Skip to content

Commit f176e5b

Browse files
authored
Merge pull request #87460 from MicrosoftDocs/master
9/4 PM Publish
2 parents 32242bf + 398ccf0 commit f176e5b

File tree

156 files changed

+2045
-1532
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

156 files changed

+2045
-1532
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19071,7 +19071,7 @@
1907119071
},
1907219072
{
1907319073
"source_path": "articles/active-directory/hybrid/whatis-hybrid-identity-health.md",
19074-
"redirect_url": "/azure/active-directory/hybrid/whatis-hybrid-identity",
19074+
"redirect_url": "/azure/active-directory/hybrid/whatis-azure-ad-connect",
1907519075
"redirect_document_id": false
1907619076
},
1907719077
{
@@ -38958,6 +38958,16 @@
3895838958
"redirect_url": "/azure/cognitive-services/face/overview",
3895938959
"redirect_document_id": false
3896038960
},
38961+
{
38962+
"source_path": "articles/cognitive-services/Face/QuickStarts/csharp-detect-sdk.md",
38963+
"redirect_url": "/azure/cognitive-services/face/quickstarts/csharp-sdk",
38964+
"redirect_document_id": false
38965+
},
38966+
{
38967+
"source_path": "articles/cognitive-services/Face/Tutorials/FaceAPIinPythonTutorial.md",
38968+
"redirect_url": "/azure/cognitive-services/face/quickstarts/python-sdk#display-and-frame-faces",
38969+
"redirect_document_id": false
38970+
},
3896138971
{
3896238972
"source_path": "articles/cognitive-services/Computer-vision/Home-v1.md",
3896338973
"redirect_url": "/azure/cognitive-services/computer-vision/home",

articles/active-directory-domain-services/faqs.md

Lines changed: 74 additions & 37 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ To target specific device groups to enable the credential provider, use the foll
5151
1. Name: Security Keys for Windows Sign-In
5252
1. Description: Enables FIDO Security Keys to be used during Windows Sign In
5353
1. Platform: Windows 10 and later
54-
1. Platform type: Custom
54+
1. Profile type: Custom
5555
1. Custom OMA-URI Settings:
5656
1. Name: Turn on FIDO Security Keys for Windows Sign-In
5757
1. OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin

articles/active-directory/develop/msal-handling-exceptions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ Interactively acquiring the token prompts the user and gives them the opportunit
175175

176176
When calling an API requiring Conditional Access, you can receive a claims challenge in the error from the API. In this case, you can pass the claims returned in the error to the `claimsRequest` field of the `AuthenticationParameters.ts` class to satisfy the appropriate policy.
177177

178-
See [Requesting Additional Claims]() for more detail.
178+
See [Requesting Additional Claims](active-directory-optional-claims.md) for more detail.
179179

180180
## Retrying after errors and exceptions
181181

articles/active-directory/fundamentals/whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ The modern security reports will provide additional capabilities from the older
9393
- Risk state, covering: At risk, Dismissed, Remediated, and Confirmed compromised
9494
- New risk-related detections (available to Azure AD Premium subscribers)
9595

96-
For more information, see [Risky users](https://aka.ms/RiskyUsersDocs), [Risky sign-ins](https://aka.ms/RiskySigninsDocs), and [Risk detections](https://aka.ms/RiskDetectionsDocs).
96+
For more information, see [Risky users](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risk#risky-users-report), [Risky sign-ins](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risk#risky-sign-ins-report), and [Risk detections](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risk#risk-detections-report).
9797

9898
---
9999

@@ -139,7 +139,7 @@ For more information about this issue, see [Azure Active Directory Authenticatio
139139

