Skip to content

Commit f0dfcdd

Browse files
authored
Merge pull request #99731 from MicrosoftDocs/master
12/26 AM Publish
2 parents f4f626d + 550862f commit f0dfcdd

File tree

167 files changed

+2895
-1863
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

167 files changed

+2895
-1863
lines changed

articles/active-directory/reports-monitoring/reference-powershell-reporting.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,13 @@ ms.collection: M365-identity-device-management
2525
> [!NOTE]
2626
> These Powershell cmdlets currently only work with the [Azure AD Preview](https://docs.microsoft.com/powershell/module/azuread/?view=azureadps-2.0-preview#directory_auditing) Module. Please note that the preview module is not suggested for production use.
2727
28+
To install the public preview release, use the following.
29+
30+
```powershell
31+
Install-module AzureADPreview
32+
```
33+
For more infromation on how to connect to Azure AD using powershell , please see the article [Azure AD Powershell for Graph](https://docs.microsoft.com/powershell/azure/active-directory/install-adv2?view=azureadps-2.0).
34+
2835
With Azure Active Directory (Azure AD) reports, you can get details on activities around all the write operations in your direction (audit logs) and authentication data (sign-in logs). Although the information is available by using the MS Graph API, now you can retrieve the same data by using the Azure AD PowerShell cmdlets for reporting.
2936

3037
This article gives you an overview of the PowerShell cmdlets to use for audit logs and sign-in logs.
-24.1 KB
Loading

articles/active-directory/saas-apps/workday-inbound-tutorial.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -362,19 +362,19 @@ This section provides steps for user account provisioning from Workday to each A
362362

363363
**To configure Workday to Active Directory provisioning:**
364364

365-
1. Go to <https://portal.azure.com>
365+
1. Go to <https://portal.azure.com>.
366366

367-
2. In the left navigation bar, select **Azure Active Directory**
367+
2. In the Azure portal, search for and select **Azure Active Directory**.
368368

369369
3. Select **Enterprise Applications**, then **All Applications**.
370370

371371
4. Select **Add an application**, and select the **All** category.
372372

373373
5. Search for **Workday Provisioning to Active Directory**, and add that app from the gallery.
374374

375-
6. After the app is added and the app details screen is shown, select **Provisioning**
375+
6. After the app is added and the app details screen is shown, select **Provisioning**.
376376

377-
7. Change the **Provisioning** **Mode** to **Automatic**
377+
7. Change the **Provisioning** **Mode** to **Automatic**.
378378

379379
8. Click on the information banner displayed to download the Provisioning Agent.
380380

@@ -594,17 +594,17 @@ The following sections describe steps for configuring user provisioning from Wor
594594

595595
1. Go to <https://portal.azure.com>.
596596

597-
2. In the left navigation bar, select **Azure Active Directory**
597+
2. In the Azure portal, search for and select **Azure Active Directory**.
598598

599599
3. Select **Enterprise Applications**, then **All Applications**.
600600

601601
4. Select **Add an application**, and then select the **All** category.
602602

603603
5. Search for **Workday to Azure AD provisioning**, and add that app from the gallery.
604604

605-
6. After the app is added and the app details screen is shown, select **Provisioning**
605+
6. After the app is added and the app details screen is shown, select **Provisioning**.
606606

607-
7. Change the **Provisioning** **Mode** to **Automatic**
607+
7. Change the **Provisioning** **Mode** to **Automatic**.
608608

609609
8. Complete the **Admin Credentials** section as follows:
610610

@@ -699,19 +699,19 @@ Follow these instructions to configure writeback of user email addresses and use
699699

700700
**To configure Workday Writeback connector:**
701701

702-
1. Go to <https://portal.azure.com>
702+
1. Go to <https://portal.azure.com>.
703703

704-
2. In the left navigation bar, select **Azure Active Directory**
704+
2. In the Azure portal, search for and select **Azure Active Directory**.
705705

706706
3. Select **Enterprise Applications**, then **All Applications**.
707707

708708
4. Select **Add an application**, then select the **All** category.
709709

710710
5. Search for **Workday Writeback**, and add that app from the gallery.
711711

712-
6. After the app is added and the app details screen is shown, select **Provisioning**
712+
6. After the app is added and the app details screen is shown, select **Provisioning**.
713713

