Skip to content

Commit e0f12e4

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 16b671b + 733d131 commit e0f12e4

File tree

317 files changed

+1093
-789
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

317 files changed

+1093
-789
lines changed

articles/active-directory-b2c/extensions-app.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
3636
> [!NOTE]
3737
> An application can only be restored if it has been deleted within the last 30 days. If it has been more than 30 days, data will be permanently lost. For more assistance, file a support ticket.
3838
39+
<!--Hide portal steps until SP bug is fixed
3940
### Recover the extensions app using the Azure portal
4041
4142
1. Sign in to your Azure AD B2C tenant.
@@ -44,18 +45,18 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
4445
1. Select **Restore app registration**.
4546
4647
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
47-
48+
-->
4849
### Recover the extensions app using Microsoft Graph
49-
To restore the app using Microsoft Graph, you must restore both the application and the service principal.
50+
To restore the app using Microsoft Graph, you must restore both the application object and the service principal. For more information, see the [Restore deleted item](/graph/api/directory-deleteditems-restore) API.
5051

51-
To restore the application:
52+
To restore the application object:
5253
1. Browse to [https://developer.microsoft.com/en-us/graph/graph-explorer](https://developer.microsoft.com/en-us/graph/graph-explorer).
5354
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
5455
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.application?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
5556
1. Find the application in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
5657
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.]
5758

58-
To restore the service principal:
59+
To restore the service principal object:
5960
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.servicePrincipal`. This operation will list all of the service principals that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
6061
1. Find the service principal in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
6162
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 07/26/2022
4+
ms.date: 08/08/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 56 additions & 63 deletions
Large diffs are not rendered by default.

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ All policies are enforced in two phases:
3636
- Use the session details gathered in phase 1 to identify any requirements that haven't been met.
3737
- If there's a policy that is configured to block access, with the block grant control, enforcement will stop here and the user will be blocked.
3838
- The user will be prompted to complete more grant control requirements that weren't satisfied during phase 1 in the following order, until policy is satisfied:
39-
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multifactor-authentication)
39+
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multi-factor-authentication)
4040
- [Device to be marked as compliant](./concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant)
4141
- [Hybrid Azure AD joined device](./concept-conditional-access-grant.md#require-hybrid-azure-ad-joined-device)
4242
- [Approved client app](./concept-conditional-access-grant.md#require-approved-client-app)

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ The public preview supports the following scenarios:
8181

8282
- Require user reauthentication during [Intune device enrollment](/mem/intune/fundamentals/deployment-guide-enrollment), regardless of their current MFA status.
8383
- Require user reauthentication for risky users with the [require password change](concept-conditional-access-grant.md#require-password-change) grant control.
84-
- Require user reauthentication for risky sign-ins with the [require multifactor authentication](concept-conditional-access-grant.md#require-multifactor-authentication) grant control.
84+
- Require user reauthentication for risky sign-ins with the [require multifactor authentication](concept-conditional-access-grant.md#require-multi-factor-authentication) grant control.
8585

8686
When administrators select **Every time**, it will require full reauthentication when the session is evaluated.
8787

articles/active-directory/devices/concept-azure-ad-join-hybrid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Hybrid Azure AD joined devices require network line of sight to your on-premises
2727
| **Primary audience** | Suitable for hybrid organizations with existing on-premises AD infrastructure |
2828
| | Applicable to all users in an organization |
2929
| **Device ownership** | Organization |
30-
| **Operating Systems** | Windows 11, Windows 10 or 8.1 |
30+
| **Operating Systems** | Windows 11, Windows 10 or 8.1 except Home editions |
3131
| | Windows Server 2008/R2, 2012/R2, 2016, 2019 and 2022 |
3232
| **Provisioning** | Windows 11, Windows 10, Windows Server 2016/2019/2022 |
3333
| | Domain join by IT and autojoin via Azure AD Connect or ADFS config |

articles/active-directory/governance/entitlement-management-access-package-edit.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Hide or delete access package in entitlement management - Azure AD
33
description: Learn how to hide or delete an access package in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: owinfreyatl
6+
author: owinfreyATL
77
manager: karenhoran
88
editor:
99
ms.service: active-directory
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222
---
2323
# Hide or delete an access package in Azure AD entitlement management
2424

25-
Access packages are discoverable by default. This means that if a policy allows a user to request the access package, they will automatically see the access package listed in their My Access portal. However, you can change the **Hidden** setting so that the access package is not listed in user's My Access portal.
25+
When you create access packages, they're discoverable by default. This means that if a policy allows a user to request the access package, they'll automatically see the access package listed in their My Access portal. However, you can change the **Hidden** setting so that the access package isn't listed in the user's My Access portal.
2626

2727
This article describes how to hide or delete an access package.
2828

@@ -32,33 +32,33 @@ Follow these steps to change the **Hidden** setting for an access package.
3232

3333
**Prerequisite role:** Global administrator, Identity Governance administrator, User administrator, Catalog owner, or Access package manager
3434

35-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
35+
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
3636

37-
1. In the left menu, click **Access packages** and then open the access package.
37+
1. In the left menu, select **Access packages** and then open the access package.
3838

39-
1. On the Overview page, click **Edit**.
39+
1. On the Overview page, select **Edit**.
4040

4141
1. Set the **Hidden** setting.
4242

4343
If set to **No**, the access package will be listed in the user's My Access portal.
4444

45-
If set to **Yes**, the access package will not be listed in the user's My Access portal. The only way a user can view the access package is if they have the direct **My Access portal link** to the access package. For more information, see [Share link to request an access package](entitlement-management-access-package-settings.md).
45+
If set to **Yes**, the access package won't be listed in the user's My Access portal. The only way a user can view the access package is if they have the direct **My Access portal link** to the access package. For more information, see [Share link to request an access package](entitlement-management-access-package-settings.md).
4646

4747
## Delete an access package
4848

4949
An access package can only be deleted if it has no active user assignments. Follow these steps to delete an access package.
5050

5151
**Prerequisite role:** Global administrator, User administrator, Catalog owner, or Access package manager
5252

53-
1. In the Azure portal, click **Azure Active Directory** and then click **Identity Governance**.
53+
1. In the Azure portal, select **Azure Active Directory** and then select **Identity Governance**.
5454

55-
1. In the left menu, click **Access packages** and then open the access package.
55+
1. In the left menu, select **Access packages** and then open the access package.
5656

57-
1. In the left menu, click **Assignments** and remove access for all users.
57+
1. In the left menu, select **Assignments** and remove access for all users.
5858

59-
1. In the left menu, click **Overview** and then click **Delete**.
59+
1. In the left menu, select **Overview** and then select **Delete**.
6060

61-
1. In the delete message that appears, click **Yes**.
61+
1. In the delete message that appears, select **Yes**.
6262

6363
## Next steps
6464

articles/active-directory/governance/entitlement-management-access-package-first.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Tutorial - Manage access to resources in Azure AD entitlement management
33
description: Step-by-step tutorial for how to create your first access package using the Azure portal in Azure Active Directory entitlement management.
44
services: active-directory
55
documentationCenter: ''
6-
author: owinfreyatl
6+
author: owinfreyATL
77
manager: karenhoran
88
editor: markwahl-msft
99
ms.service: active-directory

0 commit comments

Comments
 (0)