Skip to content

Commit e4b678e

Browse files
author
duongau
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into coexistportal
2 parents c64a3ee + 567df44 commit e4b678e

File tree

122 files changed

+1280
-1389
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

122 files changed

+1280
-1389
lines changed

.openpublishing.redirection.json

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44178,6 +44178,25 @@
4417844178
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-group-policy.md",
4417944179
"redirect_url": "/azure/governance/policy/how-to/guest-configuration-create",
4418044180
"redirect_document_id": false
44181+
},
44182+
{ "source_path_from_root": "/articles/azure/marketplace/co-sell-requirements.md",
44183+
"redirect_url": "/partner-center/co-sell-requirements",
44184+
"redirect_document_id": false
44185+
},
44186+
{
44187+
"source_path_from_root": "/articles/azure/marketplace/co-sell-status.md",
44188+
"redirect_url": "/partner-center/co-sell-status",
44189+
"redirect_document_id": false
44190+
},
44191+
{
44192+
"source_path_from_root": "/articles/azure/marketplace/co-sell-configure.md",
44193+
"redirect_url": "/partner-center/co-sell-configure",
44194+
"redirect_document_id": false
44195+
},
44196+
{
44197+
"source_path_from_root": "/articles/azure/marketplace/co-sell-overview.md",
44198+
"redirect_url": "/partner-center/co-sell-overview",
44199+
"redirect_document_id": false
4418144200
}
4418244201
]
4418344202
}

CONTRIBUTING.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Thank you for taking the time to contribute to the Microsoft Azure documentation.
44

5-
This guide covers some general topics related to contribution and refers to the [contributors guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
5+
This guide covers some general topics related to contribution and refers to the [contributors guide](/contribute) for more detailed explanations when required.
66

77
## Code of Conduct
88

@@ -21,8 +21,8 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
2121

2222
### Editing in GitHub
2323

24-
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-existing-documents) in our contributors guide.
24+
Follow the guidance for [Quick edits to existing documents](/contribute/#quick-edits-to-existing-documents) in our contributors guide.
2525

2626
### Pull Request
2727

28-
Review the guidance for [Pull Requests](https://docs.microsoft.com/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.
28+
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Contributing to open source is more than just providing updates, it's also about
1010

1111
You've decided to contribute, that's great! To contribute to the documentation, you need a few tools.
1212

13-
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for the [GitHub account setup](https://docs.microsoft.com/contribute/get-started-setup-github) from our contributor guide.
13+
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for the [GitHub account setup](/contribute/get-started-setup-github) from our contributor guide.
1414

1515
#### Download
1616

@@ -22,7 +22,7 @@ Install the following tools:
2222

2323
#### Install
2424

25-
Follow the instructions provided in the [Install content authoring tools](https://docs.microsoft.com/contribute/get-started-setup-tools) from our contributor guide.
25+
Follow the instructions provided in the [Install content authoring tools](/contribute/get-started-setup-tools) from our contributor guide.
2626

2727
## License
2828

articles/active-directory-b2c/faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -245,12 +245,12 @@ sections:
245245
Follow the following steps to check if the refresh token is valid or revoked:
246246
1. Retrieve the `RefreshToken` and the `AccessToken` by redeeming `authorization_code`.
247247
1. Wait for 7 minutes.
248-
1. Use PowerShell cmdlet [Revoke-AzureADUserAllRefreshToken](https://docs.microsoft.com/powershell/module/azuread/revoke-azureaduserallrefreshtoken?view=azureadps-2.0) or Microsoft Graph API [invalidateAllRefreshTokens](https://docs.microsoft.com/graph/api/user-invalidateallrefreshtokens?view=graph-rest-beta&tabs=http) to run the `RevokeAllRefreshToken` command.
248+
1. Use PowerShell cmdlet [Revoke-AzureADUserAllRefreshToken](/powershell/module/azuread/revoke-azureaduserallrefreshtoken?view=azureadps-2.0) or Microsoft Graph API [invalidateAllRefreshTokens](/graph/api/user-invalidateallrefreshtokens?tabs=http&view=graph-rest-beta) to run the `RevokeAllRefreshToken` command.
249249
1. Wait for 10 minutes.
250250
251251
1. Retrieve the `RefreshToken` again.
252252
253253
- question: |
254254
How do I report issues with Azure AD B2C?
255255
answer: |
256-
See [File support requests for Azure Active Directory B2C](support-options.md).
256+
See [File support requests for Azure Active Directory B2C](support-options.md).

