You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Clean up unmanaged Azure Active Directory accounts
18
18
19
-
Azure Active Directory (Azure AD) supports self-service sign-up for
20
-
email-verified users. Users can create Azure AD accounts if they can
21
-
verify email ownership. To learn more, see, [What is self-service
22
-
sign-up for Azure Active
23
-
Directory?](./directory-self-service-signup.md)
24
-
25
-
However, if a user creates an account, and the domain isn't verified in
26
-
an Azure AD tenant, the user is created in an unmanaged, or viral
27
-
tenant. The user can create an account with an organization's domain,
28
-
not under the lifecycle management of the organization's IT. Access can
29
-
persist after the user leaves the organization.
19
+
Prior to August 2022, Azure AD B2B supported Self-service sign-up for email-verified users which allowed users to create Azure AD accounts if they can verify ownership of the email. These accounts were created in unmanaged (aka “viral”) tenants. This meant that the user created an account with an organization’s domain that is not under the lifecycle management of the organization’s IT and access can persist after the user leaves the organization. To learn more, see, [What is self-service sign-up for Azure Active Directory?](./directory-self-service-signup.md)
30
20
31
-
## Remove unmanaged Azure AD accounts
32
-
33
-
You can remove unmanaged Azure AD accounts from your Azure AD tenants
34
-
and prevent these types of accounts from redeeming future invitations.
21
+
The creation of unmanaged Azure AD accounts via Azure AD B2B is now deprecated and new B2B invitations cannot be redeemed with these accounts as of August 2022. However, invitations sent prior to August 2022 could have been redeemed with unmanaged Azure AD accounts.
PowerShell module to identify viral users in an Azure AD tenant and
44
-
reset user redemption status.
25
+
Admins can use either this sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests) or PowerShell cmdlets in [AzureAD/MSIdentityTools](https://github.com/AzureAD/MSIdentityTools/wiki/) to remove existing unmanaged Azure AD accounts from your Azure AD tenants. These tools allow you to identify viral users in your Azure AD tenant and reset the redemption status of these users.
45
26
46
-
Once the above steps are complete, when users with unmanaged Azure AD accounts try to access your tenant, they'll re-redeem their invitations. However, because Email OTP is enabled, Azure AD will prevent users from redeeming with an existing unmanaged Azure AD account and they’ll redeem with another account type. Google Federation and SAML/WS-Fed aren't enabled by default. So by default, these users will redeem with either an MSA or Email OTP, with MSA taking precedence. For a full explanation on the B2B redemption precedence, refer to the [redemption precedence flow chart](../external-identities/redemption-experience.md#invitation-redemption-flow).
27
+
Once you have run one of the available tools, when users with unmanaged Azure AD accounts try to access your tenant, they will re-redeem their invitations. However, Azure AD will prevent users from redeeming with an existing unmanaged Azure AD account and they’ll redeem with another account type. Google Federation and SAML/WS-Fed are not enabled by default. So by default, these users will redeem with either an MSA or Email OTP, with MSA taking precedence. For a full explanation on the B2B redemption precedence, refer to the [redemption precedence flow chart](../external-identities/redemption-experience.md#invitation-redemption-flow).
47
28
48
29
## Overtaken tenants and domains
49
30
@@ -59,11 +40,7 @@ In some cases, overtaken domains might not be updated, for example, missing a DN
59
40
60
41
## Reset redemption using a sample application
61
42
62
-
Before you begin, to identify and reset unmanaged Azure AD account redemption:
Copy file name to clipboardExpand all lines: articles/active-directory/verifiable-credentials/issuance-request-api.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ The Request Service REST API issuance request requires the following HTTP header
35
35
|`Authorization`| Attach the access token as a bearer token to the authorization header in an HTTP request. For example, `Authorization: Bearer <token>`.|
36
36
|`Content-Type`|`Application/json`|
37
37
38
-
Construct an HTTP POST request to the Request Service REST API. Replace the `{tenantID}` with your tenant ID or tenant name.
38
+
Construct an HTTP POST request to the Request Service REST API.
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ Container insights is a feature designed to monitor the performance of container
20
20
Container insights supports clusters running the Linux and Windows Server 2019 operating system. The container runtimes it supports are Moby and any CRI-compatible runtime such as CRI-O and ContainerD. Docker is no longer supported as a container runtime as of September 2022. For more information about this deprecation, see the [AKS release notes][aks-release-notes].
