Skip to content

Commit ef0a722

Browse files
authored
Merge pull request #217264 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 8cf5ae3 + a8fd34c commit ef0a722

File tree

9 files changed

+115
-56
lines changed

9 files changed

+115
-56
lines changed

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -19,26 +19,26 @@ If you're unable to complete the process or are experiencing unexpected behavior
1919

2020
1. Review the [requirements](publisher-verification-overview.md#requirements) and ensure they've all been met.
2121

22-
1. Review the instructions to [mark an app as publisher verified](mark-app-as-publisher-verified.md) and ensure all steps have been performed successfully.
22+
2. Review the instructions to [mark an app as publisher verified](mark-app-as-publisher-verified.md) and ensure all steps have been performed successfully.
2323

24-
1. Review the list of [common issues](#common-issues).
24+
3. Review the list of [common issues](#common-issues).
2525

26-
1. Reproduce the request using [Graph Explorer](#making-microsoft-graph-api-calls) to gather more info and rule out any issues in the UI.
26+
4. Reproduce the request using [Graph Explorer](#making-microsoft-graph-api-calls) to gather more info and rule out any issues in the UI.
2727

2828
## Common Issues
2929
Below are some common issues that may occur during the process.
3030

31-
- **I don’t know my Microsoft Partner Network ID (MPN ID) or I don’t know who the primary contact for the account is**
32-
1. Navigate to the [MPN enrollment page](https://partner.microsoft.com/dashboard/account/v3/enrollment/joinnow/basicpartnernetwork/new)
33-
1. Sign in with a user account in the org's primary Azure AD tenant
34-
1. If an MPN account already exists, this will be recognized and you'll be added to the account
35-
1. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed
31+
- **I don’t know my Microsoft Partner Network ID (MPN ID) or I don’t know who the primary contact for the account is.**
32+
1. Navigate to the [MPN enrollment page](https://partner.microsoft.com/dashboard/account/v3/enrollment/joinnow/basicpartnernetwork/new).
33+
2. Sign in with a user account in the org's primary Azure AD tenant.
34+
3. If an MPN account already exists, this will be recognized and you'll be added to the account.
35+
4. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed.
3636

3737
- **I don’t know who my Azure AD Global Administrator (also known as company admin or tenant admin) is, how do I find them? What about the Application Administrator or Cloud Application Administrator?**
38-
1. Sign in to the [Azure AD Portal](https://aad.portal.azure.com) using a user account in your organization's primary tenant
39-
1. Navigate to [Role Management](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators)
40-
1. Select the desired admin role
41-
1. The list of users assigned that role will be displayed
38+
1. Sign in to the [Azure AD Portal](https://aad.portal.azure.com) using a user account in your organization's primary tenant.
39+
2. Navigate to [Role Management](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
40+
3. Select the desired admin role.
41+
4. The list of users assigned that role will be displayed.
4242

4343
- **I don't know who the admin(s) for my MPN account are**
4444
Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and filter the user list to see what users are in various admin roles.
@@ -47,15 +47,15 @@ Below are some common issues that may occur during the process.
4747
1. Go to your [partner profile](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) and verify that:
4848
- The MPN ID is correct.
4949
- There are no errors or “pending actions” shown, and the verification status under Legal business profile and Partner info both say “authorized” or “success”.
50-
1. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the instructions [here](/partner-center/multi-tenant-account). Be aware that all Global Admins of any tenant you add will be granted Global Admin privileges on your Partner Center account.
51-
1. Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and confirm the user you're signing in as is either a Global Admin, MPN Admin, or Accounts Admin. To add a user to a role in Partner Center, follow the instructions [here](/partner-center/create-user-accounts-and-set-permissions).
50+
2. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the instructions [here](/partner-center/multi-tenant-account). Be aware that all Global Admins of any tenant you add will be granted Global Admin privileges on your Partner Center account.
51+
3. Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and confirm the user you're signing in as is either a Global Admin, MPN Admin, or Accounts Admin. To add a user to a role in Partner Center, follow the instructions [here](/partner-center/create-user-accounts-and-set-permissions).
5252

5353
- **When I sign into the Azure AD portal, I do not see any apps registered. Why?**
5454
Your app registrations may have been created using a different user account in this tenant, a personal/consumer account, or in a different tenant. Ensure you're signed in with the correct account in the tenant where your app registrations were created.
5555

5656
- **I'm getting an error related to multi-factor authentication. What should I do?**
5757
Ensure [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) is enabled and **required** for the user you're signing in with and for this scenario. For example, MFA could be:
58-
- Always required for the user you're signing in with
58+
- Always required for the user you're signing in with.
5959
- [Required for Azure management](../conditional-access/howto-conditional-access-policy-azure-management.md).
6060
- [Required for the type of administrator](../conditional-access/howto-conditional-access-policy-admin-mfa.md) you're signing in with.
6161

