Skip to content

Commit e53d6c8

Browse files
authored
Merge pull request #238211 from MicrosoftDocs/repo_sync_working_branch
Resolve syncing conflicts from repo_sync_working_branch to main
2 parents e04bf19 + 4822612 commit e53d6c8

File tree

108 files changed

+173
-120
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

108 files changed

+173
-120
lines changed

articles/active-directory-b2c/identity-provider-microsoft-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To enable sign-in for users with a Microsoft account in Azure Active Directory B
4040
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **App registrations**.
4141
1. Select **New registration**.
4242
1. Enter a **Name** for your application. For example, *MSAapp1*.
43-
1. Under **Supported account types**, select **Accounts in any organizational directory (Any Azure AD directory - Multitenant) and personal Microsoft accounts (e.g. Skype, Xbox)**.
43+
1. Under **Supported account types**, select **personal Microsoft accounts (e.g. Skype, Xbox)**.
4444

4545
For more information on the different account type selections, see [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md).
4646
1. Under **Redirect URI (optional)**, select **Web** and enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your Azure AD B2C tenant, and `your-domain-name` with your custom domain.

articles/active-directory-b2c/manage-users-portal.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,17 @@ To reset a user's password:
7373

7474
For details about restoring a user within the first 30 days after deletion, or for permanently deleting a user, see [Restore or remove a recently deleted user using Azure Active Directory](../active-directory/fundamentals/active-directory-users-restore.md).
7575

76+
77+
## Export consumer users
78+
79+
1. In your Azure AD B2C directory, search for **Azure Active Directory**.
80+
2. Select **Users**, and then select **Bulk Operations** and **Download Users**.
81+
3. Select **Start**, and then select **File is ready! Click here to download**.
82+
83+
84+
When downloading users via Bulk Operations option, the CSV file will bring users with their UPN attribute with the format *objectID@B2CDomain*. This is by design since that's the way the UPN information is stored in the B2C tenant.
85+
86+
7687
## Next steps
7788

7889
For automated user management scenarios, for example migrating users from another identity provider to your Azure AD B2C directory, see [Azure AD B2C: User migration](user-migration.md).

articles/active-directory/app-provisioning/on-premises-ldap-connector-prepare-directory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Now that we have configured the certificate and granted the network service acco
8080
- Place a check in the SSL box
8181
[![Screenshot that shows the Ldp tool connection configuration.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-2.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-2.png#lightbox)</br>
8282
5. You should see a response similar to the screenshot below.
83-
[![Screenshot taht shows the Ldp tool connection configuration success.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png#lightbox)</br>
83+
[![Screenshot that shows the Ldp tool connection configuration success.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-3.png#lightbox)</br>
8484
6. At the top, under **Connection** select **Bind**.
8585
7. Leave the defaults and click **OK**.
8686
[![Screenshot that shows the Ldp tool bind operation.](../../../includes/media/active-directory-app-provisioning-ldap/ldp-4.png)](../../../includes/media/active-directory-app-provisioning-ldap/ldp-4.png#lightbox)</br>
@@ -137,7 +137,7 @@ New-SelfSignedCertificate -DnsName $DNSName -CertStoreLocation $CertLocation
137137
#Create directory
138138
New-Item -Path $logpath -Name $dirname -ItemType $dirtype
139139
140-
#Export the certifcate from the local machine personal store
140+
#Export the certificate from the local machine personal store
141141
Get-ChildItem -Path cert:\LocalMachine\my | Export-Certificate -FilePath c:\test\allcerts.sst -Type SST
142142
143143
#Import the certificate in to the trusted root

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Once the agent is installed, no further configuration is necessary on-premises,
5757
6. In the **Tenant URL** field, provide the SCIM endpoint URL for your application. The URL is typically unique to each target application and must be resolvable by DNS. An example for a scenario where the agent is installed on the same host as the application is https://localhost:8585/scim ![Screenshot that shows assigning an agent.](./media/on-premises-scim-provisioning/scim-2.png)
5858
7. Select **Test Connection**, and save the credentials. The application SCIM endpoint must be actively listening for inbound provisioning requests, otherwise the test will fail. Use the steps [here](on-premises-ecma-troubleshoot.md#troubleshoot-test-connection-issues) if you run into connectivity issues.
5959
>[!NOTE]
60-
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the aplication contains the entire URL provided above.
60+
> If the test connection fails, you will see the request made. Please note that while the URL in the test connection error message is truncated, the actual request sent to the application contains the entire URL provided above.
6161
6262
8. Configure any [attribute mappings](customize-application-attributes.md) or [scoping](define-conditional-rules-for-provisioning-user-accounts.md) rules required for your application.
6363
9. Add users to scope by [assigning users and groups](../../active-directory/manage-apps/add-application-portal-assign-users.md) to the application.

articles/active-directory/app-proxy/application-proxy-deployment-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -292,7 +292,7 @@ These logs provide detailed information about logins to applications configured
292292

