Skip to content

Commit ec41863

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1679050j
2 parents 4b82afc + e5c0545 commit ec41863

File tree

127 files changed

+1578
-750
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

127 files changed

+1578
-750
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7049,6 +7049,11 @@
70497049
"redirect_url": "/azure/app-service-mobile",
70507050
"redirect_document_id": false
70517051
},
7052+
{
7053+
"source_path": "articles/application-gateway/application-gateway-covid-guidelines.md",
7054+
"redirect_url": "/azure/application-gateway/high-traffic-support",
7055+
"redirect_document_id": false
7056+
},
70527057
{
70537058
"source_path": "articles/application-gateway/application-gateway-backend-ssl.md",
70547059
"redirect_url": "/azure/application-gateway/ssl-overview",
@@ -43760,6 +43765,11 @@
4376043765
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
4376143766
"redirect_document_id": false
4376243767
},
43768+
{
43769+
"source_path": "articles/cognitive-services/Acoustics/index.md",
43770+
"redirect_url": "/azure/cognitive-services/acoustics/what-is-acoustics",
43771+
"redirect_document_id": false
43772+
},
4376343773
{
4376443774
"source_path": "articles/iot-central/howto-export-data.md",
4376543775
"redirect_url": "/azure/iot-central/core/howto-export-data-event-hubs-service-bus",

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 88 additions & 90 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ The following example demonstrates the use of a self-asserted technical profile
174174

175175
## Persist claims
176176

177-
If the **PersistedClaims** element is absent, the self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
177+
The PersistedClaims element is not used. The self-asserted technical profile doesn't persist the data to Azure AD B2C. Instead, a call is made to a validation technical profile that's responsible for persisting the data. For example, the sign-up policy uses the `LocalAccountSignUpWithLogonEmail` self-asserted technical profile to collect the new user profile. The `LocalAccountSignUpWithLogonEmail` technical profile calls the validation technical profile to create the account in Azure AD B2C.
178178

179179
## Validation technical profiles
180180

articles/active-directory-domain-services/troubleshoot-account-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The most common reasons for an account to be locked out, without any malicious i
5252

5353
## Troubleshoot account lockouts with security audits
5454

55-
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS (currently in preview)][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
55+
To troubleshoot when account lockout events occur and where they're coming from, [enable security audits for Azure AD DS][security-audit-events]. Audit events are only captured from the time you enable the feature. Ideally, you should enable security audits *before* there's an account lockout issue to troubleshoot. If a user account repeatedly has lockout issues, you can enable security audits ready for the next time the situation occurs.
5656

5757
Once you have enabled security audits, the following sample queries show you how to review *Account Lockout Events*, code *4740*.
5858

articles/active-directory-domain-services/tutorial-create-management-vm.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,6 @@ To get started, connect to the Windows Server VM as follows:
8787

8888
![Connect to Windows virtual machine using Bastion in the Azure portal](./media/join-windows-vm/connect-to-vm.png)
8989

90-
You can also [create and use an Azure Bastion host (currently in preview)][azure-bastion] to allow access only through the Azure portal over TLS.
9190
1. Enter the credentials for your VM, then select **Connect**.
9291

9392
![Connect through the Bastion host in the Azure portal](./media/join-windows-vm/connect-to-bastion.png)

articles/active-directory/hybrid/howto-troubleshoot-upn-changes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ Create a defined procedure for changing UPNs on individual users as part of norm
105105

106106
The following sections detail potential known issues and workarounds when UPNs are changed.
107107

108-
## App provisioning known issues and workarounds
108+
## user provisioning known issues and workarounds
109109

110110
[Software as a service (SaaS)](https://azure.microsoft.com/overview/what-is-saas/) and Line of Business (LoB) applications often rely on UPNs to find users and store user profile information, including roles. Applications that use [Just in Time provisioning](https://docs.microsoft.com/azure/active-directory/app-provisioning/user-provisioning) to create a user profile when users sign in to the app for the first time can be affected by UPN changes.
111111

@@ -228,10 +228,10 @@ The user needs to select the drop-down menu on the account enabled for Phone sig
228228
## Security Key (FIDO2) known issues and workarounds
229229

230230
**Known issues** <br>
231-
Users are not able to sign in to Windows Azure AD Join or Hybrid Join devices using a security key enrolled before the UPN change.
231+
When multiple users are registered on the same key, the sign in screen shows an account selection page where the old UPN is displayed. Sign ins using Security Keys are not affected by UPN changes.
232232