714-
7. Change the **Provisioning** **Mode** to **Automatic**
714+
7. Change the **Provisioning** **Mode** to **Automatic**.
715715

716716
8. Complete the **Admin Credentials** section as follows:
717717

@@ -921,7 +921,7 @@ Yes, one Provisioning Agent can be configured to handle multiple AD domains as l
921921
Get-PublishedResources -TenantId "[tenant ID]"
922922
```
923923

924-
* From the list of agents that appear – copy the value of the "id" field from that resource whose *resourceName* equals to your AD domain name.
924+
* From the list of agents that appear – copy the value of the `id` field from that resource whose *resourceName* equals to your AD domain name.
925925
* Paste the ID value into this command and execute the command in PowerShell.
926926

927927
```powershell
@@ -1209,7 +1209,7 @@ This section covers commonly seen errors with Workday user provisioning and how
12091209
|#|Error Scenario |Probable Causes|Recommended Resolution|
12101210
|--|---|---|---|
12111211
|1.| Error installing the provisioning agent with error message: *Service 'Microsoft Azure AD Connect Provisioning Agent' (AADConnectProvisioningAgent) failed to start. Verify that you have sufficient privileges to start the system.* | This error usually shows up if you are trying to install the provisioning agent on a domain controller and group policy prevents the service from starting. It is also seen if you have a previous version of the agent running and you have not uninstalled it before starting a new installation.| Install the provisioning agent on a non-DC server. Ensure that previous versions of the agent are uninstalled before installing the new agent.|
1212-
|2.| The Windows Service 'Microsoft Azure AD Connect Provisioning Agent' is in *Starting* state and does not switch to *Running* state. | As part of the installation, the agent wizard creates a local account (**NT Service\\AADConnectProvisioningAgent**) on the server and this is the **Log On** account used for starting the service. If a security policy on your Windows server prevents local accounts from running the services, you will encounter this error. | Open the *Services console*. Right click on the Windows Service 'Microsoft Azure AD Connect Provisioning Agent' and in the Log On tab specify the account of a domain administrator to run the service. Restart the service. |
1212+
|2.| The Windows Service 'Microsoft Azure AD Connect Provisioning Agent' is in *Starting* state and does not switch to *Running* state. | As part of the installation, the agent wizard creates a local account (**NT Service\\AADConnectProvisioningAgent**) on the server and this is the logon account used for starting the service. If a security policy on your Windows server prevents local accounts from running the services, you will encounter this error. | Open the *Services console*. Right click on the Windows Service 'Microsoft Azure AD Connect Provisioning Agent' and in the logon tab specify the account of a domain administrator to run the service. Restart the service. |
12131213
|3.| When configuring the provisioning agent with your AD domain in the step *Connect Active Directory*, the wizard takes a long time trying to load the AD schema and eventually times out. | This error usually shows up if the wizard is unable to contact the AD domain controller server due to firewall issues. | On the *Connect Active Directory* wizard screen, while providing the credentials for your AD domain, there is an option called *Select domain controller priority*. Use this option to select a domain controller that is in the same site as the agent server and ensure that there are no firewall rules blocking the communication. |
12141214

12151215
#### Connectivity errors

articles/azure-app-configuration/cli-samples.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,11 @@
11
---
22
title: Azure CLI samples - Azure App Configuration | Microsoft Docs
33
description: Provides information about available sample scripts for Azure App Configuration
4-
services: azure-app-configuration
5-
documentationcenter: ''
64
author: yegu-ms
7-
manager: balans
8-
editor: ''
9-
5+
ms.author: yegu
106
ms.service: azure-app-configuration
11-
ms.devlang: na
127
ms.topic: sample
13-
ms.tgt_pltfrm: na
14-
ms.workload: azure-app-configuration
158
ms.date: 02/24/2019
16-
ms.author: yegu
179
ms.custom: mvc
1810
---
1911

articles/azure-app-configuration/concept-feature-management.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,11 @@
11
---
2-
title: Azure App Configuration feature management | Microsoft Docs
2+
title: Azure App Configuration feature management
33
description: An overview of how Azure App Configuration can be used to turn on and off application features on demand.
4-
services: azure-app-configuration
5-
documentationcenter: ''
64
author: yegu-ms
7-
manager: maiye
8-
editor: ''
9-
5+
ms.author: yegu
106
ms.service: azure-app-configuration
11-
ms.devlang: na
12-
ms.topic: overview
13-
ms.workload: tbd
7+
ms.topic: conceptual
148
ms.date: 04/19/2019
15-
ms.author: yegu
169
---
1710

