Skip to content

Commit e50ed87

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ds-fixcmdletparm
2 parents da58793 + e9b6a94 commit e50ed87

File tree

17 files changed

+76
-55
lines changed

17 files changed

+76
-55
lines changed
7.15 KB
Loading

articles/active-directory/saas-apps/samanage-provisioning-tutorial.md

Lines changed: 13 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -95,51 +95,45 @@ This section guides you through the steps to configure the Azure AD provisioning
9595

9696
4. Set the **Provisioning Mode** to **Automatic**.
9797

98-
![Samanage Provisioning Mode](./media/samanage-provisioning-tutorial/ProvisioningCredentials.png)
98+
![Provisioning tab](common/provisioning-automatic.png)
9999

100-
5. Under the **Admin Credentials** section, enter the admin username and admin password of your Samanage account. Examples of these values are:
100+
5. Under the **Admin Credentials** section, input your Samanage **Tenant URL** and **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Samanage. If the connection fails, ensure your Samanage account has Admin permissions and try again.
101101

102-
* In the **Admin Username** box, fill in the username of the admin account on your Samanage tenant. An example is [email protected].
102+
![Samanage Test Connection](./media/samanage-provisioning-tutorial/provisioning.png)
103103

104-
* In the **Admin Password** box, fill in the password of the admin account that corresponds to the admin username.
105-
106-
6. After you fill in the boxes shown in Step 5, select **Test Connection** to make sure that Azure AD can connect to Samanage. If the connection fails, make sure that your Samanage account has admin permissions and try again.
107-
108-
![Samanage Test Connection](./media/samanage-provisioning-tutorial/TestConnection.png)
109-
110-
7. In the **Notification Email** box, enter the email address of the person or group to receive the provisioning error notifications. Select the **Send an email notification when a failure occurs** check box.
104+
6. In the **Notification Email** box, enter the email address of the person or group to receive the provisioning error notifications. Select the **Send an email notification when a failure occurs** check box.
111105

112106
![Samanage Notification Email](./media/samanage-provisioning-tutorial/EmailNotification.png)
113107

114-
8. Select **Save**.
108+
7. Select **Save**.
115109

116-
9. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Samanage**.
110+
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Samanage**.
117111

118112
![Samanage user synchronization](./media/samanage-provisioning-tutorial/UserMappings.png)
119113

120-
10. Review the user attributes that are synchronized from Azure AD to Samanage in the **Attribute Mappings** section. The attributes selected as **Matching** properties are used to match the user accounts in Samanage for update operations. To save any changes, select **Save**.
114+
9. Review the user attributes that are synchronized from Azure AD to Samanage in the **Attribute Mappings** section. The attributes selected as **Matching** properties are used to match the user accounts in Samanage for update operations. To save any changes, select **Save**.
121115

122116
![Samanage matching user attributes](./media/samanage-provisioning-tutorial/UserAttributeMapping.png)
123117

124-
11. To enable group mappings, under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Samanage**.
118+
10. To enable group mappings, under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Samanage**.
125119

126120
![Samanage group synchronization](./media/samanage-provisioning-tutorial/GroupMappings.png)
127121

128-
12. Set **Enabled** to **Yes** to synchronize groups. Review the group attributes that are synchronized from Azure AD to Samanage in the **Attribute Mappings** section. The attributes selected as **Matching** properties are used to match the user accounts in Samanage for update operations. To save any changes, select **Save**.
122+
11. Set **Enabled** to **Yes** to synchronize groups. Review the group attributes that are synchronized from Azure AD to Samanage in the **Attribute Mappings** section. The attributes selected as **Matching** properties are used to match the user accounts in Samanage for update operations. To save any changes, select **Save**.
129123

130124
![Samanage matching group attributes](./media/samanage-provisioning-tutorial/GroupAttributeMapping.png)
131125

132-
13. To configure scoping filters, follow the instructions in the [scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
126+
12. To configure scoping filters, follow the instructions in the [scoping filter tutorial](../manage-apps/define-conditional-rules-for-provisioning-user-accounts.md).
133127

134-
14. To enable the Azure AD provisioning service for Samanage, in the **Settings** section, change **Provisioning Status** to **On**.
128+
13. To enable the Azure AD provisioning service for Samanage, in the **Settings** section, change **Provisioning Status** to **On**.
135129

136130
![Samanage Provisioning Status](./media/samanage-provisioning-tutorial/ProvisioningStatus.png)
137131

138-
15. Define the users or groups that you want to provision to Samanage. In the **Settings** section, select the values you want in **Scope**. When you select the **Sync all users and groups** option, consider the limitations as described in the following section "Connector limitations."
132+
14. Define the users or groups that you want to provision to Samanage. In the **Settings** section, select the values you want in **Scope**. When you select the **Sync all users and groups** option, consider the limitations as described in the following section "Connector limitations."
139133

