Skip to content

Commit e352d4c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into afdcustomdomain
2 parents 6f304b2 + eadb838 commit e352d4c

File tree

7 files changed

+59
-49
lines changed

7 files changed

+59
-49
lines changed
Lines changed: 35 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Clean up unmanaged Azure AD accounts
3-
description: Clean up unmanaged accounts using email OTP and PowerShell modules in Azure Active Directory
2+
title: Clean up unmanaged Azure Active Directory accounts
3+
description: Clean up unmanaged accounts using email one-time password and PowerShell modules in Azure AD
44
services: active-directory
55
author: gargi-sinha
66
ms.author: gasinh
77
manager: martinco
8-
ms.date: 06/28/2022
8+
ms.date: 03/28/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -16,68 +16,65 @@ ms.collection: M365-identity-device-management
1616

1717
# Clean up unmanaged Azure Active Directory accounts
1818

19-
Prior to August 2022, Azure AD B2B supported Self-service sign-up for email-verified users which allowed users to create Azure AD accounts if they can verify ownership of the email. These accounts were created in unmanaged (aka “viral) tenants. This meant that the user created an account with an organization’s domain that is not under the lifecycle management of the organization’s IT and access can persist after the user leaves the organization. To learn more, see, [What is self-service sign-up for Azure Active Directory?](./directory-self-service-signup.md)
19+
Prior to August 2022, Azure Active Directory B2B (Azure AD B2B) supported self-service sign-up for email-verified users. With this feature, users create Azure AD accounts, when they verify email ownership. These accounts were created in unmanaged (or viral) tenants: users created accounts with an organization domain, not under IT team management. Access persists after users leave the organization.
2020

21-
The creation of unmanaged Azure AD accounts via Azure AD B2B is now deprecated and new B2B invitations cannot be redeemed with these accounts as of August 2022. However, invitations sent prior to August 2022 could have been redeemed with unmanaged Azure AD accounts.
21+
To learn more, see, [What is self-service sign-up for Azure AD?](./directory-self-service-signup.md)
22+
23+
> [!NOTE]
24+
> Unmanaged Azure AD accounts via Azure AD B2B were deprecated. As of August 2022, new B2B invitations can't be redeemed. However, invitations prior to August 2022 were redeemable with unmanaged Azure AD accounts.
2225
2326
## Remove unmanaged Azure AD accounts
2427

25-
Admins can use either this sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests) or PowerShell cmdlets in [AzureAD/MSIdentityTools](https://github.com/AzureAD/MSIdentityTools/wiki/) to remove existing unmanaged Azure AD accounts from your Azure AD tenants. These tools allow you to identify viral users in your Azure AD tenant and reset the redemption status of these users.
28+
Use the following guidance to remove unmanaged Azure AD accounts from Azure AD tenants. Tool features help identify viral users in the Azure AD tenant. You can reset the user redemption status.
29+
30+
* Use the sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests)
31+
* Use PowerShell cmdlets in [AzureAD/MSIdentityTools](https://github.com/AzureAD/MSIdentityTools/wiki/)
2632

27-
Once you have run one of the available tools, when users with unmanaged Azure AD accounts try to access your tenant, they will re-redeem their invitations. However, Azure AD will prevent users from redeeming with an existing unmanaged Azure AD account and they’ll redeem with another account type. Google Federation and SAML/WS-Fed are not enabled by default. So by default, these users will redeem with either an MSA or Email OTP, with MSA taking precedence. For a full explanation on the B2B redemption precedence, refer to the [redemption precedence flow chart](../external-identities/redemption-experience.md#invitation-redemption-flow).
33+
After you run a tool, users with unmanaged Azure AD accounts access the tenant, and re-redeem their invitations. However, Azure AD prevents users from redeeming with an unmanaged Azure AD account. They can redeem with another account type. Google Federation and SAML/WS-Federation aren't enabled by default. Therefore, users redeem with a Microsoft account (MSA) or email one-time password (OTP). MSA is recommended.
34+
35+
Learn more: [Invitation redemption flow](../external-identities/redemption-experience.md#invitation-redemption-flow)
2836

2937
## Overtaken tenants and domains
3038

31-
Some tenants created as unmanaged tenants can be taken over and
32-
converted to a managed tenant. See, [take over an unmanaged directory as
33-
administrator in Azure AD](./domains-admin-takeover.md).
39+
It's possible to convert some unmanaged tenants to managed tenants.
3440

