Skip to content

Commit ddfd490

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-msix-glossary
2 parents 86f6283 + acff1f6 commit ddfd490

File tree

380 files changed

+5219
-2203
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

380 files changed

+5219
-2203
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17508,6 +17508,11 @@
1750817508
"redirect_url": "/azure/virtual-wan/scenario-route-between-vnets-firewall",
1750917509
"redirect_document_id": false
1751017510
},
17511+
{
17512+
"source_path_from_root": "/articles/bastion/connect-native-client-windows.md",
17513+
"redirect_url": "/azure/bastion/native-client",
17514+
"redirect_document_id": false
17515+
},
1751117516
{
1751217517
"source_path_from_root": "/articles/virtual-wan/high-availability-vpn-client.md",
1751317518
"redirect_url": "/azure/virtual-wan/global-hub-profile",

articles/active-directory-b2c/partner-xid.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,10 @@ Get the custom policy starter packs from GitHub, then update the XML files in th
122122
<Domain>X-ID</Domain>
123123
<DisplayName>X-ID</DisplayName>
124124
<TechnicalProfiles>
125-
<TechnicalProfile Id="X-ID-Oauth2">
125+
<TechnicalProfile Id="X-ID-OIDC">
126126
<DisplayName>X-ID</DisplayName>
127127
<Description>Login with your X-ID account</Description>
128-
<Protocol Name="OAuth2" />
128+
<Protocol Name="OpenIdConnect" />
129129
<Metadata>
130130
<Item Key="METADATA">https://oidc-uat.x-id.io/.well-known/openid-configuration</Item>
131131
<!-- Update the Client ID below to the X-ID Application ID -->
@@ -227,7 +227,7 @@ Add the new identity provider to the user journey.
227227
3. Set the value of **TargetClaimsExchangeId** to a friendly name.
228228
4. Add a **ClaimsExchange** element.
229229
5. Set the **ID** to the value of the target claims exchange ID. This change links the xID button to `X-IDExchange` action.
230-
6. Update the **TechnicalProfileReferenceId** value to the technical profile ID you created (`X-ID-Oauth2`).
230+
6. Update the **TechnicalProfileReferenceId** value to the technical profile ID you created (`X-ID-OIDC`).
231231
7. Add an Orchestration step to call xID UserInfo endpoint to return claims about the authenticated user `X-ID-Userdata`.
232232

233233
The following XML demonstrates the user journey orchestration with xID identity provider.
@@ -245,7 +245,7 @@ The following XML demonstrates the user journey orchestration with xID identity
245245

246246
<OrchestrationStep Order="2" Type="ClaimsExchange">
247247
<ClaimsExchanges>
248-
<ClaimsExchange Id="X-IDExchange" TechnicalProfileReferenceId="X-ID-Oauth2" />
248+
<ClaimsExchange Id="X-IDExchange" TechnicalProfileReferenceId="X-ID-OIDC" />
249249
</ClaimsExchanges>
250250
</OrchestrationStep>
251251

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
- name: Permissions Management
1+
- name: Microsoft Entra Permissions Management
22
href: index.yml
33
- name: Overview
44
expanded: true
55
items:
6-
- name: What's Permissions Management?
6+
- name: What's Microsoft Entra Permissions Management?
77
href: overview.md
88
- name: How-to guides
99
expanded: true

articles/active-directory/cloud-infrastructure-entitlement-management/index.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
### YamlMime:Landing
22

3-
title: Permissions Management
4-
summary: Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities (users and workloads), actions, and resources across cloud infrastructures. It detects, right-sizes, and monitors unused and excessive permissions and enables Zero Trust security through least privilege access in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
3+
title: Microsoft Entra Permissions Management
4+
summary: Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities (users and workloads), actions, and resources across cloud infrastructures. It detects, right-sizes, and monitors unused and excessive permissions and enables Zero Trust security through least privilege access in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
55