233233
**Workaround**<br>
234-
Users must [reset the security key and re-register](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-security-key#known-issues).
234+
To remove references to old UPNs, users must [reset the security key and re-register](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-passwordless-security-key#known-issues).
235235

236236
## OneDrive known issues and workarounds
237237

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -173,13 +173,17 @@ The **Location** - The location the connection was initiated from:
173173
**Correlation ID** - The correlation ID of the activity.
174174

175175

176+
177+
176178
**Conditional access** - The status of the applied conditional access rules
177179

178-
- Not applied
180+
- **Not applied**: No policy applied to the user and application during sign-in.
181+
182+
- **Success**: One or more conditional access policies applied to the user and application (but not necessarily the other conditions) during sign-in.
183+
184+
- **Failure**: One or more conditional access policies applied and was not satisfied during sign-in.
179185

180-
- Success
181186

182-
- Failure
183187

184188

185189

articles/active-directory/saas-apps/brivo-onair-identity-connector-provisioning-tutorial.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The objective of this tutorial is to demonstrate the steps to be performed in Br
3232
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
3333

3434
* An Azure AD tenant
35-
* [A Brivo Onair Identity Connector tenant](https://www.brivo.com/quote)
35+
* [A Brivo Onair Identity Connector tenant](https://www.brivo.com/lp/quote)
3636
* A user account in Brivo Onair Identity Connector with Senior Administrator permissions.
3737

3838
## Assigning users to Brivo Onair Identity Connector
@@ -50,17 +50,17 @@ Before configuring and enabling automatic user provisioning, you should decide w
5050

5151
## Setup Brivo Onair Identity Connector for provisioning
5252

53-
1. Sign in to your [Brivo Onair Identity Connector Admin Console](https://acs.brivo.com/login/). Navigate to **Account > Account Settings**.
53+
1. Sign in to your [Brivo Onair Identity Connector Admin Console](https://acs.brivo.com/login/). Navigate to **Account > Account Settings**.
5454

55-
![Brivo Onair Identity Connector Admin Console](media/brivo-onair-identity-connector-provisioning-tutorial/admin.png)
55+
![Brivo Onair Identity Connector Admin Console](media/brivo-onair-identity-connector-provisioning-tutorial/admin.png)
5656

5757
2. Click on **Azure AD** tab. On the **Azure AD** details page re-enter the password of your senior administrator account. Click on **Submit**.
5858

59-
![Brivo Onair Identity Connector azure](media/brivo-onair-identity-connector-provisioning-tutorial/azuread.png)
59+
![Brivo Onair Identity Connector azure](media/brivo-onair-identity-connector-provisioning-tutorial/azuread.png)
6060

61-
3. Click on **Copy Token** button and save the **Secret Token**. This value will be entered in the Secret Token field in the Provisioning tab of your Brivo Onair Identity Connector application in the Azure portal.
61+
3. Click on **Copy Token** button and save the **Secret Token**. This value will be entered in the Secret Token field in the Provisioning tab of your Brivo Onair Identity Connector application in the Azure portal.
6262

63-
![Brivo Onair Identity Connector token](media/brivo-onair-identity-connector-provisioning-tutorial/token.png)
63+
![Brivo Onair Identity Connector token](media/brivo-onair-identity-connector-provisioning-tutorial/token.png)
6464

6565
## Add Brivo Onair Identity Connector from the gallery
6666

@@ -70,19 +70,19 @@ Before configuring Brivo Onair Identity Connector for automatic user provisionin
7070

7171
1. In the **[Azure portal](https://portal.azure.com)**, in the left navigation panel, select **Azure Active Directory**.
7272

73-
![The Azure Active Directory button](common/select-azuread.png)
73+
![The Azure Active Directory button](common/select-azuread.png)
7474

7575
2. Go to **Enterprise applications**, and then select **All applications**.
7676

77-
![The Enterprise applications blade](common/enterprise-applications.png)
77+
![The Enterprise applications blade](common/enterprise-applications.png)
7878

7979
3. To add a new application, select the **New application** button at the top of the pane.
8080

81-
![The New application button](common/add-new-app.png)
81+
![The New application button](common/add-new-app.png)
8282

8383
4. In the search box, enter **Brivo Onair Identity Connector**, select **Brivo Onair Identity Connector** in the results panel, and then click the **Add** button to add the application.
8484

85-
![Brivo Onair Identity Connector in the results list](common/search-new-app.png)
85+
![Brivo Onair Identity Connector in the results list](common/search-new-app.png)
8686

8787
## Configuring automatic user provisioning to Brivo Onair Identity Connector
8888

