Skip to content

Commit e1d040a

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-synapse-current
2 parents 2efd3ca + 4062c59 commit e1d040a

File tree

197 files changed

+3075
-2094
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

197 files changed

+3075
-2094
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39856,6 +39856,11 @@
3985639856
"redirect_url": "/azure/dev-spaces/",
3985739857
"redirect_document_id": false
3985839858
},
39859+
{
39860+
"source_path": "articles/dev-spaces/how-to/helm-3.md",
39861+
"redirect_url": "/azure/dev-spaces/",
39862+
"redirect_document_id": false
39863+
},
3985939864
{
3986039865
"source_path": "articles/monitoring/monitoring-overview.md",
3986139866
"redirect_url": "/azure/azure-monitor/overview",
@@ -48505,6 +48510,11 @@
4850548510
"redirect_url": "/azure/cognitive-services/form-recognizer/quickstarts/python-receipts",
4850648511
"redirect_document_id": false
4850748512
},
48513+
{
48514+
"source_path": "articles/cognitive-services/form-recognizer/quickstarts/dotnet-sdk.md",
48515+
"redirect_url": "/azure/cognitive-services/form-recognizer/quickstarts/client-library?pivots=programming-language-csharp",
48516+
"redirect_document_id": false
48517+
},
4850848518
{
4850948519
"source_path": "articles/cognitive-services/Content-Moderator/Review-Tool-User-Guide/Upload-Images.md",
4851048520
"redirect_url": "/azure/cognitive-services/content-moderator",
@@ -52499,6 +52509,11 @@
5249952509
"redirect_url": "/azure/batch/batch-apis-tools",
5250052510
"redirect_document_id": false
5250152511
},
52512+
{
52513+
"source_path": "articles/batch/batch-integration-policies.md",
52514+
"redirect_url": "/azure/batch/policy-samples",
52515+
"redirect_document_id": false
52516+
},
5250252517
{
5250352518
"source_path": "articles/virtual-machines/troubleshooting/troubleshoot-vm-unresponsive-group-policy-local-users.md",
5250452519
"redirect_url": "/azure/virtual-machines/troubleshooting/unresponsive-vm-apply-group-policy",

articles/active-directory-b2c/configure-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ You can configure the token lifetime on any user flow.
5050

5151
## Next steps
5252

53-
Learn more about how to [use access tokens](access-tokens.md).
53+
Learn more about how to [request access tokens](access-tokens.md).
5454

5555

5656

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -744,6 +744,17 @@ TLS 1.2 Cipher Suites minimum bar:
744744
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
745745
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
746746

747+
### IP Ranges
748+
The Azure AD Provisionong service currently operates under the following IP ranges.
749+
750+
13.86.239.205; 52.188.178.195; 13.86.61.156; 40.67.254.206; 51.105.237.71; 20.44.38.166; 40.81.88.68; 52.184.94.250;
751+
20.43.180.59; 20.193.16.105; 20.40.167.232; 13.86.3.57; 52.188.72.113; 13.88.140.233; 52.142.121.156; 51.124.0.213;
752+
40.81.92.36; 20.44.39.175; 20.189.114.130; 20.44.193.163; 20.193.23.17; 20.40.173.237; 13.86.138.128; 52.142.29.23;
753+
13.86.2.238; 40.127.246.167; 51.136.72.4; 20.44.39.244; 40.81.92.186; 20.189.114.131; 20.44.193.210; 20.193.2.21; 20.40.174.46;
754+
13.86.219.18; 40.71.13.10; 20.44.16.38; 13.89.174.16; 13.69.66.182; 13.69.229.118; 104.211.147.176; 40.78.195.176;
755+
13.67.9.240; 13.75.38.48; 13.70.73.48; 13.77.52.176;
756+
757+
747758

748759
## Step 3: Build a SCIM endpoint
749760

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Note: For users who have [Password hash synchronization (PHS)](https://docs.micr
106106

107107
You can help users register quickly by deploying SSPR alongside another popular application or service in the organization. This action will generate a large volume of sign-ins and will drive registration.
108108

109-
Before deploying SSPR, you may opt to determine the number and the average cost of each password reset call. YOU can use this data post deployment to show the value SSPR is bringing to the organization.
109+
Before deploying SSPR, you may opt to determine the number and the average cost of each password reset call. You can use this data post deployment to show the value SSPR is bringing to the organization.
110110