66
metadata:
7-
title: Permissions Management
7+
title: Microsoft Entra Permissions Management
88
description: Learn how to use Permissions Management and Cloud Infrastructure Entitlement Management (CIEM)
99
services: active-directory
1010
author: jenniferf-skc
@@ -13,7 +13,7 @@ metadata:
1313
ms.subservice: ciem
1414
ms.workload: identity
1515
ms.topic: landing-page
16-
ms.date: 03/09/2022
16+
ms.date: 06/16/2023
1717
ms.author: jfields
1818

1919

@@ -24,7 +24,7 @@ landingContent:
2424
# Cards and links should be based on top customer tasks or top subjects
2525
# Start card title with a verb
2626
# Card
27-
- title: What's Permissions Management?
27+
- title: What's Microsoft Entra Permissions Management?
2828
linkLists:
2929
- linkListType: overview
3030
links:

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/24/2023
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

15-
# Enable Permissions Management in your organization
15+
# Enable Microsoft Entra Permissions Management in your organization
1616

17-
This article describes how to enable Permissions Management in your organization. Once you've enabled Permissions Management, you can connect it to your Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) platforms.
17+
This article describes how to enable Microsoft Entra Permissions Management in your organization. Once you've enabled Permissions Management, you can connect it to your Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) platforms.
1818

1919
> [!NOTE]
2020
> To complete this task, you must have *Microsoft Entra Permissions Management Administrator* permissions. You can't enable Permissions Management as a user from another tenant who has signed in via B2B or via Azure Lighthouse.

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: overview
11-
ms.date: 04/20/2022
11+
ms.date: 06/16/2023
1212
ms.author: jfields
1313
---
1414

15-
# What's Permissions Management?
15+
# What's Microsoft Entra Permissions Management?
1616

1717
## Overview
1818

19-
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
19+
Microsoft Entra Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
2020

2121
Permissions Management detects, automatically right-sizes, and continuously monitors unused and excessive permissions.
2222

@@ -70,5 +70,6 @@ Once your organization has explored and implemented the discover, remediation an
7070

7171
## Next steps
7272

73-
- For information on how to onboard Permissions Management for your organization, see [Enable Permissions Management in your organization](onboard-enable-tenant.md).
73+
- Deepen your learning with the [Introduction to Microsoft Entra Permissions Management](https://go.microsoft.com/fwlink/?linkid=2240016) learn module.
74+
- Sign up for a [45-day free trial](https://aka.ms/TryPermissionsManagement) of Permissions Management.
7475
- For a list of frequently asked questions (FAQs) about Permissions Management, see [FAQs](faqs.md).

articles/active-directory/conditional-access/concept-token-protection.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ This preview supports the following configurations:
5050
- The following Windows client devices aren't supported:
5151
- Windows Server
5252
- Surface Hub
53+
- Windows-based Microsoft Teams Rooms (MTR) systems
5354

5455
## Deployment
5556

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -267,7 +267,7 @@ To connect to the remote computer:
267267
> [!IMPORTANT]
268268
> Remote connection to VMs that are joined to Azure AD is allowed only from Windows 10 or later PCs that are either Azure AD registered (minimum required build is 20H1) or Azure AD joined or hybrid Azure AD joined to the *same* directory as the VM. Additionally, to RDP by using Azure AD credentials, users must belong to one of the two Azure roles, Virtual Machine Administrator Login or Virtual Machine User Login.
269269
>
270-
> If you're using an Azure AD-registered Windows 10 or later PC, you must enter credentials in the `AzureAD\UPN` format (for example, `AzureAD\[email protected]`). At this time, you can use Azure Bastion to log in with Azure AD authentication [via the Azure CLI and the native RDP client mstsc](../../bastion/connect-native-client-windows.md).
270+
> If you're using an Azure AD-registered Windows 10 or later PC, you must enter credentials in the `AzureAD\UPN` format (for example, `AzureAD\[email protected]`). At this time, you can use Azure Bastion to log in with Azure AD authentication [via the Azure CLI and the native RDP client mstsc](../../bastion/native-client.md).
271271
272272

273273
To log in to your Windows Server 2019 virtual machine by using Azure AD:
19.4 KB
Loading
-116 KB
Loading

0 commit comments

Comments
 (0)