Skip to content

Commit e955519

Browse files
authored
Merge pull request #6 from mahipdeora/mahipdeora-patch-1-1
Mahipdeora patch 1 1
2 parents 28b712d + 27a4685 commit e955519

File tree

232 files changed

+2669
-2407
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+2669
-2407
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6279,6 +6279,26 @@
62796279
"source_path_from_root": "/articles/azure-monitor/essentials/prometheus-authorization-proxy.md",
62806280
"redirect_url": "/azure/azure-monitor/containers/prometheus-authorization-proxy",
62816281
"redirect_document_id": false
6282+
},
6283+
{
6284+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-hybrid-setup.md",
6285+
"redirect_url": "/azure/azure-monitor/containers/container-insights-enable-arc-enabled-clusters",
6286+
"redirect_document_id": false
6287+
},
6288+
{
6289+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v3.md",
6290+
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6291+
"redirect_document_id": false
6292+
},
6293+
{
6294+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-openshift-v4.md",
6295+
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6296+
"redirect_document_id": false
6297+
},
6298+
{
6299+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-optout-hybrid.md",
6300+
"redirect_url": "/azure/azure-monitor/containers/container-insights-optout",
6301+
"redirect_document_id": false
62826302
}
62836303
]
62846304
}

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
2222

2323
### Editing in GitHub
2424

25-
Follow the guidance for [Quick edits to existing documents](https://learn.microsoft.com/contribute/#quick-edits-to-documentation) in our contributor guide.
25+
Follow the guidance for [Quick edits to existing documents](https://learn.microsoft.com/contribute/content/#quick-edits-to-documentation) in our contributor guide.
2626

