You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/whats-new-docs.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "What's new in Azure Active Directory External Identities"
3
3
description: "New and updated documentation for the Azure Active Directory External Identities."
4
-
ms.date: 03/01/2023
4
+
ms.date: 03/31/2023
5
5
ms.service: active-directory
6
6
ms.subservice: B2B
7
7
ms.topic: reference
@@ -15,6 +15,17 @@ manager: CelesteDG
15
15
16
16
Welcome to what's new in Azure Active Directory External Identities documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the External Identities service, see [What's new in Azure Active Directory](../fundamentals/whats-new.md).
17
17
18
+
## March 2023
19
+
20
+
### Updated articles
21
+
22
+
-[Invite internal users to B2B collaboration](invite-internal-users.md)
23
+
-[Federation with SAML/WS-Fed identity providers for guest users](direct-federation.md)
24
+
-[Add Azure Active Directory (Azure AD) as an identity provider for External Identities](azure-ad-account.md)
25
+
-[Quickstart: Add a guest user with PowerShell](b2b-quickstart-invite-powershell.md)
26
+
-[Billing model for Azure AD External Identities](external-identities-pricing.md)
27
+
-[Tutorial: Enforce multi-factor authentication for B2B guest users](b2b-tutorial-require-mfa.md)
28
+
18
29
## February 2023
19
30
20
31
### Updated articles
@@ -35,13 +46,4 @@ Welcome to what's new in Azure Active Directory External Identities documentatio
35
46
-[Add Facebook as an identity provider for External Identities](facebook-federation.md)
36
47
-[Leave an organization as an external user](leave-the-organization.md)
37
48
-[External Identities in Azure Active Directory](external-identities-overview.md)
38
-
-[External Identities documentation](index.yml)
39
-
40
-
## December 2022
41
-
42
-
### Updated articles
43
-
44
-
-[Azure Active Directory B2B collaboration invitation redemption](redemption-experience.md)
45
-
-[Azure Active Directory B2B collaboration API and customization](customize-invitation-api.md)
46
-
-[Azure Active Directory External Identities: What's new](whats-new-docs.md)
47
-
-[Auditing and reporting a B2B collaboration user](auditing-and-reporting.md)
Copy file name to clipboardExpand all lines: articles/private-link/disable-private-endpoint-network-policy.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,10 @@ By default, network policies are disabled for a subnet in a virtual network. To
18
18
19
19
Network policies can be enabled either for Network Security Groups only, for User-Defined Routes only, or for both.
20
20
21
-
If you enable network security policies for User-Defined Routes, the /32 routes that are generated by the private endpoint and propagated to all the subnets in its own VNet and directly peered VNets will be invalidated if you have User-Defined Routing, which is useful if you want all traffic (including traffic addressed to the private endpoint) to go through a firewall, since otherwise the /32 route would bypass any other route.
21
+
If you enable network security policies for User-Defined Routes, the /32 routes that are generated by the private endpoint and propagated to all the subnets in its own VNet and directly peered VNets will be invalidated if you have User-Defined Routing, which is useful if you want all traffic (including traffic addressed to the private endpoint) to go through a firewall, since otherwise the /32 route would bypass any other route.
22
+
23
+
> [!NOTE]
24
+
> Unless you configure a UDR, the Private Endpoint Route of /32 will remain active. And for the UDR to work on all private endpoints within the subnet, you need to enable PrivateEndpointNetworkPolicies.
22
25
23
26
You can use the following to enable or disable the setting:
0 commit comments