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ sections:
6161
We highly recommend not to disable certificate revocation list (CRL) checking as you won't be able to revoke certificates.
6262
However, to disable CRL checking if there are issues with CRL for a particular CA, you can update a trusted certificate authority and set the crlDistributionPoint attribute to """.
6363
64-
Use the [Set-AzureADTrustedCertificateAuthority](https://docs.microsoft.com/powershell/module/azuread/set-azureadtrustedcertificateauthority) cmdlet:
64+
Use the [Set-AzureADTrustedCertificateAuthority](/powershell/module/azuread/set-azureadtrustedcertificateauthority) cmdlet:
6565
6666
```powershell
6767
$c=Get-AzureADTrustedCertificateAuthority
@@ -97,5 +97,4 @@ additionalContent: |
9797
* [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
9898
* [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
9999
* [How to configure Azure AD CBA](how-to-certificate-based-authentication.md)
100-
* [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
101-
100+
* [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/09/2022
9+
ms.date: 02/15/2022
1010

1111
ms.author: justinha
1212
author: vimrang
1313
manager: daveba
14-
ms.reviewer: tommma
14+
ms.reviewer: vimrang
1515

1616
ms.collection: M365-identity-device-management
1717
ms.custom: has-adal-ref
@@ -49,7 +49,9 @@ Let's cover each step:
4949

5050
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
5151

52-
1. After the user clicks the link, the client is redirected to the certauth endpoint [http://certauth.login.microsoftonline.com](http://certauth.login.microsoftonline.com). The endpoint performs mutual authentication and requests the client certificate as part of the TLS handshake. You will see an entry for this request in the Sign-in logs. There is a [known issue](#known-issues) where User ID is displayed instead of Username.
52+
1. After the user clicks the link, the client is redirected to the certauth endpoint, which is [http://certauth.login.microsoftonline.com](http://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](/azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [http://certauth.login.microsoftonline.us](http://certauth.login.microsoftonline.us). For the correct endpoint for other environments, see the specific Microsoft cloud docs.
53+
54+
The endpoint performs mutual authentication and requests the client certificate as part of the TLS handshake. You will see an entry for this request in the Sign-in logs. There is a [known issue](#known-issues) where User ID is displayed instead of Username.
5355

5456
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-in log in Azure AD." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
5557

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Make sure that the following prerequisites are in place.
4242
>Each CA should have a certificate revocation list (CRL) that can be referenced from internet-facing URLs. If the trusted CA does not have a CRL configured, Azure AD will not perform any CRL checking, revocation of user certificates will not work, and authentication will not be blocked.
4343
4444
>[!IMPORTANT]
45-
>Make sure the PKI is secure and cannot be easily compromised. In the event of a compromise, the attacker can create and sign client certificates and compromise any user in the tenant, both synced and cloud-only users. However, a strong key protection strategy, along with other physical and logical controls such as HSM activation cards or tokens for the secure storage of artifacts, can provide defense-in-depth to prevent external attackers or insider threats from compromising the integrity of the PKI. For more information, see [Securing PKI](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn786443(v=ws.11)).
45+
>Make sure the PKI is secure and cannot be easily compromised. In the event of a compromise, the attacker can create and sign client certificates and compromise any user in the tenant, both synced and cloud-only users. However, a strong key protection strategy, along with other physical and logical controls such as HSM activation cards or tokens for the secure storage of artifacts, can provide defense-in-depth to prevent external attackers or insider threats from compromising the integrity of the PKI. For more information, see [Securing PKI](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn786443(v=ws.11)).
4646
4747
## Steps to configure and test Azure AD CBA
4848

@@ -331,5 +331,4 @@ To enable the certificate-based authentication and configure username bindings u
331331
- [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
332332
- [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
333333
- [FAQ](certificate-based-authentication-faq.yml)
334-
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
335-
334+
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

articles/active-directory/develop/workload-identity-federation-create-trust-gcp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Take note of the *object ID* of the app (not the application (client) ID) which
3131

3232
## Grant your app permissions to resources
3333

34-
Grant your app the permissions necessary to access the Azure AD protected resources targeted by your software workload running in Google Cloud. For example, [assign the Storage Blob Data Contributor role](/azure/storage/blobs/assign-azure-role-data-access) to your app if your application needs to read, write, and delete blob data in [Azure Storage](/azure/storage/blobs/storage-blobs-introduction).
34+
Grant your app the permissions necessary to access the Azure AD protected resources targeted by your software workload running in Google Cloud. For example, [assign the Storage Blob Data Contributor role](../../storage/blobs/assign-azure-role-data-access.md) to your app if your application needs to read, write, and delete blob data in [Azure Storage](../../storage/blobs/storage-blobs-introduction.md).
3535

3636
## Set up an identity in Google Cloud
3737

articles/active-directory/develop/workload-identity-federation-create-trust-github.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,6 +206,6 @@ az rest -m DELETE -u 'https://graph.microsoft.com/beta/applications/f6475511-fd
206206
Before configuring your GitHub Actions workflow, get the *tenant-id* and *client-id* values of your app registration. You can find these values in the Azure portal. Go to the list of [registered applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) and select your app registration. In **Overview**->**Essentials**, find the **Application (client) ID** and **Directory (tenant) ID**. Set these values in your GitHub environment to use in the Azure login action for your workflow.
207207

208208
## Next steps
209-
For an end-to-end example, read [Deploy to App Service using GitHub Actions](/azure/app-service/deploy-github-actions?tabs=openid).
209+
For an end-to-end example, read [Deploy to App Service using GitHub Actions](../../app-service/deploy-github-actions.md?tabs=openid).
210210

211211
Read the [GitHub Actions documentation](https://docs.github.com/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure) to learn more about configuring your GitHub Actions workflow to get an access token from Microsoft identity provider and access Azure resources.

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ The output is a summary of all available sign-in events for inbound and outbound
9191

9292
### Sign-in logs PowerShell script
9393

94-
To determine your users' access to external Azure AD organizations, you can use the [Get-MgAuditLogSignIn](https://aka.ms/cross-tenant-log-ps) cmdlet in the Microsoft Graph PowerShell SDK to view data from your sign-in logs for the last 30 days. For example, run the following command:
94+
To determine your users' access to external Azure AD organizations, you can use the [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin) cmdlet in the Microsoft Graph PowerShell SDK to view data from your sign-in logs for the last 30 days. For example, run the following command:
9595

9696
```powershell
9797
Get-MgAuditLogSignIn `
@@ -113,4 +113,4 @@ If your organization exports sign-in logs to a Security Information and Event Ma
113113

114114
## Next steps
115115

116-
[Configure cross-tenant access settings for B2B collaboration](cross-tenant-access-settings-b2b-collaboration.md)
116+
[Configure cross-tenant access settings for B2B collaboration](cross-tenant-access-settings-b2b-collaboration.md)

0 commit comments

Comments
 (0)