Skip to content

Commit e9fcf3a

Browse files
authored
Merge pull request #206397 from MicrosoftDocs/main
7/29 AM Publish
2 parents 8ed7ae5 + 399cffb commit e9fcf3a

File tree

60 files changed

+631
-182
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+631
-182
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1020,6 +1020,7 @@
10201020
"articles/load-testing/.openpublishing.redirection.azure-load-testing.json",
10211021
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
10221022
"articles/machine-learning/.openpublishing.redirection.machine-learning.json",
1023-
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json"
1023+
"articles/static-web-apps/.openpublishing.redirection.static-web-apps.json",
1024+
".openpublishing.redirection.virtual-desktop.json"
10241025
]
10251026
}

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24728,11 +24728,6 @@
2472824728
"redirect_url": "/azure/traffic-manager/traffic-manager-manage-profiles",
2472924729
"redirect_document_id": false
2473024730
},
24731-
{
24732-
"source_path_from_root": "/articles/virtual-desktop/connect-windows-7-and-10.md",
24733-
"redirect_url": "/azure/virtual-desktop/connect-windows-7-10",
24734-
"redirect_document_id": true
24735-
},
2473624731
{
2473724732
"source_path_from_root": "/articles/troubleshoot-client-connection.md",
2473824733
"redirect_url": "/azure/virtual-desktop/troubleshoot-client",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/virtual-desktop/connect-windows-7-and-10.md",
5+
"redirect_url": "/azure/virtual-desktop/connect-windows-7-10",
6+
"redirect_document_id": true
7+
}
8+
]
9+
}

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/12/2022
11+
ms.date: 07/29/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -60,7 +60,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
6060
|{tenant}| Required | Name of your Azure AD B2C tenant|
6161
| {policy} | Required | The user flow to be run. Specify the name of a user flow you've created in your Azure AD B2C tenant. For example: `b2c_1_sign_in`, `b2c_1_sign_up`, or `b2c_1_edit_profile`. |
6262
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com). |
63-
| response_type |Required |The response type, which must include `code` for the authorization code flow. |
63+
| response_type |Required |The response type, which must include `code` for the authorization code flow. You can receive an ID token if you include it in the response type, such as `code+id_token`, and in this case, the scope needs to include `openid`.|
6464
| redirect_uri |Required |The redirect URI of your app, where authentication responses are sent and received by your app. It must exactly match one of the redirect URIs that you registered in the portal, except that it must be URL-encoded. |
6565
| scope |Required |A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources.The client-id indicates the token issued are intended for use by Azure AD B2C registered client. The `https://{tenant-name}/{app-id-uri}/{scope}` indicates a permission to protected resources, such as a web API. For more information, see [Request an access token](access-tokens.md#scopes). |
6666
| response_mode |Recommended |The method that you use to send the resulting authorization code back to your app. It can be `query`, `form_post`, or `fragment`. |

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -249,6 +249,7 @@ The **InputClaim** element contains the following attributes:
249249
| --------- | -------- | ----------- |
250250
| ClaimTypeReferenceId | Yes | The identifier of a claim type. The claim is already defined in the claims schema section in the policy file or parent policy file. |
251251
| DefaultValue | No | A default value to use to create a claim if the claim indicated by ClaimTypeReferenceId doesn't exist so that the resulting claim can be used as an InputClaim element by the technical profile. |
252+
|AlwaysUseDefaultValue |No |Forces the use of the default value. |
252253
| PartnerClaimType | No | The identifier of the claim type of the external partner that the specified policy claim type maps to. If the PartnerClaimType attribute isn't specified, the specified policy claim type is mapped to the partner claim type of the same name. Use this property when your claim type name is different from the other party. An example is if the first claim name is *givenName*, while the partner uses a claim named *first_name*. |
253254

254255
## Display claims

articles/active-directory/enterprise-users/groups-write-back-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020

2121
# Group writeback in the Azure Active Directory admin center (preview)
2222

23-
Group writeback is a valuable tool for administrators of Azure Active Directory (Azure AD) tenants being synced with on-premises Active Directory groups. Microsoft is now previewing new capabilities for group writeback. In this preview, you can specify in the Azure AD admin center which groups you want to write back and what you’d like each group to write back as. You can write Microsoft 365 groups back to on-premises Active Directory as Distribution, Mail-enabled Security, or Security groups, and write Security groups back as Security groups. Groups are written back with a scope of universal​.
23+
Group writeback is a valuable tool for administrators of Azure Active Directory (Azure AD) tenants being synced with on-premises Active Directory groups. Microsoft is now previewing new capabilities for group writeback for tenants with an Azure AD Premium license and Azure AD Connect version 2021 December release or later. In this preview, once you have [enabled Azure AD Connect group writeback](..//hybrid/how-to-connect-group-writeback-v2.md), you can specify in the Azure AD admin center which groups you want to write back and what you’d like each group to write back as. You can write Microsoft 365 groups back to on-premises Active Directory as Distribution, Mail-enabled Security, or Security groups, and write Security groups back as Security groups. Groups are written back with a scope of universal​.
2424