2727
### Pull requests
2828

articles/active-directory-b2c/enable-authentication-web-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ Azure AD B2C identity provider settings are stored in the *appsettings.json* fil
260260
"Instance": "https://<your-tenant-name>.b2clogin.com",
261261
"ClientId": "<web-app-application-id>",
262262
"Domain": "<your-b2c-domain>",
263-
"SignedOutCallbackPath": "/signout-oidc
263+
"SignedOutCallbackPath": "/signout-oidc",
264264
"SignUpSignInPolicyId": "<your-sign-up-in-policy>"
265265
}
266266
```

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,8 @@
2727
href: onboard-enable-controller-after-onboarding.md
2828
- name: Add an account/ subscription/ project after onboarding is complete
2929
href: onboard-add-account-after-onboarding.md
30+
- name: Create folders to organize your Authorization Systems
31+
href: how-to-create-folders.md
3032
- name: View information about your Authorization Systems
3133
expanded: false
3234
items:
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: Create folders to organize your Authorization Systems
3+
description: How to create folders to organize Authorization Systems - accounts, subscriptions, and projects - in Microsoft Entra Permissions Management.
4+
services: active-directory
5+
author: jenniferf-skc
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: ciem
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 08/09/2023
12+
ms.author: jfields
13+
---
14+
15+
# Create folders to organize your authorization systems
16+
17+
After onboarding your cloud environment to Permissions Management, you might have multiple authorization systems (AWS accounts, Azure subscriptions, or GCP projets) that you need to manage. You can create folders to organize and group together your list of accounts, subscriptions, or projects to manage your workflow more efficiently.
18+
19+
## Create a folder
20+
21+
1. On the Permissions Management home page, select the **Data Collectors** tab and make sure that the **Status** for your cloud environment is **Onboarded**.
22+
1. Select the **Authorization Systems** subtab, then **Folders**.
23+
1. Click **Create Folder**.
24+
1. In the **Folder Name** field, enter a name for the folder you want to create.
25+
1. From the list of names, select all Authorization Systems (accounts, subscriptions, or projects) you want to add to this folder.
26+
1. Click **Save**. Your folder is created.
27+
1. Repeat these steps to create as many folders as you need.
28+
29+
## Next steps
30+
31+
- [View key statistics and data about your authorization systems](ui-dashboard.md)
32+
- [View data about the activity in your authorization system](product-dashboard.md)

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 21 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -8,24 +8,24 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 06/16/2023
11+
ms.date: 08/09/2023
1212
ms.author: jfields
1313
---
1414

1515
# Onboard a Google Cloud Platform (GCP) project
1616

17-
This article describes how to onboard a Google Cloud Platform (GCP) project on Permissions Management.
17+
This article describes how to onboard a Google Cloud Platform (GCP) project in Microsoft Entra Permissions Management.
1818

1919
> [!NOTE]
2020
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2121
2222
## Explanation
2323

24-
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
24+
For GCP, Permissions Management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, but with further configurations you can perform such as application registrations and OIDC configurations.
2525

2626
<!-- Diagram from Gargi-->
2727

28-
There are several moving parts across GCP and Azure, which are required to be configured before onboarding.
28+
There are several moving parts across GCP and Azure, which should be configured before onboarding.
2929

3030
* An Azure AD OIDC App
3131
* A Workload Identity in GCP
@@ -39,7 +39,7 @@ There are several moving parts across GCP and Azure, which are required to be co
3939

4040
- In the Permissions Management home page, select **Settings** (the gear icon), and then select the **Data Collectors** subtab.
4141

42-
1. On the **Data Collectors** tab, select **GCP**, and then select **Create Configuration**.
42+
1. On the **Data Collectors** tab, select **GCP**, then select **Create Configuration**.
4343

4444
### 1. Create an Azure AD OIDC app.
4545

@@ -50,7 +50,7 @@ There are several moving parts across GCP and Azure, which are required to be co
5050
1. To create the app registration, copy the script and run it in your command-line app.
5151

5252
> [!NOTE]
53-
> 1. To confirm that the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
53+
> 1. To confirm the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
5454
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your GCP account.
5555
> 1. Return to the Permissions Management window, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
5656
@@ -73,15 +73,15 @@ Choose from three options to manage GCP projects.
7373

7474
#### Option 1: Automatically manage
7575

76-
The automatically manage option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
76+
The automatically manage option allows you to automatically detect and monitor projects without extra configuration. Steps to detect a list of projects and onboard for collection:
7777

78-
1. Firstly, grant **Viewer** and **Security Reviewer** role to service account created in previous step at organization, folder or project scope.
78+
1. Grant **Viewer** and **Security Reviewer** roles to a service account created in the previous step at a project, folder or organization level.
7979

80-
To enable controller mode 'On' for any projects, add following roles to the specific projects:
80+
To enable Controller mode **On** for any projects, add these roles to the specific projects:
8181
- Role Administrators
8282
- Security Admin
8383

84-
2. Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programmatically with the gCloud CLI.
84+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
8585

8686
3. Select **Next**.
8787

@@ -93,34 +93,36 @@ You have the ability to specify only certain GCP member projects to manage and m
9393

9494
2. You can choose to download and run the script at this point, or you can do it via Google Cloud Shell.
9595

96-