@@ -92,59 +92,59 @@ This section guides you through the steps to configure the Azure AD provisioning
9292

9393
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
9494

95-
![Enterprise applications blade](common/enterprise-applications.png)
95+
![Enterprise applications blade](common/enterprise-applications.png)
9696

9797
2. In the applications list, select **Brivo Onair Identity Connector**.
9898

99-
![The Brivo Onair Identity Connector link in the Applications list](common/all-applications.png)
99+
![The Brivo Onair Identity Connector link in the Applications list](common/all-applications.png)
100100

101101
3. Select the **Provisioning** tab.
102102

103-
![Provisioning tab](common/provisioning.png)
103+
![Provisioning tab](common/provisioning.png)
104104

105105
4. Set the **Provisioning Mode** to **Automatic**.
106106

107-
![Provisioning tab](common/provisioning-automatic.png)
107+
![Provisioning tab](common/provisioning-automatic.png)
108108

109109
5. Under the **Admin Credentials** section, input `https://scim.brivo.com/ActiveDirectory/v2/` in **Tenant URL**. Input the **SCIM Authentication Token** value retrieved earlier in **Secret Token**. Click **Test Connection** to ensure Azure AD can connect to Brivo Onair Identity Connector. If the connection fails, ensure your Brivo Onair Identity Connector account has Admin permissions and try again.
110110

111-
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
111+
![Tenant URL + Token](common/provisioning-testconnection-tenanturltoken.png)
112112

113113
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and check the checkbox - **Send an email notification when a failure occurs**.
114114

115-
![Notification Email](common/provisioning-notification-email.png)
115+
![Notification Email](common/provisioning-notification-email.png)
116116

117117
7. Click **Save**.
118118

119119
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Brivo Onair Identity Connector**.
120120

121-
![Brivo Onair Identity Connector User Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/user-mappings.png )
121+
![Brivo Onair Identity Connector User Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/user-mappings.png )
122122

123123
9. Review the user attributes that are synchronized from Azure AD to Brivo Onair Identity Connector in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Brivo Onair Identity Connector for update operations. Select the **Save** button to commit any changes.
124124

125-
![Brivo Onair Identity Connector User Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/user-attributes.png)
125+
![Brivo Onair Identity Connector User Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/user-attributes.png)
126126

127127
10. Under the **Mappings** section, select **Synchronize Azure Active Directory Groups to Brivo Onair Identity Connector**.
128128

129-
![Brivo Onair Identity Connector Group Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/group-mappings.png)
129+
![Brivo Onair Identity Connector Group Mappings](media/brivo-onair-identity-connector-provisioning-tutorial/group-mappings.png)
130130

131131
11. Review the group attributes that are synchronized from Azure AD to Brivo Onair Identity Connector in the **Attribute Mapping** section. The attributes selected as **Matching** properties are used to match the groups in Brivo Onair Identity Connector for update operations. Select the **Save** button to commit any changes.
132132

133-
![Brivo Onair Identity Connector Group Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/group-attributes.png)
133+
![Brivo Onair Identity Connector Group Attributes](media/brivo-onair-identity-connector-provisioning-tutorial/group-attributes.png)
134134

135135
12. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
136136

137137
13. To enable the Azure AD provisioning service for Brivo Onair Identity Connector, change the **Provisioning Status** to **On** in the **Settings** section.
138138

139-
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
139+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
140140

141141
14. Define the users and/or groups that you would like to provision to Brivo Onair Identity Connector by choosing the desired values in **Scope** in the **Settings** section.
142142

143-
![Provisioning Scope](common/provisioning-scope.png)
143+
![Provisioning Scope](common/provisioning-scope.png)
144144

145145
15. When you are ready to provision, click **Save**.
146146

147-
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
147+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
148148

149149
This operation starts the initial synchronization of all users and/or groups defined in **Scope** in the **Settings** section. The initial sync takes longer to perform than subsequent syncs, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running. You can use the **Synchronization Details** section to monitor progress and follow links to provisioning activity report, which describes all actions performed by the Azure AD provisioning service on Brivo Onair Identity Connector.
150150

articles/aks/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -221,6 +221,8 @@
221221
href: limit-egress-traffic.md
222222
- name: Enable Azure Active Directory integration
223223
items:
224+
- name: Azure AD v2.0
225+
href: azure-ad-v2.md
224226
- name: Use the Azure CLI
225227
href: azure-ad-integration-cli.md
226228
- name: Use the Azure portal

0 commit comments

Comments
 (0)