140134
![Samanage Scope](./media/samanage-provisioning-tutorial/ScopeSync.png)
141135

142-
16. When you're ready to provision, select **Save**.
136+
15. When you're ready to provision, select **Save**.
143137

144138
![Samanage Save](./media/samanage-provisioning-tutorial/SaveProvisioning.png)
145139

articles/active-directory/users-groups-roles/groups-lifecycle.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,12 @@ This article tells you how to manage the lifecycle of Office 365 groups by setti
2525

2626
Once you set a group to expire:
2727

28-
- Groups with user activities are automatically renewed as the expiration nears
29-
- Owners of the group are notified to renew the group, if the group is not auto-renewed
30-
- Any group that is not renewed is deleted
31-
- Any Office 365 group that is deleted can be restored within 30 days by the group owners or the administrator
28+
- Groups with user activities are automatically renewed as the expiration nears.
29+
- Owners of the group are notified to renew the group, if the group is not auto-renewed.
30+
- Any group that is not renewed is deleted.
31+
- Any Office 365 group that is deleted can be restored within 30 days by the group owners or the administrator.
3232

33-
Currently only one expiration policy can be configured for all Office 365 groups in an Azure AD organization.
33+
Currently, only one expiration policy can be configured for all Office 365 groups in an Azure AD organization.
3434

3535
> [!NOTE]
3636
> Configuring and using the expiration policy for Office 365 groups requires you to possess but not necessarily assign Azure AD Premium licenses for the members of all groups to which the expiration policy is applied.
@@ -39,7 +39,7 @@ For information on how to download and install the Azure AD PowerShell cmdlets,
3939

4040
## Activity-based automatic renewal
4141

42-
With Azure AD intelligence, groups are now automatically renewed based on whether they have been in recent used. This feature eliminates the need for manual action by group owners, because it based on user activity in groups across Office 365 services like Outlook, SharePoint, Teams, or Yammer. For example, if an owner or a group member does something like upload a document in SharePoint, visit a Teams channel, or send an email to the group in Outlook, the group is automatically renewed and the owner does not get any renewal notifications.
42+
With Azure AD intelligence, groups are now automatically renewed based on whether they have been recently used. This feature eliminates the need for manual action by group owners, because it's based on user activity in groups across Office 365 services like Outlook, SharePoint, Teams, or Yammer. For example, if an owner or a group member does something like upload a document in SharePoint, visit a Teams channel, or send an email to the group in Outlook, the group is automatically renewed and the owner does not get any renewal notifications.
4343

4444
### Activities that automatically renew group expiration
4545

@@ -53,6 +53,8 @@ The following user actions cause automatic group renewal:
5353

5454
Administrators can get a list of automatically renewed groups from the activity audit logs in Azure AD.
5555

56+
![Automatic renewal of groups based on activity](./media/groups-lifecycle/audit-logs-autorenew-group.png)
57+
5658
## Roles and permissions
5759

5860
The following are roles that can configure and use expiration for Office 365 groups in Azure AD.
170 KB
Loading

articles/aks/kubernetes-action.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,6 @@ ms.author: atulmal
1414

1515
[GitHub Actions](https://help.github.com/en/articles/about-github-actions) gives you the flexibility to build an automated software development lifecycle workflow. The Kubernetes action [azure/aks-set-context@v1](https://github.com/Azure/aks-set-context) facilitate deployments to Azure Kubernetes Service clusters. The action sets the target AKS cluster context, which could be used by other actions like [azure/k8s-deploy](https://github.com/Azure/k8s-deploy/tree/master), [azure/k8s-create-secret](https://github.com/Azure/k8s-create-secret/tree/master) etc. or run any kubectl commands.
1616

17-
> [!IMPORTANT]
18-
> GitHub Actions is currently in beta. You must first [sign-up to join the preview](https://github.com/features/actions) using your GitHub account.
19-
>
20-
2117
A workflow is defined by a YAML (.yml) file in the `/.github/workflows/` path in your repository. This definition contains the various steps and parameters that make up the workflow.
2218

