Skip to content

Commit ef1f436

Browse files
authored
Merge pull request #209973 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 6976514 + 65e40fd commit ef1f436

File tree

7 files changed

+19
-36
lines changed

7 files changed

+19
-36
lines changed

articles/active-directory/enterprise-users/clean-up-unmanaged-azure-ad-accounts.md

Lines changed: 7 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -16,34 +16,15 @@ ms.collection: M365-identity-device-management
1616

1717
# Clean up unmanaged Azure Active Directory accounts
1818

19-
Azure Active Directory (Azure AD) supports self-service sign-up for
20-
email-verified users. Users can create Azure AD accounts if they can
21-
verify email ownership. To learn more, see, [What is self-service
22-
sign-up for Azure Active
23-
Directory?](./directory-self-service-signup.md)
24-
25-
However, if a user creates an account, and the domain isn't verified in
26-
an Azure AD tenant, the user is created in an unmanaged, or viral
27-
tenant. The user can create an account with an organization's domain,
28-
not under the lifecycle management of the organization's IT. Access can
29-
persist after the user leaves the organization.
19+
Prior to August 2022, Azure AD B2B supported Self-service sign-up for email-verified users which allowed users to create Azure AD accounts if they can verify ownership of the email. These accounts were created in unmanaged (aka “viral”) tenants. This meant that the user created an account with an organization’s domain that is not under the lifecycle management of the organization’s IT and access can persist after the user leaves the organization. To learn more, see, [What is self-service sign-up for Azure Active Directory?](./directory-self-service-signup.md)
3020

31-
## Remove unmanaged Azure AD accounts
32-
33-
You can remove unmanaged Azure AD accounts from your Azure AD tenants
34-
and prevent these types of accounts from redeeming future invitations.
21+
The creation of unmanaged Azure AD accounts via Azure AD B2B is now deprecated and new B2B invitations cannot be redeemed with these accounts as of August 2022. However, invitations sent prior to August 2022 could have been redeemed with unmanaged Azure AD accounts.
3522

36-
1. Enable [email one-time
37-
passcode](../external-identities/one-time-passcode.md#enable-email-one-time-passcode)
38-
(OTP).
23+
## Remove unmanaged Azure AD accounts
3924

40-
2. Use the sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests) or
41-
go to
42-
[AzureAD/MSIdentityTools](https://github.com/AzureAD/MSIdentityTools/wiki/)
43-
PowerShell module to identify viral users in an Azure AD tenant and
44-
reset user redemption status.
25+
Admins can use either this sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests) or PowerShell cmdlets in [AzureAD/MSIdentityTools](https://github.com/AzureAD/MSIdentityTools/wiki/) to remove existing unmanaged Azure AD accounts from your Azure AD tenants. These tools allow you to identify viral users in your Azure AD tenant and reset the redemption status of these users.
4526

46-
Once the above steps are complete, when users with unmanaged Azure AD accounts try to access your tenant, they'll re-redeem their invitations. However, because Email OTP is enabled, Azure AD will prevent users from redeeming with an existing unmanaged Azure AD account and they’ll redeem with another account type. Google Federation and SAML/WS-Fed aren't enabled by default. So by default, these users will redeem with either an MSA or Email OTP, with MSA taking precedence. For a full explanation on the B2B redemption precedence, refer to the [redemption precedence flow chart](../external-identities/redemption-experience.md#invitation-redemption-flow).
27+
Once you have run one of the available tools, when users with unmanaged Azure AD accounts try to access your tenant, they will re-redeem their invitations. However, Azure AD will prevent users from redeeming with an existing unmanaged Azure AD account and they’ll redeem with another account type. Google Federation and SAML/WS-Fed are not enabled by default. So by default, these users will redeem with either an MSA or Email OTP, with MSA taking precedence. For a full explanation on the B2B redemption precedence, refer to the [redemption precedence flow chart](../external-identities/redemption-experience.md#invitation-redemption-flow).
4728

4829
## Overtaken tenants and domains
4930

@@ -59,11 +40,7 @@ In some cases, overtaken domains might not be updated, for example, missing a DN
5940

6041
## Reset redemption using a sample application
6142

62-
Before you begin, to identify and reset unmanaged Azure AD account redemption:
63-
64-
1. Ensure email OTP is enabled.
65-
66-
2. Use the sample application on
43+
Use the sample application on
6744
[Azure-Samples/Remove-Unmanaged-Guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests).
6845

6946
## Reset redemption using MSIdentityTools PowerShell Module
@@ -103,4 +80,4 @@ To delete unmanaged Azure AD accounts, run:
10380
## Next steps
10481

10582
Examples of using
106-
[Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser)
83+
[Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser)

articles/active-directory/verifiable-credentials/issuance-request-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ The Request Service REST API issuance request requires the following HTTP header
3535
|`Authorization`| Attach the access token as a bearer token to the authorization header in an HTTP request. For example, `Authorization: Bearer <token>`.|
3636
|`Content-Type`| `Application/json`|
3737

38-
Construct an HTTP POST request to the Request Service REST API. Replace the `{tenantID}` with your tenant ID or tenant name.
38+
Construct an HTTP POST request to the Request Service REST API.
3939