293293
#### Application Proxy Connector monitoring
294294

295-
The connectors and the service take care of all the high availability tasks. You can monitor the status of your connectors from the Application Proxy page in the Azure portal. For more information about connector maintainence see [Understand Azure AD Application Proxy Connectors](./application-proxy-connectors.md#maintenance).
295+
The connectors and the service take care of all the high availability tasks. You can monitor the status of your connectors from the Application Proxy page in the Azure portal. For more information about connector maintenance see [Understand Azure AD Application Proxy Connectors](./application-proxy-connectors.md#maintenance).
296296

297297
![Example: Azure AD Application Proxy connectors](./media/application-proxy-connectors/app-proxy-connectors.png)
298298

articles/active-directory/authentication/concept-authentication-web-browser-cookies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Persistent session tokens are stored as persistent cookies on the web browser's
3030
| ESTSAUTHLIGHT | Common | Contains Session GUID Information. Lite session state cookie used exclusively by client-side JavaScript in order to facilitate OIDC sign-out. Security feature. |
3131
| SignInStateCookie | Common | Contains list of services accessed to facilitate sign-out. No user information. Security feature. |
3232
| CCState | Common | Contains session information state to be used between Azure AD and the [Azure AD Backup Authentication Service](../conditional-access/resilience-defaults.md). |
33-
| buid | Common | Tracks browser related information. Used for service telemetry and protection mechanisms. |
33+
| build | Common | Tracks browser related information. Used for service telemetry and protection mechanisms. |
3434
| fpc | Common | Tracks browser related information. Used for tracking requests and throttling. |
3535
| esctx | Common | Session context cookie information. For CSRF protection. Binds a request to a specific browser instance so the request can't be replayed outside the browser. No user information. |
3636
| ch | Common | ProofOfPossessionCookie. Stores the Proof of Possession cookie hash to the user agent. |

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ For step-by-step directions on this process, see [Configure the AD FS servers](/
166166

167167
Once you've configured the servers, you can add Azure AD MFA as an additional authentication method.
168168

169-
![Screen shot showing the Edit authentication methods screen with Azure AD MFA and Azure Mutli-factor authentication Server selected](./media/how-to-migrate-mfa-server-to-mfa-user-authentication/edit-authentication-methods.png)
169+
![Screen shot showing the Edit authentication methods screen with Azure AD MFA and Azure Multi-factor authentication Server selected](./media/how-to-migrate-mfa-server-to-mfa-user-authentication/edit-authentication-methods.png)
170170

171171
## Prepare Azure AD and implement migration
172172

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ To support this hybrid authentication approach, you synchronize your on-premises
112112

113113
In both configuration options, the user submits their username and password to Azure AD, which validates the credentials and issues a ticket. When users sign in to Azure AD, it removes the need for your organization to host and manage an AD FS infrastructure.
114114

115-
One of the user attributes that's automatically synchronized by Azure AD Connect is *ProxyAddresses*. If users have an email address defined in the on-premesis AD DS environment as part of the *ProxyAddresses* attribute, it's automatically synchronized to Azure AD. This email address can then be used directly in the Azure AD sign-in process as an alternate login ID.
115+
One of the user attributes that's automatically synchronized by Azure AD Connect is *ProxyAddresses*. If users have an email address defined in the on-premises AD DS environment as part of the *ProxyAddresses* attribute, it's automatically synchronized to Azure AD. This email address can then be used directly in the Azure AD sign-in process as an alternate login ID.
116116

117117
> [!IMPORTANT]
118118
> Only emails in verified domains for the tenant are synchronized to Azure AD. Each Azure AD tenant has one or more verified domains, for which you have proven ownership, and are uniquely bound to your tenant.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ This option allows subscriptions to be automatically detected and monitored with
5858
1. For onboarding mode, select ‘Automatically Manage’
5959

6060
> [!NOTE]
61-
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
61+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
6262
6363
- Once complete, Click ‘Verify Now & Save’
6464

@@ -101,7 +101,7 @@ This option detects all subscriptions that are accessible by the Cloud Infrastru
101101
1. For onboarding mode, select ‘Automatically Manage’
102102

103103
> [!NOTE]
104-
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
104+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programmatically with PowerShell or the Azure CLI.
105105
106106
- Once complete, Click ‘Verify Now & Save’
107107

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ The automatically manage option allows projects to be automatically detected and
6464

6565
Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
6666

67-
Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programatically with the gcloud CLI.
67+
Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programmatically with the gcloud CLI.
6868

6969
Once everything has been configured, click next, then 'Verify Now & Save'.
7070

@@ -95,7 +95,7 @@ To view status of onboarding after saving the configuration:
9595
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
9696

9797
- Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
98-
- Once done, the steps are listed in the screen to do configure manually in the GPC console, or programatically with the gcloud CLI
98+
- Once done, the steps are listed in the screen to do configure manually in the GPC console, or programmatically with the gcloud CLI
9999
- Click Next
100100
- Click 'Verify Now & Save'
101101
- Navigate to newly create Data Collector row under GCP data collectors

0 commit comments

Comments
 (0)