35-
In some cases, overtaken domains might not be updated, for example, missing a DNS TXT record and therefore become flagged as unmanaged. Implications are:
41+
Learn more: [Take over an unmanaged directory as administrator in Azure AD](./domains-admin-takeover.md)
3642

37-
- For guest users who belong to formerly unmanaged tenants, redemption status is reset and one consent prompt appears. Redemption occurs with same account as before.
43+
Some overtaken domains might not be updated. For example, a missing DNS TXT record indicates an unmanaged state. Implications are:
3844

39-
- After unmanaged user redemption status is reset, the tool might identify unmanaged users that are false positives.
45+
* For guest users from unmanaged tenants, redemption status is reset. A consent prompt appears.
46+
* Redemption occurs with same account
47+
* The tool might identify unmanaged users as false positives after you reset unmanaged user redemption status
4048

41-
## Reset redemption using a sample application
49+
## Reset redemption with a sample application
4250

43-
Use the sample application on
44-
[Azure-Samples/Remove-Unmanaged-Guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests).
51+
Use the sample application on [Azure-Samples/Remove-Unmanaged-Guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests).
4552

4653
## Reset redemption using MSIdentityTools PowerShell Module
4754

48-
MSIdentityTools PowerShell Module is a collection of cmdlets and
49-
scripts. They are for use in the Microsoft identity platform and Azure
50-
AD; they augment capabilities in the PowerShell SDK. See, [Microsoft
51-
Graph PowerShell
52-
SDK](https://github.com/microsoftgraph/msgraph-sdk-powershell).
55+
MSIdentityTools PowerShell Module is a collection of cmdlets and scripts, which you use in the Microsoft identity platform and Azure AD. Use the cmdlets and scripts to augment PowerShell SDK capabilities. See, [microsoftgraph/msgraph-sdk-powershell](https://github.com/microsoftgraph/msgraph-sdk-powershell).
5356

5457
Run the following cmdlets:
5558

56-
- `Install-Module Microsoft.Graph -Scope CurrentUser`
57-
58-
- `Install-Module MSIdentityTools`
59-
60-
- `Import-Module msidentitytools,microsoft.graph`
59+
* `Install-Module Microsoft.Graph -Scope CurrentUser`
60+
* `Install-Module MSIdentityTools`
61+
* `Import-Module msidentitytools,microsoft.graph`
6162

6263
To identify unmanaged Azure AD accounts, run:
6364

64-
- `Connect-MgGraph -Scope User.ReadAll`
65-
66-
- `Get-MsIdUnmanagedExternalUser`
65+
* `Connect-MgGraph -Scope User.ReadAll`
66+
* `Get-MsIdUnmanagedExternalUser`
6767

6868
To reset unmanaged Azure AD account redemption status, run:
6969

70-
- `Connect-MgGraph -Scopes User.ReadWriteAll`
71-
72-
- `Get-MsIdUnmanagedExternalUser | Reset-MsIdExternalUser`
70+
* `Connect-MgGraph -Scopes User.ReadWriteAll`
71+
* `Get-MsIdUnmanagedExternalUser | Reset-MsIdExternalUser`
7372

7473
To delete unmanaged Azure AD accounts, run:
7574

76-
- `Connect-MgGraph -Scopes User.ReadWriteAll`
77-
78-
- `Get-MsIdUnmanagedExternalUser | Remove-MgUser`
75+
* `Connect-MgGraph -Scopes User.ReadWriteAll`
76+
* `Get-MsIdUnmanagedExternalUser | Remove-MgUser`
7977

80-
## Next steps
78+
## Resources
8179

82-
Examples of using
83-
[Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser)
80+
See, [Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser). The tool returns a list of external unmanaged users, or viral users, in the tenant.

articles/cosmos-db/nosql/troubleshoot-request-rate-too-large.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,9 @@ By default, the Azure Cosmos DB client SDKs and data import tools suc
5454
#### Recommended solution
5555
In general, for a production workload, **if you see between 1-5% of requests with 429 responses, and your end to end latency is acceptable, this is a healthy sign that the RU/s are being fully utilized**. No action is required. Otherwise, move to the next troubleshooting steps.
5656

57+
> [!IMPORTANT]
58+
> This 1-5% range is assuming that your account partitions are evenly distributed. If your partitions are not evenly distributed, your problem partition may return a large amount of 429 errors while the overall rate may be low.
59+
5760
If you're using autoscale, it's possible to see 429 responses on your database or container, even if the RU/s wasn't scaled to the maximum RU/s. See the section [Request rate is large with autoscale](#request-rate-is-large-with-autoscale) for an explanation.
5861