111111
#### Enable combined registration for SSPR and MFA
112112

@@ -344,4 +344,4 @@ Audit logs for registration and password reset are available for 30 days. If sec
344344

345345
* [Consider implementing Azure AD password protection](https://docs.microsoft.com/azure/active-directory/authentication/concept-password-ban-bad)
346346

347-
* [Consider implementing Azure AD Smart Lockout](https://docs.microsoft.com/azure/active-directory/authentication/howto-password-smart-lockout)
347+
* [Consider implementing Azure AD Smart Lockout](https://docs.microsoft.com/azure/active-directory/authentication/howto-password-smart-lockout)

articles/active-directory/conditional-access/howto-conditional-access-insights-reporting.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,19 @@ You can also investigate the sign-ins of a specific user by searching for sign-i
9696

9797
## Troubleshooting
9898

99+
### Why are queries failing due to a permissions error?
100+
101+
In order to access the workbook, you need the proper Azure AD permissions as well as Log Analytics workspace permissions. To test whether you have the proper workspace permissions by running a sample log analytics query:
102+
103+
1. Sign in to the **Azure portal**.
104+
1. Browse to **Azure Active Directory** > **Logs**.
105+
1. Type `SigninLogs` into the query box and select **Run**.
106+
1. If the query does not return any results, your workspace may not have been configured correctly.
107+
108+
![Troubleshoot failing queries](./media/howto-conditional-access-insights-reporting/query-troubleshoot-sign-in-logs.png)
109+
110+
For more information about how to stream Azure AD sign-in logs to a Log Analytics workspace, see the article [Integrate Azure AD logs with Azure Monitor logs](../reports-monitoring/howto-integrate-activity-logs-with-log-analytics.md).
111+
99112
### Why is the workbook taking a long time to load?
100113

101114
Depending on the time range selected and the size of your tenant, the workbook may be evaluating an extraordinarily large number of sign-in events. For large tenants, the volume of sign-ins may exceed the query capacity of Log Analytics. Try shortening the time range to 4 hours to see if the workbook loads.

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The following steps will help create a Conditional Access policy to require All
5050
1. Select **Done**.
5151
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
5252
1. Under **Exclude**, select any applications that do not require multi-factor authentication.
53-
1. Under **Conditions** > **Client apps (Preview)**, set **Configure** to **Yes**, and select **Done**.
53+
1. Under **Conditions** > **Client apps (Preview)**, set **Configure** to **Yes**. Under **Select the client apps this policy will apply to** leave all defaults selected and select **Done**.
5454
1. Under **Access controls** > **Grant**, select **Grant access**, **Require multi-factor authentication**, and select **Select**.
5555
1. Confirm your settings and set **Enable policy** to **On**.
5656
1. Select **Create** to create to enable your policy.
Loading

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,6 @@ These claims are always included in v1.0 Azure AD tokens, but not included in v2
8181
| `pwd_exp` | Password Expiration Time | The datetime at which the password expires. | |
8282
| `pwd_url` | Change Password URL | A URL that the user can visit to change their password. | |
8383
| `in_corp` | Inside Corporate Network | Signals if the client is logging in from the corporate network. If they're not, the claim isn't included. | Based off of the [trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) settings in MFA. |
84-
| `nickname` | Nickname | An additional name for the user. The nickname is separate from first or last name. Requires the `profile` scope.|
8584
| `family_name` | Last Name | Provides the last name, surname, or family name of the user as defined in the user object. <br>"family_name":"Miller" | Supported in MSA and Azure AD. Requires the `profile` scope. |
8685
| `given_name` | First name | Provides the first or "given" name of the user, as set on the user object.<br>"given_name": "Frank" | Supported in MSA and Azure AD . Requires the `profile` scope. |
8786
| `upn` | User Principal Name | An identifer for the user that can be used with the username_hint parameter. Not a durable identifier for the user and should not be used to key data. | See [additional properties](#additional-properties-of-optional-claims) below for configuration of the claim. Requires the `profile` scope.|