1811
# Feature management overview

articles/azure-app-configuration/concept-key-value.md

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,11 @@
11
---
2-
title: Azure App Configuration key-value store | Microsoft Docs
3-
description: An overview of how configuration data is stored in Azure App Configuration
4-
services: azure-app-configuration
5-
documentationcenter: ''
2+
title: Azure App Configuration key-value store
3+
description: An overview of how configuration data is stored in Azure App Configuration.
64
author: yegu-ms
7-
manager: maiye
8-
editor: ''
9-
5+
ms.author: yegu
106
ms.service: azure-app-configuration
11-
ms.devlang: na
12-
ms.topic: overview
13-
ms.workload: tbd
7+
ms.topic: conceptual
148
ms.date: 04/19/2019
15-
ms.author: yegu
169
---
1710

1811
# Keys and values

articles/azure-app-configuration/concept-point-time-snapshot.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,12 @@
11
---
2-
title: Azure App Configuration point-in-time snapshot | Microsoft Docs
2+
title: Azure App Configuration point-in-time snapshot
33
description: An overview of how point-in-time snapshot works in Azure App Configuration
44
services: azure-app-configuration
5-
documentationcenter: ''
65
author: yegu-ms
7-
manager: balans
8-
editor: ''
9-
6+
ms.author: yegu
107
ms.service: azure-app-configuration
11-
ms.devlang: na
12-
ms.topic: overview
13-
ms.workload: tbd
8+
ms.topic: conceptual
149
ms.date: 02/24/2019
15-
ms.author: yegu
1610
---
1711

1812
# Point-in-time snapshot
@@ -23,8 +17,10 @@ Azure App Configuration keeps records of the precise times when a new key-value
2317

2418
To retrieve past key values, specify a time at which key values are snapshot in the HTTP header of a REST API call. For example:
2519

26-
GET /kv HTTP/1.1
27-
Accept-Datetime: Sat, 1 Jan 2019 02:10:00 GMT
20+
```rest
21+
GET /kv HTTP/1.1
22+
Accept-Datetime: Sat, 1 Jan 2019 02:10:00 GMT
23+
```
2824

2925
Currently, App Configuration keeps seven days of change history.
3026

articles/azure-app-configuration/overview.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,11 @@
11
---
2-
title: What is Azure App Configuration? | Microsoft Docs
2+
title: What is Azure App Configuration?
33
description: An overview of the Azure App Configuration service.
4-
services: azure-app-configuration
5-
documentationcenter: ''
64
author: yegu-ms
7-
manager: balans
8-
editor: ''
9-
5+
ms.author: yegu
106
ms.service: azure-app-configuration
11-
ms.workload: tbd
12-
ms.tgt_pltfrm: na
13-
ms.devlang: na
147
ms.topic: overview
158
ms.date: 02/24/2019
16-
ms.author: yegu
179
---
1810

1911
# What is Azure App Configuration?

articles/azure-app-configuration/quickstart-java-spring-app.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,11 @@
11
---
2-
title: Quickstart to learn how to use Azure App Configuration | Microsoft Docs
2+
title: Quickstart to learn how to use Azure App Configuration
33
description: A quickstart for using Azure App Configuration with Java Spring apps.
4-
services: azure-app-configuration
54
author: yidon
6-
7-
5+
ms.author: yidon
86
ms.service: azure-app-configuration
97
ms.topic: quickstart
108
ms.date: 12/17/2019
11-
ms.author: yidon
129

1310
#Customer intent: As a Java Spring developer, I want to manage all my app settings in one place.
1411
---

articles/azure-functions/functions-run-local.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,6 @@ The following steps use [APT](https://wiki.debian.org/Apt) to install Core Tools
124124
125125
| Linux distribution | Version |
126126
| --------------- | ----------- |
127-
| Debian 10 | `buster` |
128127
| Debian 9 | `stretch` |
129128
| Debian 8 | `jessie` |
130129
| Ubuntu 18.10 | `cosmic` |

0 commit comments

Comments
 (0)