5962
One common question that arises is, **"Why am I seeing 429 responses in the Azure Monitor metrics, but none in my own application monitoring?"** If Azure Monitor Metrics show you have 429 responses, but you've not seen any in your own application, this is because by default, the Azure Cosmos DB client SDKs [`automatically retried internally on the 429 responses`](xref:Microsoft.Azure.Cosmos.CosmosClientOptions.MaxRetryAttemptsOnRateLimitedRequests) and the request succeeded in subsequent retries. As a result, the 429 status code isn't returned to the application. In these cases, the overall rate of 429 responses is typically minimal and can be safely ignored, assuming the overall rate is between 1-5% and end to end latency is acceptable to your application.

articles/quotas/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ title: Azure Quotas documentation
44
summary: Azure Quotas lets you view and manage quotas for many of the Azure resources you use in your subscriptions.
55
metadata:
66
title: Azure Quotas documentation
7-
description: Azure Quotas summary TK
7+
description: Azure Quotas lets you view and manage quotas for many of the Azure resources you use in your subscriptions.
88
services: Azure Quotas
99
ms.topic: landing-page
1010
ms.service: azure-quotas
1111
ms.collection: collection
12-
ms.date: 07/22/2022
12+
ms.date: 04/04/2023
1313

1414
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
1515

articles/storage/blobs/blobfuse2-commands-mount-all.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,12 +73,19 @@ The following flags are inherited from parent command [`blobfuse2 mount`](blobfu
7373
Mount all blob storage containers in the storage account specified in the configuration file to the path specified in the command. (Each container will be a subdirectory under the directory specified):
7474

7575
```bash
76-
~$ mkdir bf2all
77-
~$ blobfuse2 mount all ./bf2all --config-file=./config.yaml
76+
sudo mkdir bf2all
77+
sudo blobfuse2 mount all ./bf2all --config-file=./config.yaml
78+
```
79+
Example Output
80+
```output
7881
Mounting container : blobfuse2a to path : bf2all/blobfuse2a
7982
Mounting container : blobfuse2b to path : bf2all/blobfuse2b
80-
81-
~$ blobfuse2 mount list
83+
```
84+
```bash
85+
sudo blobfuse2 mount list
86+
```
87+
Example output
88+
```output
8289
1 : /home/<user>/bf2all/blobfuse2a
8390
2 : /home/<user>/bf2all/blobfuse2b
8491
```

articles/storage/blobs/blobfuse2-commands-mount-list.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,10 @@ The following flags are inherited from parent command [`blobfuse2 mount`](blobfu
6060
Display all current BlobFuse2 mount points:
6161

6262
```bash
63-
~$ blobfuse2 mount list
63+
sudo blobfuse2 mount list
64+
```
65+
Example output
66+
```output
6467
1 : /home/<user>/bf2a
6568
2 : /home/<user>/bf2b
6669
```

articles/storage/blobs/blobfuse2-commands-mountv1.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,13 +94,13 @@ The following flags apply only to command `blobfuse2 mountv1` command:
9494
1. Mount a blob container in an Azure Data Lake Storage account using a BlobFuse v1 configuration file:
9595

9696
```bash
97-
blobfuse2 mountv1 ./mount_dir --config-file=./config.cfg --use-adls=true
97+
sudo blobfuse2 mountv1 ./mount_dir --config-file=./config.cfg --use-adls=true
9898
```
9999

100100
1. Create a BlobFuse2 configuration file from a v1 configuration file in the same directory, but do not mount any containers:
101101

102102
```bash
103-
blobfuse2 mountv1 --config-file=./config.cfg --output-file=./config.yaml --convert-config-only=true
103+
sudo blobfuse2 mountv1 --config-file=./config.cfg --output-file=./config.yaml --convert-config-only=true
104104
```
105105

106106
## See also

articles/storage/blobs/blobfuse2-commands-unmount.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ There are no flags only supported by the unmount command.
5353
1. Unmount a BlobFuse2 mount instance:
5454

5555
```bash
56-
blobfuse2 unmount ./mount_path
56+
sudo blobfuse2 unmount ./mount_path
5757
```
5858

5959
(Alternatively, you can use a native Linux command to do the same):
@@ -65,7 +65,7 @@ There are no flags only supported by the unmount command.
6565
1. Unmount all BlobFuse2 mount points (see also [The BlobFuse2 unmount all command](blobfuse2-commands-unmount-all.md)):
6666

6767
```bash
68-
blobfuse2 unmount all
68+
sudo blobfuse2 unmount all
6969
```
7070

7171
## See also

0 commit comments

Comments
 (0)