ -78,7 +77,7 @@ To design your schema, follow these steps:
7877
|lastName|name.familyName|surName|
7978
|workMail|emails[type eq “work”].value|Mail|
8079
|manager|manager|manager|
81-
|tag|urn:ietf:params:scim:schemas:extension:2.0:CustomExtension:tag|extensionAttribute1|
80+
|tag|urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag|extensionAttribute1|
8281
|status|active|isSoftDeleted (computed value not stored on user)|
8382

8483
**Example list of required attributes**
@@ -98,7 +97,7 @@ To design your schema, follow these steps:
9897
"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User": {
9998
"Manager": "123456"
10099
},
101-
"urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:CustomAttribute:User": {
100+
"urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User": {
102101
"tag": "701984",
103102
},
104103
"meta": {

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ Administrators can assign a Conditional Access policy to the following cloud app
3535
- [Office 365](#office-365)
3636
- Azure Analysis Services
3737
- Azure DevOps
38+
- Azure Event Hubs
39+
- Azure Service Bus
3840
- [Azure SQL Database and Azure Synapse Analytics](../../azure-sql/database/conditional-access-configure.md)
3941
- Dynamics CRM Online
4042
- Microsoft Application Insights Analytics

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -82,14 +82,16 @@ If your app isn't registered in a tenant, you'll only see the option to verify a
8282

8383
1. Click the **Verify and save domain** button.
8484

85+
You're not required to maintain the resources that are used for verification after a domain has been verified. When the verification is finished, you can remove the hosted file.
86+
8587
### To select a verified domain
8688

87-
- If your tenant has verified domains, select one of the domains from the **Select a verified domain** dropdown.
89+
If your tenant has verified domains, select one of the domains from the **Select a verified domain** dropdown.
8890

89-
>[!Note]
90-
> The expected 'Content-Type' header that should be returned is `application/json`. You may get an error as mentioned below if you use anything else like `application/json; charset=utf-8`
91+
> [!NOTE]
92+
> The expected `Content-Type` header that should be returned is `application/json`. You may get an error as mentioned below if you use anything else, like `application/json; charset=utf-8`:
9193
>
92-
>``` "Verification of publisher domain failed. Error getting JSON file from https:///.well-known/microsoft-identity-association. The server returned an unexpected content type header value. " ```
94+
> `Verification of publisher domain failed. Error getting JSON file from https:///.well-known/microsoft-identity-association. The server returned an unexpected content type header value.`
9395
>
9496
9597
## Implications on the app consent prompt

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 05/07/2021
9+
ms.date: 05/10/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -50,8 +50,9 @@ The following Linux distributions are currently supported during the preview of
5050
The following Azure regions are currently supported during the preview of this feature:
5151

5252
- Azure Global
53-
- Azure Government
54-
- Azure China
53+
54+
> [!Note]
55+
> The preview of this feature will be supported in Azure Government and Azure China by June of 2021.
5556
5657
It's not supported to use this extension on Azure Kubernetes Service (AKS) clusters. For more information, see [Support policies for AKS](../../aks/support-policies.md).
5758

@@ -67,24 +68,24 @@ VM network configuration must permit outbound access to the following endpoints
6768

6869
For Azure Global
6970

70-
- https://packages.microsoft.com – For package installation and upgrades.
71-
- http://169.254.169.254 – Azure Instance Metadata Service endpoint.
72-
- https://login.microsoftonline.com – For PAM (pluggable authentication modules) based authentication flows.
73-
- https://pas.windows.net – For Azure RBAC flows.
71+
- `https://packages.microsoft.com` – For package installation and upgrades.
72+
- `http://169.254.169.254` – Azure Instance Metadata Service endpoint.
73+
- `https://login.microsoftonline.com` – For PAM (pluggable authentication modules) based authentication flows.
74+
- `https://pas.windows.net` – For Azure RBAC flows.
7475

7576
For Azure Government
7677

77-
- https://packages.microsoft.com – For package installation and upgrades.
78-
- http://169.254.169.254 – Azure Instance Metadata Service endpoint.
79-
- https://login.microsoftonline.us – For PAM (pluggable authentication modules) based authentication flows.
80-
- https://pasff.usgovcloudapi.net – For Azure RBAC flows.
78+
- `https://packages.microsoft.com` – For package installation and upgrades.
79+
- `http://169.254.169.254` – Azure Instance Metadata Service endpoint.
80+
- `https://login.microsoftonline.us` – For PAM (pluggable authentication modules) based authentication flows.
81+
- `https://pasff.usgovcloudapi.net` – For Azure RBAC flows.
8182