To enable controller mode 'On' for any projects, add following roles to the specific projects:
96+
To enable controller mode 'On' for any projects, add these roles to the specific projects:
9797
- Role Administrators
9898
- Security Admin
9999

100100
3. Select **Next**.
101101

102102
#### Option 3: Select authorization systems
103103

104-
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
104+
This option detects all projects accessible by the Cloud Infrastructure Entitlement Management application.
105105

106-
1. Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
106+
1. Grant **Viewer** and **Security Reviewer** roles to a service account created in the previous step at a project, folder or organization level.
107+
108+
To enable Controller mode **On** for any projects, add these roles to the specific projects:
109+
- Role Administrators
110+
- Security Admin
111+
112+
The required commands to run in Google Cloud Shell are listed in the Manage Authorization screen for each scope of a project, folder or organization. This is also configured in the GPC console.
107113

108-
To enable controller mode 'On' for any projects, add following roles to the specific projects:
109-
- Role Administrators
110-
- Security Admin
111-
2. Once done, the steps are listed in the screen to do configure manually in the GPC console, or programmatically with the gCloud CLI
112114
3. Select **Next**.
113115

114116

115117
### 3. Review and save.
116118

117119
- In the **Permissions Management Onboarding – Summary** page, review the information you've added, and then select **Verify Now & Save**.
118120

119-
The following message appears: **Successfully Created Configuration.**
121+
The following message appears: **Successfully Created Configuration**.
120122

121123
On the **Data Collectors** tab, the **Recently Uploaded On** column displays **Collecting**. The **Recently Transformed On** column displays **Processing.**
122124

123-
You have now completed onboarding GCP, and Permissions Management has started collecting and processing your data.
125+
You've completed onboarding GCP, and Permissions Management has started collecting and processing your data.
124126

125127
### 4. View the data.
126128

articles/active-directory/external-identities/customers/how-to-customize-languages-customers.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,20 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: ciam
1111
ms.topic: how-to
12-
ms.date: 07/12/2023
12+
ms.date: 08/09/2023
1313
ms.custom: it-pro
1414

1515
#Customer intent: As a dev, devops, or it admin, I want to learn about how to add customized browser languages to my app's authentication experience.
1616
---
1717
# Customize the language of the authentication experience
1818

19-
You can create a personalized sign-in experience for users who sign in using a specific browser language by customizing the branding elements. If you don't make any changes to the elements, the default elements will be displayed.
19+
You can create a personalized sign-in experience for users who sign in using a specific browser language by customizing the branding elements for that browser language. This customization overrides any configurations made to the default branding. If you don't make any changes to the elements, the default elements are displayed.
2020

2121
## Prerequisites
2222

2323
- If you haven't already created your own Azure AD customer tenant, create one now.
2424
- [Register an application](how-to-register-ciam-app.md).
25-
- [Create a user flow](how-to-user-flow-sign-up-sign-in-customers.md)
25+
- [Create a user flow](how-to-user-flow-sign-up-sign-in-customers.md).
2626
- Review the file size requirements for each image you want to add. You may need to use a photo editor to create the right-sized images. The preferred image type for all images is PNG, but JPG is accepted.
2727

2828
## Add browser language under Company branding
@@ -99,7 +99,7 @@ Language customization in the customer tenant allows your user flow to accommoda
9999

100100
:::image type="content" source="media/how-to-customize-languages-customers/language-customization-flow.png" alt-text="Screenshot the shows how to add languages under a user flow." lightbox="media/how-to-customize-languages-customers/language-customization-flow.png":::
101101

102-
The downloaded file will be in JSON format and will include both built-in and custom attributes, as well as other page-level and error strings:
102+
The downloaded file is in JSON format and includes both built-in and custom attributes, as well as other page-level and error strings:
103103

104104
```http
105105
{
@@ -156,12 +156,12 @@ You can modify any or all of these attributes in the downloaded file. For exampl
156156
}
157157
```
158158

159-
10. After making the necessary changes, you can upload the new overrides file. The changes are saved to your user flow automatically and you'll find the override under the **Configured** tab.
159+
10. After making the necessary changes, you can upload the new overrides file. The changes are saved to your user flow automatically. The override appears under the **Configured** tab.
160160
11. To double-check your changes, select the language under the **Configured** tab and expand the **Sign up and sign in (Preview)** option. You can view your customized language file by selecting Download overrides. To remove your customized override file, select **Remove overrides**.
161161

162162
:::image type="content" source="media/how-to-customize-languages-customers/remove-download-override-file.png" alt-text="Screenshot the shows how to remove or download the modified JSON file." lightbox="media/how-to-customize-languages-customers/remove-download-override-file.png":::
163163

164-
12. Go to the sign-in page of your customer tenant. Make sure you have the right locale and market in your URLs, for example: ui_locales=de-DE and mkt=de-DE. You'll see the updated attributes on the sign-up page:
164+
12. Go to the sign-in page of your customer tenant. Make sure you have the right locale and market in your URLs, for example: ui_locales=de-DE and mkt=de-DE. The updated attributes on the sign-up page appear as follows:
165165

166166
:::image type="content" source="media/how-to-customize-languages-customers/customized-attributes.png" alt-text="Screenshot of the modified sign-up page attributes.":::
167167

0 commit comments

Comments
 (0)