@@ -184,7 +184,18 @@ Most commonly caused by the wrong MPN ID being provided.
184184

185185
The target application (`AppId`) can’t be found. Provide a valid application ID and try again.
186186

187-
Most commonly caused when verification is being performed via Graph API, and the ID of the application provided is incorrect. Note- the ID of the application must be provided, not the AppId/ClientId.
187+
Most commonly caused when verification is being performed via Graph API, and the ID of the application provided is incorrect. Note that the ID of the application must be provided, not the AppId/ClientId.
188+
189+
### ApplicationObjectisInvalid
190+
191+
The target application's object ID is invalid. Please provide a valid ID and try again.
192+
193+
Most commonly caused when the verification is being performed via Graph API, and the ID of the application provided does not exist.
194+
195+
> [!NOTE]
196+
> The Object ID of the application must be provided, not the AppId/ClientId. See "id" on the list of application properties at [application resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/application).
197+
198+
188199

189200
### B2CTenantNotAllowed
190201

@@ -202,41 +213,56 @@ Occurs when a [Publisher Domain](howto-configure-publisher-domain.md) isn't conf
202213

203214
### PublisherDomainMismatch
204215

205-
The target application's Publisher Domain (`publisherDomain`) doesn't match the domain used to perform email verification in Partner Center (`pcDomain`). Ensure these domains match and try again.
216+
The target application's Publisher Domain (`publisherDomain`) either doesn't match the domain used to perform email verification in Partner Center (`pcDomain`) or has not been verified. Ensure these domains match and have been verified then try again.
206217

207-
Occurs when neither the app's [Publisher Domain](howto-configure-publisher-domain.md) nor one of the [custom domains](../fundamentals/add-custom-domain.md) added to the Azure AD tenant match the domain used to perform email verification in Partner Center.
218+
Occurs when neither the app's [Publisher Domain](howto-configure-publisher-domain.md) nor one of the [custom domains](../fundamentals/add-custom-domain.md) added to the Azure AD tenant match the domain used to perform email verification in Partner Center or has not been verified.
219+
220+
See [requirements](publisher-verification-overview.md) for a list of allowed domain or sub-domain matches.
208221

209222
### NotAuthorizedToVerifyPublisher
210223

211-
You aren't authorized to set the verified publisher property on application (<`AppId`)
224+
You aren't authorized to set the verified publisher property on application (<`AppId`).
212225

213226
Most commonly caused by the signed-in user not being a member of the proper role for the MPN account in Azure AD- see [requirements](publisher-verification-overview.md#requirements) for a list of eligible roles and see [common issues](#common-issues) for more information.
214227

215228
### MPNIdWasNotProvided
216229

217230
The MPN ID wasn't provided in the request body or the request content type wasn't "application/json".
218231

232+
Most commonly caused when the verification is being performed via Graph API, and the MPN ID wasn’t provided in the request.
233+
219234
### MSANotSupported
220235

221236
This feature isn't supported for Microsoft consumer accounts. Only applications registered in Azure AD by an Azure AD user are supported.
222237

238+
Occurs when a consumer account (Hotmail, Messenger, OneDrive, MSN, Xbox Live, or Microsoft 365).
239+
223240
### InteractionRequired
224241

225-
Occurs when multi-factor authentication hasn't been performed before attempting to add a verified publisher to the app. See [common issues](#common-issues) for more information. Note: MFA must be performed in the same session when attempting to add a verified publisher. If MFA is enabled but not required to be performed in the session, the request will fail.
242+
Occurs when multi-factor authentication (MFA) hasn't been enabled and performed before attempting to add a verified publisher to the app. See [common issues](#common-issues) for more information. Note: MFA must be performed in the same session when attempting to add a verified publisher. If MFA is enabled but not required to be performed in the session, the request will fail.
226243

227244
The error message displayed will be: "Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to proceed."
228245

229-
### UnableToAddPublisher
246+
### UserUnableToAddPublisher
230247

231-
One of these error messages are displayed: "A verified publisher can’t be added to this application. Contact your administrator for assistance.", or "You're unable to add a verified publisher to this application. Contact your administrator for assistance."
248+
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the user risk state is determined to be ‘AtRisk’, an error, “You're unable to add a verified publisher to this application. Contact your administrator for assistance” will be returned. Please investigate the user risk and take the appropriate steps to remediate the risk (guidance below):
232249