8283
For Azure China
8384

84-
- https://packages.microsoft.com – For package installation and upgrades.
85-
- http://169.254.169.254 – Azure Instance Metadata Service endpoint.
86-
- https://login.chinacloudapi.cn – For PAM (pluggable authentication modules) based authentication flows.
87-
- https://pas.chinacloudapi.cn – For Azure RBAC flows.
85+
- `https://packages.microsoft.com` – For package installation and upgrades.
86+
- `http://169.254.169.254` – Azure Instance Metadata Service endpoint.
87+
- `https://login.chinacloudapi.cn` – For PAM (pluggable authentication modules) based authentication flows.
88+
- `https://pas.chinacloudapi.cn` – For Azure RBAC flows.
8889

8990
### Virtual machine
9091

@@ -366,6 +367,9 @@ For customers who are using previous version of Azure AD login for Linux that wa
366367
--resource-group myResourceGroup \
367368
--vm-name myVM
368369
```
370+
## Using Azure Policy to ensure standards and assess compliance
371+
372+
Use Azure policy to ensure Azure AD login is enabled for your new and existing Linux virtual machines and assess compliance of your environment at scale on your Azure policy compliance dashboard. With this capability, you can use many levels of enforcement: you can flag new and existing Linux VMs within your environment that do not have Azure AD login enabled. You can also use Azure policy to deploy the Azure AD extension on new Linux VMs that do not have Azure AD login enabled, as well as remediate existing Linux VMs to the same standard. In addition to these capabilities, you can also use policy to detect and flag Linux VMs that have non-approved local accounts created on their machines. To learn more, review [Azure policy](https://www.aka.ms/AzurePolicy).
369373
370374
## Troubleshoot sign-in issues
371375
@@ -430,10 +434,6 @@ Solution 2: Perform these actions:
430434
431435
Virtual machine scale set VM connections may fail if the virtual machine scale set instances are running an old model. Upgrading virtual machine scale set instances to the latest model may resolve issues, especially if an upgrade has not been done since the Azure AD Login extension was installed. Upgrading an instance applies a standard virtual machine scale set configuration to the individual instance.
432436
433-
### Other limitations
434-
435-
Users that inherit access rights through nested groups or role assignments aren't currently supported. The user or group must be directly assigned the required role assignments. For example, the use of management groups or nested group role assignments won't grant the correct permissions to allow the user to sign in.
436-
437437
## Preview feedback
438438
439439
Share your feedback about this preview feature or report issues using it on the [Azure AD feedback forum](https://feedback.azure.com/forums/169401-azure-active-directory?category_id=166032).

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 07/20/2020
9+
ms.date: 05/10/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -27,7 +27,7 @@ There are many security benefits of using Azure AD based authentication to login
2727
- With Conditional Access, configure policies to require multi-factor authentication and other signals such as low user and sign in risk before you can RDP to Windows VMs.
2828
- Use Azure deploy and audit policies to require Azure AD login for Windows VMs and to flag use of no approved local account on the VMs.
2929
- Login to Windows VMs with Azure Active Directory also works for customers that use Federation Services.
30-
- Automate and scale Azure AD join with MDM auto enrollment with Intune of Azure Windows VMs that are part for your VDI deployments. MDM enrollment does not apply to Windows Server 2019 VM depolyments
30+
- Automate and scale Azure AD join with MDM auto enrollment with Intune of Azure Windows VMs that are part for your VDI deployments. Auto MDM enrollment requires Azure AD P1 license. Windows Server 2019 VMs do not support MDM enrollment.
3131

3232

3333
> [!NOTE]
@@ -58,24 +58,24 @@ This feature is now available in the following Azure clouds:
5858
To enable Azure AD authentication for your Windows VMs in Azure, you need to ensure your VMs network configuration permits outbound access to the following endpoints over TCP port 443:
5959

6060
For Azure Global
61-
- https://enterpriseregistration.windows.net For device registration.
62-
- http://169.254.169.254 For Azure Instance Metadata Service endpoint.
63-
- https://login.microsoftonline.com For authentication flows.
64-
- https://pas.windows.net For Azure RBAC flows.