4040
```http
4141
https://verifiedid.did.msidentity.com/v1.0/verifiableCredentials/createIssuanceRequest

articles/azure-monitor/containers/container-insights-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Container insights is a feature designed to monitor the performance of container
2020
Container insights supports clusters running the Linux and Windows Server 2019 operating system. The container runtimes it supports are Moby and any CRI-compatible runtime such as CRI-O and ContainerD. Docker is no longer supported as a container runtime as of September 2022. For more information about this deprecation, see the [AKS release notes][aks-release-notes].
2121

2222
>[!NOTE]
23-
> Container insights support for Windows Server 2022 operating system is in public preview.
23+
> Container insights support for Windows Server 2022 operating system and AKS for ARM nodes is in public preview.
2424
2525
Monitoring your containers is critical, especially when you're running a production cluster, at scale, with multiple applications.
2626

@@ -67,4 +67,4 @@ The main differences in monitoring a Windows Server cluster compared to a Linux
6767
To begin monitoring your Kubernetes cluster, review [Enable Container insights](container-insights-onboard.md) to understand the requirements and available methods to enable monitoring.
6868

6969
<!-- LINKS - external -->
70-
[aks-release-notes]: https://github.com/Azure/AKS/releases
70+
[aks-release-notes]: https://github.com/Azure/AKS/releases

articles/azure-monitor/vm/vminsights-dependency-agent-maintenance.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ If the Dependency agent fails to start, check the logs for detailed error inform
7878
7979
Since the Dependency agent works at the kernel level, support is also dependent on the kernel version. As of Dependency agent version 9.10.* the agent supports * kernels. The following table lists the major and minor Linux OS release and supported kernel versions for the Dependency agent.
8080
81+
>[!NOTE]
82+
> Dependency agent is not supported for Azure Virtual Machines with Ampere Altra ARM–based processors.
83+
8184
| Distribution | OS version | Kernel version |
8285
|:---|:---|:---|
8386
| Red Hat Linux 8 | 8.5 | 4.18.0-348.\*el8_5.x86_644.18.0-348.\*el8.x86_64 |
@@ -119,4 +122,4 @@ Since the Dependency agent works at the kernel level, support is also dependent
119122
120123
## Next steps
121124
122-
If you want to stop monitoring your VMs for a while or remove VM insights entirely, see [Disable monitoring of your VMs in VM insights](../vm/vminsights-optout.md).
125+
If you want to stop monitoring your VMs for a while or remove VM insights entirely, see [Disable monitoring of your VMs in VM insights](../vm/vminsights-optout.md).

articles/azure-resource-manager/management/lock-resources.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,8 @@ Applying locks can lead to unexpected results. Some operations, which don't seem
8989

9090
- A read-only lock on an Azure Kubernetes Service (AKS) cluster limits how you can access cluster resources through the portal. A read-only lock prevents you from using the AKS cluster's Kubernetes resources section in the Azure portal to choose a cluster resource. These operations require a POST method request for authentication.
9191

92+
- A cannot-delete lock on a **Virtual Machine** that is protected by **Site Recovery** prevents certain resource links related to Site Recovery from being removed properly when you remove the protection or disable replication. If you plan to re-protect the VM later, you need to remove the lock prior to disabling protection. In case you miss to remove the lock, you need to follow certain steps to clean up the stale links before you can re-protect the VM. For more information, see [Troubleshoot Azure VM replication](../../site-recovery/azure-to-azure-troubleshoot-errors.md#replication-not-enabled-on-vm-with-stale-resources-error-code-150226).
93+
9294
## Who can create or delete locks
9395

9496
To create or delete management locks, you need access to `Microsoft.Authorization/*` or `Microsoft.Authorization/locks/*` actions. Only the **Owner** and the **User Access Administrator** built-in roles can create and delete management locks. You can create a custom role with the required permissions.

articles/azure-vmware/concepts-identity.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,8 @@ Unlike on-premises deployment, not all pre-defined NSX-T Data Center RBAC roles
167167
In an Azure VMware Solution deployment, the following NSX-T Data Center predefined RBAC roles are not supported with LDAP integration:
168168

169169
- Enterprise Admin
170-
- Network AdminSecurity Admin
170+
- Network Admin
171+
- Security Admin
171172
- Netx Partner Admin
172173
- GI Partner Admin
173174

articles/iot-edge/how-to-install-iot-edge-kubernetes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,4 +29,4 @@ IoT Edge can be installed on Kubernetes by using [KubeVirt](https://www.cncf.io/
2929
A functional sample for running IoT Edge on Azure Kubernetes Service (AKS) using KubeVirt is available at [https://aka.ms/iotedge-kubevirt](https://aka.ms/iotedge-kubevirt).
3030

3131
> [!NOTE]
32-
> Based on feedback, the prior translation-based preview of IoT Edge integration with Kubernetes has been discontinued and will not be made generally available. An exception being Azure Stack Edge devices where tranlation-based Kubernetes integration will be supported until IoT Edge v1.1 is maintained (Dec 2022).
32+
> Based on feedback, the prior translation-based preview of IoT Edge integration with Kubernetes has been discontinued and will not be made generally available. An exception being Azure Stack Edge devices where translation-based Kubernetes integration will be supported until IoT Edge v1.1 is maintained (Dec 2022).

0 commit comments

Comments
 (0)