233-
First, verify you've met the [publisher verification requirements](publisher-verification-overview.md#requirements).
250+
> [Investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk#risky-users)
234251
235-
> [!NOTE]
236-
> If you've met the publisher verification requirements and are still having issues, try using an existing or newly created user with similar permissions.
252+
> [Remediate risk/unblock users](/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock)
253+
254+
> [Self-remediation guidance](/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock)
255+
256+
> Self-serve password reset (SSPR): If the organization allows SSPR, use aka.ms/sspr to reset the password for remediation. Please choose a strong password; Choosing a weak password may not reset the risk state.
257+
258+
> [!NOTE]
259+
> Please give some time after remediation for the risk state to update, and then try again.
260+
261+
### UnableToAddPublisher
237262

238263
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the request is determined to be risky an error will be returned. For security reasons, Microsoft doesn't disclose the specific criteria used to determine whether a request is risky or not. If you received this error and believe the "risky" assessment is incorrect, try waiting and resubmitting the verification request. Some customers have reported success after multiple attempts.
239264

265+
240266
## Next steps
241267

242268
If you've reviewed all of the previous information and are still receiving an error from Microsoft Graph, gather as much of the following information as possible related to the failing request and [contact Microsoft support](developer-support-help-options.md#create-an-azure-support-request).

articles/active-directory/manage-apps/delete-recover-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ sections:
2727
answer: |
2828
> A non-admin user can create no more than 250 Azure AD resources that include applications and service principals. Both active resources and deleted resources that are available to restore count toward this quota. Even if you delete more applications that you don't need, they'll still add count to the quota. To free up the quota, you need to [permanently delete](restore-application.md#permanently-delete-an-enterprise-application) objects in the deleted items container.
2929
>
30-
> For more information about the service limits, see [Azure resource management](../../azure-resource-manager/management/azure-subscription-service-limits.md?msclkid=6cb6cc54c68711ec93eb9539fce3cc28#active-directory-limits).
30+
> For more information about the service limits, see [Azure resource management](../../azure-resource-manager/management/azure-subscription-service-limits.md?msclkid=6cb6cc54c68711ec93eb9539fce3cc28#azure-active-directory-limits).
3131
>
3232
>
3333
- question: |

articles/aks/configure-azure-cni.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,7 +185,7 @@ The pods per node values when using Azure CNI with dynamic allocation of IPs hav
185185
|Traditional Azure CNI|30|Yes (up to 250)|
186186
|Azure CNI with dynamic allocation of IPs|250|Yes (up to 250)|
187187

188-
All other guidance related to configuring the maximum nodes per pod remains the same.
188+
All other guidance related to configuring the maximum pods per node remains the same.
189189

190190
### Additional deployment parameters
191191

@@ -295,7 +295,7 @@ The following questions and answers apply to the **Azure CNI network configurati
295295
Learn more about networking in AKS in the following articles:
296296

297297
* [Use a static IP address with the Azure Kubernetes Service (AKS) load balancer](static-ip.md)
298-
* [Use an internal load balancer with Azure Container Service (AKS)](internal-lb.md)
298+
* [Use an internal load balancer with Azure Kubernetes Service (AKS)](internal-lb.md)
299299

300300
* [Create a basic ingress controller with external network connectivity][aks-ingress-basic]
301301
* [Enable the HTTP application routing add-on][aks-http-app-routing]

articles/aks/faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -305,6 +305,10 @@ AKS doesn't apply Network Security Groups (NSGs) to its subnet and doesn't modif
305305
306306
AKS nodes run the "chrony" service which pulls time from the localhost. Containers running on pods get the time from the AKS nodes. Applications launched inside a container use time from the container of the pod.
307307
308+
## How are AKS addons updated?
309+
310+
Any patch, including security patches, is automatically applied to the AKS cluster. Anything bigger than a patch, like major or minor version changes (which can have breaking changes to your deployed objects), is updated when you update your cluster if a new release is available. You can find when a new release is available by visiting the [AKS release notes](https://github.com/Azure/AKS/releases).
311+
308312
<!-- LINKS - internal -->
309313
310314
[aks-upgrade]: ./upgrade-cluster.md

articles/aks/use-azure-dedicated-hosts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,8 +63,8 @@ In this example, we'll use [az vm host group create][az-vm-host-group-create] to
6363
az vm host group create \
6464
--name myHostGroup \
6565
-g myDHResourceGroup \
66-
-z 1\
67-
--platform-fault-domain-count 1
66+
-z 1 \
67+
--platform-fault-domain-count 1 \
6868
--automatic-placement true
6969
```
7070

0 commit comments

Comments
 (0)