Skip to content

Commit e33cede

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into dpcustom
2 parents ddda926 + d6c6e19 commit e33cede

File tree

1,794 files changed

+14834
-5679
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,794 files changed

+14834
-5679
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1024,7 +1024,7 @@
10241024
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json",
10251025
".openpublishing.redirection.virtual-desktop.json",
10261026
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
1027-
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services-renamed.json",
1027+
"articles/applied-ai-services/.openpublishing.archived.json",
10281028
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json"
10291029
]
10301030
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-frequently-asked-questions.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/faqs-general",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-iot/organizations/appliance-catalog/appliance-catalog-overview.md",
510
"redirect_url": "/azure/defender-for-iot/organizations/appliance-catalog/index",

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4573,6 +4573,11 @@
45734573
"redirect_url": "/azure/security/benchmarks",
45744574
"redirect_document_id": false
45754575
},
4576+
{
4577+
"source_path_from_root": "/articles/azure-resource-manager/bicep/linter-rule-use-protectedsettings-for-commandtoexecute-secrets.md",
4578+
"redirect_url": "/azure/azure-resource-manager/bicep/linter-rule-protect-commandtoexecute-secrets",
4579+
"redirect_document_id": false
4580+
},
45764581
{
45774582
"source_path_from_root": "/articles/azure-resource-manager/templates/view-resources.md",
45784583
"redirect_url": "/azure/azure-resource-manager/templates/export-template-portal",
@@ -5783,6 +5788,11 @@
57835788
"redirect_url": "/azure/automation/manage-run-as-account",
57845789
"redirect_document_id": false
57855790
},
5791+
{
5792+
"source_path_from_root": "/articles/automation/quickstarts/create-account-portal.md",
5793+
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
5794+
"redirect_document_id": false
5795+
},
57865796
{
57875797
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
57885798
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",
@@ -18298,6 +18308,16 @@
1829818308
"redirect_url": "/connectors/bingsearch",
1829918309
"redirect_document_id": false
1830018310
},
18311+
{
18312+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18313+
"redirect_url": "/connectors/twilio",
18314+
"redirect_document_id": false
18315+
},
18316+
{
18317+
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",
18318+
"redirect_url": "/azure/logic-apps/update-consumption-workflow-schema",
18319+
"redirect_document_id": false
18320+
},
1830118321
{
1830218322
"source_path_from_root": "/articles/logic-apps/logic-apps-scenario-error-and-exception-handling.md",
1830318323
"redirect_url": "/azure/logic-apps/logic-apps-exception-handling",

articles/active-directory-b2c/string-transformations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -864,7 +864,7 @@ Checks whether the provided phone number is valid, based on phone number regular
864864
</InputClaims>
865865
<InputParameters>
866866
<InputParameter Id="matchTo" DataType="string" Value="^[0-9]{4,16}$" />
867-
<InputParameter Id="outputClaimIfMatched" DataType="string" Value="Phone" />
867+
<InputParameter Id="outputClaimIfMatched" DataType="string" Value="iPhone" />
868868
</InputParameters>
869869
<OutputClaims>
870870
<OutputClaim ClaimTypeReferenceId="validationResult" TransformationClaimType="outputClaim" />

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/07/2022
11+
ms.date: 08/15/2022
1212
ms.author: justinha
1313
ms.custom: devx-track-azurepowershell
1414

@@ -172,9 +172,15 @@ Before you begin the migration process, complete the following initial checks an
172172

173173
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
174174

175-
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain. To view the ports required, see [Network security groups and required ports][network-ports].
175+
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain.
176176

177-
If you use secure LDAP, add a rule to the network security group to allow incoming traffic for *TCP* port *636*. For more information, see [Lock down secure LDAP access over the internet](tutorial-configure-ldaps.md#lock-down-secure-ldap-access-over-the-internet)
177+
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
178+
179+
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
180+
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
181+
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
182+
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
183+
| 636 | TCP | AzureActiveDirectoryDomainServices | Inbound | Allow | Optional | Secure LDAP. |
178184

179185
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
180186

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/08/2022
4+
ms.date: 08/16/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,6 @@ The Azure AD provisioning service includes a feature to help avoid accidental de
2020
The feature lets you specify a deletion threshold, above which an admin
2121
needs to explicitly choose to allow the deletions to be processed.
2222