61+
- `https://enterpriseregistration.windows.net` - For device registration.
62+
- `http://169.254.169.254` - Azure Instance Metadata Service endpoint.
63+
- `https://login.microsoftonline.com` - For authentication flows.
64+
- `https://pas.windows.net` - For Azure RBAC flows.
6565

6666

6767
For Azure Government
68-
- https://enterpriseregistration.microsoftonline.us For device registration.
69-
- http://169.254.169.254 For Azure Instance Metadata Service.
70-
- https://login.microsoftonline.us For authentication flows.
71-
- https://pasff.usgovcloudapi.net For Azure RBAC flows.
68+
- `https://enterpriseregistration.microsoftonline.us` - For device registration.
69+
- `http://169.254.169.254` - Azure Instance Metadata Service.
70+
- `https://login.microsoftonline.us` - For authentication flows.
71+
- `https://pasff.usgovcloudapi.net` - For Azure RBAC flows.
7272

7373

7474
For Azure China
75-
- https://enterpriseregistration.partner.microsoftonline.cn For device registration.
76-
- http://169.254.169.254 Azure Instance Metadata Service endpoint.
77-
- https://login.chinacloudapi.cn For authentication flows.
78-
- https://pas.chinacloudapi.cn For Azure RBAC flows.
75+
- `https://enterpriseregistration.partner.microsoftonline.cn` - For device registration.
76+
- `http://169.254.169.254` - Azure Instance Metadata Service endpoint.
77+
- `https://login.chinacloudapi.cn` - For authentication flows.
78+
- `https://pas.chinacloudapi.cn` - For Azure RBAC flows.
7979

8080

8181
## Enabling Azure AD login in for Windows VM in Azure
@@ -239,6 +239,10 @@ You are now signed in to the Windows Server 2019 Azure virtual machine with the
239239
> [!NOTE]
240240
> You can save the .RDP file locally on your computer to launch future remote desktop connections to your virtual machine instead of having to navigate to virtual machine overview page in the Azure portal and using the connect option.
241241
242+
## Using Azure Policy to ensure standards and assess compliance
243+
244+
Use Azure policy to ensure Azure AD login is enabled for your new and existing Windows virtual machines and assess compliance of your environment at scale on your Azure policy compliance dashboard. With this capability, you can use many levels of enforcement: you can flag new and existing Windows VMs within your environment that do not have Azure AD login enabled. You can also use Azure policy to deploy the Azure AD extension on new Windows VMs that do not have Azure AD login enabled, as well as remediate existing Windows VMs to the same standard. In addition to these capabilities, you can also use policy to detect and flag Windows VMs that have non-approved local accounts created on their machines. To learn more, review [Azure policy](https://www.aka.ms/AzurePolicy).
245+
242246
## Troubleshoot
243247

244248
### Troubleshoot deployment issues

articles/active-directory/external-identities/external-identities-pricing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 09/21/2020
9+
ms.date: 05/05/2021
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -35,8 +35,8 @@ To take advantage of MAU billing, your Azure AD tenant must be linked to an Azur
3535
## About monthly active users (MAU) billing
3636

3737
In your Azure AD tenant, guest user collaboration usage is billed based on the count of unique guest users with authentication activity within a calendar month. This model replaces the 1:5 ratio billing model, which allowed up to five guest users for each Azure AD Premium license in your tenant. When your tenant is linked to a subscription and you use External Identities features to collaborate with guest users, you'll be automatically billed using the MAU-based billing model.
38-
39-
The pricing tier that applies to your guest users is based on the highest pricing tier assigned to your Azure AD tenant. For example, if the highest pricing tier in your tenant is Azure AD Premium P1, the Premium P1 pricing tier also applies to your guest users. If the highest pricing is Azure AD Free, you'll be asked to upgrade to a premium pricing tier when you try to use premium features for guest users.
38+
39+
The pricing tier that applies to your guest users is based on the highest pricing tier assigned to your Azure AD tenant. For more information, see [Azure Active Directory External Identities Pricing](https://azure.microsoft.com/en-us/pricing/details/active-directory/external-identities/).
4040

4141
## Link your Azure AD tenant to a subscription
4242

0 commit comments

Comments
 (0)