articles/active-directory/users-groups-roles/roles-assign-graph.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Body
3939
{
4040
"principalId":"ab2e1023-bddc-4038-9ac1-ad4843e7e539",
4141
"roleDefinitionId":"194ae4cb-b126-40b2-bd5b-6091b380977d",
42-
"resourceScopes":["/"]
42+
"resourceScopes":"/"
4343
}
4444
```
4545

@@ -63,7 +63,7 @@ Body
6363
{
6464
"principalId":" 2142743c-a5b3-4983-8486-4532ccba12869",
6565
"roleDefinitionId":"194ae4cb-b126-40b2-bd5b-6091b380977d",
66-
"resourceScopes":["/"]
66+
"resourceScopes":"/"
6767
}
6868
```
6969

@@ -90,7 +90,7 @@ Body
9090
{
9191
"principalId":"ab2e1023-bddc-4038-9ac1-ad4843e7e539",
9292
"roleDefinitionId":"194ae4cb-b126-40b2-bd5b-6091b380977d",
93-
"resourceScopes":["/ab2e1023-bddc-4038-9ac1-ad4843e7e539"]
93+
"resourceScopes":"/ab2e1023-bddc-4038-9ac1-ad4843e7e539"
9494
}
9595
```
9696

@@ -136,13 +136,13 @@ HTTP/1.1 200 OK
136136
"id":"mhxJMipY4UanIzy2yE-r7JIiSDKQoTVJrLE9etXyrY0-1"
137137
"principalId":"ab2e1023-bddc-4038-9ac1-ad4843e7e539",
138138
"roleDefinitionId":"10dae51f-b6af-4016-8d66-8c2a99b929b3",
139-
"resourceScopes":["/"]
139+
"resourceScopes":"/"
140140
} ,
141141
{
142142
"id":"CtRxNqwabEKgwaOCHr2CGJIiSDKQoTVJrLE9etXyrY0-1"
143143
"principalId":"ab2e1023-bddc-4038-9ac1-ad4843e7e539",
144144
"roleDefinitionId":"3671d40a-1aac-426c-a0c1-a3821ebd8218",
145-
"resourceScopes":["/"]
145+
"resourceScopes":"/"
146146
}
147147
```
148148

@@ -162,7 +162,7 @@ HTTP/1.1 200 OK
162162
"id":"CtRxNqwabEKgwaOCHr2CGJIiSDKQoTVJrLE9etXyrY0-1"
163163
"principalId":"ab2e1023-bddc-4038-9ac1-ad4843e7e539",
164164
"roleDefinitionId":"3671d40a-1aac-426c-a0c1-a3821ebd8218",
165-
"resourceScopes":["/"]
165+
"resourceScopes":"/"
166166
}
167167
```
168168

@@ -182,7 +182,7 @@ HTTP/1.1 200 OK
182182
"id":"mhxJMipY4UanIzy2yE-r7JIiSDKQoTVJrLE9etXyrY0-1",
183183
"principalId":"ab2e1023-bddc-4038-9ac1-ad4843e7e539",
184184
"roleDefinitionId":"10dae51f-b6af-4016-8d66-8c2a99b929b3",
185-
"resourceScopes":["/"]
185+
"resourceScopes":"/"
186186
}
187187
```
188188

articles/aks/limit-egress-traffic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -145,8 +145,8 @@ The following FQDN / application rules are required for AKS clusters that have t
145145
| FQDN | Port | Use |
146146
|-----------------------------------------|-----------|----------|
147147
| cloudflare.docker.com | HTTPS:443 | This address is used to pull linux alpine and other Azure Dev Spaces images |
148-
| gcr.io | HTTP:443 | This address is used to pull helm/tiller images |
149-
| storage.googleapis.com | HTTP:443 | This address is used to pull helm/tiller images |
148+
| gcr.io | HTTPS:443 | This address is used to pull helm/tiller images |
149+
| storage.googleapis.com | HTTPS:443 | This address is used to pull helm/tiller images |
150150
| azds-\<guid\>.\<location\>.azds.io | HTTPS:443 | To communicate with Azure Dev Spaces backend services for your controller. The exact FQDN can be found in the "dataplaneFqdn" in %USERPROFILE%\.azds\settings.json |
151151

152152
## Required addresses and ports for AKS clusters with Azure Policy (in public preview) enabled

0 commit comments

Comments
 (0)