23-
> [!NOTE]
24-
> Accidental deletions are not supported for our Workday / SuccessFactors integrations. It is also not supported for changes in scoping (e.g. changing a scoping filter or changing from "sync all users and groups" to "sync assigned users and groups"). Until the accidental deletions prevention feature is fully released, you'll need to access the Azure portal using this URL: https://aka.ms/AccidentalDeletionsPreview
25-
26-
2723
## Configure accidental deletion prevention
2824
To enable accidental deletion prevention:
2925
1. In the Azure portal, select **Azure Active Directory**.
@@ -35,11 +31,6 @@ threshold. Also, be sure the notification email address is completed. If the del
3531

3632
When the deletion threshold is met, the job will go into quarantine and a notification email will be sent. The quarantined job can then be allowed or rejected. To learn more about quarantine behavior, see [Application provisioning in quarantine status](application-provisioning-quarantine-status.md).
3733

38-
## Known limitations
39-
There are two key limitations to be aware of and are actively working to address:
40-
- HR-driven provisioning from Workday and SuccessFactors don't support the accidental deletions feature.
41-
- Changes to your provisioning configuration (e.g. changing scoping) isn't supported by the accidental deletions feature.
42-
4334
## Recovering from an accidental deletion
4435
If you encounter an accidental deletion you'll see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information.**.
4536

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ In the current preview state, the following limitations apply to email as an alt
5656
* On some Microsoft sites and apps, such as Microsoft Office, the *Account Manager* control typically displayed in the upper right may display the user's UPN instead of the non-UPN email used to sign in.
5757

5858
* **Unsupported flows** - Some flows are currently not compatible with non-UPN emails, such as the following:
59-
* Identity Protection doesn't match non-UPN emails with *Leaked Credentials* risk detection. This risk detection uses the UPN to match credentials that have been leaked. For more information, see [Azure AD Identity Protection risk detection and remediation][identity-protection].
59+
* Identity Protection doesn't match non-UPN emails with *Leaked Credentials* risk detection. This risk detection uses the UPN to match credentials that have been leaked. For more information, see [How To: Investigate risk](../identity-protection/howto-identity-protection-investigate-risk.md).
6060
* When a user is signed-in with a non-UPN email, they cannot change their password. Azure AD self-service password reset (SSPR) should work as expected. During SSPR, the user may see their UPN if they verify their identity using a non-UPN email.
6161

6262
* **Unsupported scenarios** - The following scenarios are not supported. Sign-in with non-UPN email for:
@@ -113,7 +113,7 @@ To support this hybrid authentication approach, you synchronize your on-premises
113113

114114
In both configuration options, the user submits their username and password to Azure AD, which validates the credentials and issues a ticket. When users sign in to Azure AD, it removes the need for your organization to host and manage an AD FS infrastructure.
115115

116-
One of the user attributes that's automatically synchronized by Azure AD Connect is *ProxyAddresses*. If users have an email address defined in the on-prem AD DS environment as part of the *ProxyAddresses* attribute, it's automatically synchronized to Azure AD. This email address can then be used directly in the Azure AD sign-in process as an alternate login ID.
116+
One of the user attributes that's automatically synchronized by Azure AD Connect is *ProxyAddresses*. If users have an email address defined in the on-premesis AD DS environment as part of the *ProxyAddresses* attribute, it's automatically synchronized to Azure AD. This email address can then be used directly in the Azure AD sign-in process as an alternate login ID.
117117

118118
> [!IMPORTANT]
119119
> Only emails in verified domains for the tenant are synchronized to Azure AD. Each Azure AD tenant has one or more verified domains, for which you have proven ownership, and are uniquely bound to your tenant.
@@ -448,7 +448,6 @@ For more information on hybrid identity operations, see [how password hash sync]
448448
[hybrid-overview]: ../hybrid/cloud-governed-management-for-on-premises.md
449449
[phs-overview]: ../hybrid/how-to-connect-password-hash-synchronization.md
450450
[pta-overview]: ../hybrid/how-to-connect-pta-how-it-works.md
451-
[identity-protection]: ../identity-protection/overview-identity-protection.md#risk-detection-and-remediation
452451
[sign-in-logs]: ../reports-monitoring/concept-sign-ins.md
453452
454453
<!-- EXTERNAL LINKS -->

0 commit comments

Comments
 (0)