2319
For a workflow targeting AKS, the file has three sections:

articles/application-gateway/migrate-v1-v2.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ To run the script:
9797
* **appgwName: [String]: Optional**. This is a string you specify to use as the name for the new Standard_v2 or WAF_v2 gateway. If this parameter isn't supplied, the name of your existing v1 gateway will be used with the suffix *_v2* appended.
9898
* **sslCertificates: [PSApplicationGatewaySslCertificate]: Optional**. A comma-separated list of PSApplicationGatewaySslCertificate objects that you create to represent the SSL certs from your v1 gateway must be uploaded to the new v2 gateway. For each of your SSL certs configured for your Standard v1 or WAF v1 gateway, you can create a new PSApplicationGatewaySslCertificate object via the `New-AzApplicationGatewaySslCertificate` command shown here. You need the path to your SSL Cert file and the password.
9999
100-
This parameter is only optional if you don’t have HTTPS listeners configured for your v1 gateway or WAF. If you have at least one HTTPS listener setup, you must specify this parameter.
100+
This parameter is only optional if you don’t have HTTPS listeners configured for your v1 gateway or WAF. If you have at least one HTTPS listener setup, you must specify this parameter.
101101
102102
```azurepowershell
103103
$password = ConvertTo-SecureString <cert-password> -AsPlainText -Force
@@ -109,12 +109,17 @@ To run the script:
109109
-Password $password
110110
```
111111
112-
You can pass in `$mySslCert1, $mySslCert2` (comma-separated) in the previous example as values for this parameter in the script.
113-
* **trustedRootCertificates: [PSApplicationGatewayTrustedRootCertificate]: Optional**. A comma-separated list of PSApplicationGatewayTrustedRootCertificate objects that you create to represent the [Trusted Root certificates](ssl-overview.md) for authentication of your backend instances from your v2 gateway.
112+
You can pass in `$mySslCert1, $mySslCert2` (comma-separated) in the previous example as values for this parameter in the script.
113+
* **trustedRootCertificates: [PSApplicationGatewayTrustedRootCertificate]: Optional**. A comma-separated list of PSApplicationGatewayTrustedRootCertificate objects that you create to represent the [Trusted Root certificates](ssl-overview.md) for authentication of your backend instances from your v2 gateway.
114+
115+
```azurepowershell
116+
$certFilePath = ".\rootCA.cer"
117+
$trustedCert = New-AzApplicationGatewayTrustedRootCertificate -Name "trustedCert1" -CertificateFile $certFilePath
118+
```
114119
115120
To create a list of PSApplicationGatewayTrustedRootCertificate objects, see [New-AzApplicationGatewayTrustedRootCertificate](https://docs.microsoft.com/powershell/module/Az.Network/New-AzApplicationGatewayTrustedRootCertificate?view=azps-2.1.0&viewFallbackFrom=azps-2.0.0).
116121
* **privateIpAddress: [String]: Optional**. A specific private IP address that you want to associate to your new v2 gateway. This must be from the same VNet that you allocate for your new v2 gateway. If this isn't specified, the script allocates a private IP address for your v2 gateway.
117-
* **publicIpResourceId: [String]: Optional**. The resourceId of a public IP address (standard SKU) resource in your subscription that you want to allocate to the new v2 gateway. If this isn't specified, the script allocates a new public IP in the same resource group. The name is the v2 gateway’s name with *-IP* appended.
122+
* **publicIpResourceId: [String]: Optional**. The resourceId of existing public IP address (standard SKU) resource in your subscription that you want to allocate to the new v2 gateway. If this isn't specified, the script allocates a new public IP in the same resource group. The name is the v2 gateway’s name with *-IP* appended.
118123
* **validateMigration: [switch]: Optional**. Use this parameter if you want the script to do some basic configuration comparison validations after the v2 gateway creation and the configuration copy. By default, no validation is done.
119124
* **enableAutoScale: [switch]: Optional**. Use this parameter if you want the script to enable AutoScaling on the new v2 gateway after it's created. By default, AutoScaling is disabled. You can always manually enable it later on the newly created v2 gateway.
120125
@@ -127,10 +132,10 @@ To run the script:
127132
-resourceId /subscriptions/8b1d0fea-8d57-4975-adfb-308f1f4d12aa/resourceGroups/MyResourceGroup/providers/Microsoft.Network/applicationGateways/myv1appgateway `
128133
-subnetAddressRange 10.0.0.0/24 `
129134
-appgwname "MynewV2gw" `
130-
-sslCertificates $Certs `
135+
-sslCertificates $mySslCert1,$mySslCert2 `
131136
-trustedRootCertificates $trustedCert `
132137
-privateIpAddress "10.0.0.1" `
133-
-publicIpResourceId "MyPublicIP" `
138+
-publicIpResourceId "/subscriptions/8b1d0fea-8d57-4975-adfb-308f1f4d12aa/resourceGroups/MyResourceGroup/providers/Microsoft.Network/publicIPAddresses/MyPublicIP" `
134139
-validateMigration -enableAutoScale
135140
```
136141

0 commit comments

Comments
 (0)