21
21
22
22
>[!NOTE]
23
-
> Container insights support for Windows Server 2022 operating system is in public preview.
23
+
> Container insights support for Windows Server 2022 operating system and AKS for ARM nodes is in public preview.
24
24
25
25
Monitoring your containers is critical, especially when you're running a production cluster, at scale, with multiple applications.
26
26
@@ -67,4 +67,4 @@ The main differences in monitoring a Windows Server cluster compared to a Linux
67
67
To begin monitoring your Kubernetes cluster, review [Enable Container insights](container-insights-onboard.md) to understand the requirements and available methods to enable monitoring.
Copy file name to clipboardExpand all lines: articles/azure-monitor/vm/vminsights-dependency-agent-maintenance.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,6 +78,9 @@ If the Dependency agent fails to start, check the logs for detailed error inform
78
78
79
79
Since the Dependency agent works at the kernel level, support is also dependent on the kernel version. As of Dependency agent version 9.10.* the agent supports * kernels. The following table lists the major and minor Linux OS release and supported kernel versions for the Dependency agent.
80
80
81
+
>[!NOTE]
82
+
> Dependency agent is not supported for Azure Virtual Machines with Ampere Altra ARM–based processors.
83
+
81
84
| Distribution | OS version | Kernel version |
82
85
|:---|:---|:---|
83
86
| Red Hat Linux 8 | 8.5 | 4.18.0-348.\*el8_5.x86_644.18.0-348.\*el8.x86_64 |
@@ -119,4 +122,4 @@ Since the Dependency agent works at the kernel level, support is also dependent
119
122
120
123
## Next steps
121
124
122
-
If you want to stop monitoring your VMs for a while or remove VM insights entirely, see [Disable monitoring of your VMs in VM insights](../vm/vminsights-optout.md).
125
+
If you want to stop monitoring your VMs for a while or remove VM insights entirely, see [Disable monitoring of your VMs in VM insights](../vm/vminsights-optout.md).
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/lock-resources.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,6 +89,8 @@ Applying locks can lead to unexpected results. Some operations, which don't seem
89
89
90
90
- A read-only lock on an Azure Kubernetes Service (AKS) cluster limits how you can access cluster resources through the portal. A read-only lock prevents you from using the AKS cluster's Kubernetes resources section in the Azure portal to choose a cluster resource. These operations require a POST method request for authentication.
91
91
92
+
- A cannot-delete lock on a **Virtual Machine** that is protected by **Site Recovery** prevents certain resource links related to Site Recovery from being removed properly when you remove the protection or disable replication. If you plan to re-protect the VM later, you need to remove the lock prior to disabling protection. In case you miss to remove the lock, you need to follow certain steps to clean up the stale links before you can re-protect the VM. For more information, see [Troubleshoot Azure VM replication](../../site-recovery/azure-to-azure-troubleshoot-errors.md#replication-not-enabled-on-vm-with-stale-resources-error-code-150226).
93
+
92
94
## Who can create or delete locks
93
95
94
96
To create or delete management locks, you need access to `Microsoft.Authorization/*` or `Microsoft.Authorization/locks/*` actions. Only the **Owner** and the **User Access Administrator** built-in roles can create and delete management locks. You can create a custom role with the required permissions.
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-install-iot-edge-kubernetes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,4 +29,4 @@ IoT Edge can be installed on Kubernetes by using [KubeVirt](https://www.cncf.io/
29
29
A functional sample for running IoT Edge on Azure Kubernetes Service (AKS) using KubeVirt is available at [https://aka.ms/iotedge-kubevirt](https://aka.ms/iotedge-kubevirt).
30
30
31
31
> [!NOTE]
32
-
> Based on feedback, the prior translation-based preview of IoT Edge integration with Kubernetes has been discontinued and will not be made generally available. An exception being Azure Stack Edge devices where tranlation-based Kubernetes integration will be supported until IoT Edge v1.1 is maintained (Dec 2022).
32
+
> Based on feedback, the prior translation-based preview of IoT Edge integration with Kubernetes has been discontinued and will not be made generally available. An exception being Azure Stack Edge devices where translation-based Kubernetes integration will be supported until IoT Edge v1.1 is maintained (Dec 2022).
0 commit comments