2525
>[!NOTE]
2626
> If you were previously writing Microsoft 365 groups back to on-premises Active Directory as universal distribution groups, they will appear in the Azure portal as not enabled for writeback in both the **Groups** page and in the properties page for a group. These pages display a new property introduced for the preview, “writeback enabled”. This property is not set by the current version of group writeback to ensure backward compatibility with the legacy version of group writeback and to avoid breaking existing customer setups.

articles/active-directory/governance/identity-governance-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# What is Azure AD Identity Governance?
2121

22-
Azure Active Directory (Azure AD) Identity Governance allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources. These and related Azure AD and Enterprise Mobility + Security features allows you to mitigate access risk by protecting, monitoring, and auditing access to critical assets -- while ensuring employee and business partner productivity.
22+
Azure Active Directory (Azure AD) Identity Governance allows you to balance your organization's need for security and employee productivity with the right processes and visibility. It provides you with capabilities to ensure that the right people have the right access to the right resources. These and related Azure AD and Enterprise Mobility + Security features allows you to mitigate access risk by protecting, monitoring, and auditing access to critical assets while ensuring employee and business partner productivity.
2323

2424
Identity Governance gives organizations the ability to do the following tasks across employees, business partners and vendors, and across services and applications both on-premises and in clouds:
2525

@@ -58,7 +58,7 @@ When a user attempts to access applications, Azure AD enforces [Conditional Acce
5858

5959
## Privileged access lifecycle
6060

61-
Historically, privileged access has been described by other vendors as a separate capability from Identity Governance. However, at Microsoft, we think governing privileged access is a key part of Identity Governance -- especially given the potential for misuse associated with those administrator rights can cause to an organization. The employees, vendors, and contractors that take on administrative rights need to be governed.
61+
Historically, privileged access has been described by other vendors as a separate capability from Identity Governance. However, at Microsoft, we think governing privileged access is a key part of Identity Governance especially given the potential for misuse associated with those administrator rights can cause to an organization. The employees, vendors, and contractors that take on administrative rights need to be governed.
6262

6363
![Privileged access lifecycle](./media/identity-governance-overview/privileged-access-lifecycle.png)
6464

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ To enable group writeback via PowerShell:
119119
Set-ADSyncScheduler -SyncCycleEnabled $true
120120
```
121121
122-
You've now enabled the group writeback feature.
122+
You've now enabled the group writeback feature, and can [select the groups for writeback](../enterprise-users/groups-write-back-portal.md).
123123
124124
### Optional Configuration
125125
@@ -194,4 +194,5 @@ Limitations and known issues specific to Group Writeback:
194194
195195
## Next steps
196196
197-
Learn more about [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md).
197+
- Configure [group writeback in the Azure Active Directory Admin Center](../enterprise-users/groups-write-back-portal.md)
198+
- Learn more about [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md).

articles/active-directory/privileged-identity-management/groups-assign-member-owner.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
ms.tgt_pltfrm: na
1111
ms.workload: identity
1212
ms.subservice: pim
13-
ms.date: 06/24/2022
13+
ms.date: 07/29/2022
1414
ms.author: amsliu
1515
ms.reviewer: shaunliu
1616
ms.custom: pim
@@ -34,7 +34,7 @@ Follow these steps to make a user eligible to be a member or owner of a privileg
3434

3535
1. Sign in to the [Azure AD admin center](https://aad.portal.azure.com/) with a user in the [Global Administrator](../roles/permissions-reference.md#global-administrator) role, the Privileged Role Administrator role, or the group Owner role.
3636

37-
1. Select **Groups** and then select the role-assignable group you want to manage. You can search or filter the list.
37+
1. Select **Groups** and then select the [role-assignable group](concept-privileged-access-versus-role-assignable.md) you want to manage. You can search or filter the list.
3838

3939
![find a role-assignable group to manage in PIM](./media/groups-assign-member-owner/groups-list-in-azure-ad.png)
4040

@@ -63,7 +63,7 @@ Follow these steps to make a user eligible to be a member or owner of a privileg
6363
6464
- **Active** assignments don't require the member to perform any action to use the role. Members assigned as active have the privileges assigned to the role at all times.
6565

66-
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox. Depending on your organization's settings, the check box might not appear or might not be editable.
66+
1. If the assignment should be permanent (permanently eligible or permanently assigned), select the **Permanently** checkbox. Depending on your organization's settings, the check box might not appear or might not be editable. For more information, check out the [Configure privileged access group settings](groups-role-settings.md#assignment-duration) article.
6767

6868
1. When finished, select **Assign**.
6969

116 KB
Loading

0 commit comments

Comments
 (0)