140140
In August 2019, we've added these 26 new apps with Federation support to the app gallery:
141141

142-
[Civic Platform](https://docs.microsoft.com/azure/active-directory/saas-apps/civic-platform-tutorial), [Amazon Business](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-business-tutorial), [ProNovos Ops Manager](https://docs.microsoft.com/azure/active-directory/saas-apps/pronovos-ops-manager-tutorial), [Cognidox](https://docs.microsoft.com/azure/active-directory/saas-apps/cognidox-tutorial), [Viareport's Inativ Portal (Europe)](https://docs.microsoft.com/azure/active-directory/saas-apps/viareports-inativ-portal-europe-tutorial), [Azure Databricks](https://azure.microsoft.com/services/databricks), [Robin](https://docs.microsoft.com/azure/active-directory/saas-apps/robin-tutorial), [Academy Attendance](https://docs.microsoft.com/azure/active-directory/saas-apps/academy-attendance-tutorial), [Priority Matrix](https://sync.appfluence.com/pmwebng/), [Cousto MySpace](https://cousto.platformers.be/account/login), [Uploadcare](https://uploadcare.com/accounts/signup/), [Carbonite Endpoint Backup](https://docs.microsoft.com/azure/active-directory/saas-apps/carbonite-endpoint-backup-tutorial), [CPQSync by Cincom](https://docs.microsoft.com/azure/active-directory/saas-apps/cpqsync-by-cincom-tutorial), [Chargebee](https://docs.microsoft.com/azure/active-directory/saas-apps/chargebee--tutorial), [deliver.media™ Portal](https://portal.deliver.media), [Frontline Education](https://docs.microsoft.com/azure/active-directory/saas-apps/frontline-education-tutorial), [F5](https://www.f5.com/products/security/access-policy-manager), [stashcat AD connect](https://www.stashcat.com), [Blink](https://docs.microsoft.com/azure/active-directory/saas-apps/blink-tutorial), [Vocoli](https://docs.microsoft.com/azure/active-directory/saas-apps/vocoli-tutorial), [ProNovos Analytics](https://docs.microsoft.com/azure/active-directory/saas-apps/pronovos-analytics-tutorial), [Sigstr](https://docs.microsoft.com/azure/active-directory/saas-apps/sigstr-tutorial), [Darwinbox](https://docs.microsoft.com/azure/active-directory/saas-apps/darwinbox-tutorial), [Watch by Colors](https://docs.microsoft.com/azure/active-directory/saas-apps/watch-by-colors-tutorial), [Harness](https://docs.microsoft.com/azure/active-directory/saas-apps/harness-tutorial), [EAB Navigate Strategic Care](https://docs.microsoft.com/azure/active-directory/saas-apps/eab-navigate-strategic-care-tutorial)
142+
[Civic Platform](https://docs.microsoft.com/azure/active-directory/saas-apps/civic-platform-tutorial), [Amazon Business](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-business-tutorial), [ProNovos Ops Manager](https://docs.microsoft.com/azure/active-directory/saas-apps/pronovos-ops-manager-tutorial), [Cognidox](https://docs.microsoft.com/azure/active-directory/saas-apps/cognidox-tutorial), [Viareport's Inativ Portal (Europe)](https://docs.microsoft.com/azure/active-directory/saas-apps/viareports-inativ-portal-europe-tutorial), [Azure Databricks](https://azure.microsoft.com/services/databricks), [Robin](https://docs.microsoft.com/azure/active-directory/saas-apps/robin-tutorial), [Academy Attendance](https://docs.microsoft.com/azure/active-directory/saas-apps/academy-attendance-tutorial), [Priority Matrix](https://sync.appfluence.com/pmwebng/), [Cousto MySpace](https://cousto.platformers.be/account/login), [Uploadcare](https://uploadcare.com/accounts/signup/), [Carbonite Endpoint Backup](https://docs.microsoft.com/azure/active-directory/saas-apps/carbonite-endpoint-backup-tutorial), [CPQSync by Cincom](https://docs.microsoft.com/azure/active-directory/saas-apps/cpqsync-by-cincom-tutorial), [Chargebee](https://docs.microsoft.com/azure/active-directory/saas-apps/chargebee-tutorial), [deliver.media™ Portal](https://portal.deliver.media), [Frontline Education](https://docs.microsoft.com/azure/active-directory/saas-apps/frontline-education-tutorial), [F5](https://www.f5.com/products/security/access-policy-manager), [stashcat AD connect](https://www.stashcat.com), [Blink](https://docs.microsoft.com/azure/active-directory/saas-apps/blink-tutorial), [Vocoli](https://docs.microsoft.com/azure/active-directory/saas-apps/vocoli-tutorial), [ProNovos Analytics](https://docs.microsoft.com/azure/active-directory/saas-apps/pronovos-analytics-tutorial), [Sigstr](https://docs.microsoft.com/azure/active-directory/saas-apps/sigstr-tutorial), [Darwinbox](https://docs.microsoft.com/azure/active-directory/saas-apps/darwinbox-tutorial), [Watch by Colors](https://docs.microsoft.com/azure/active-directory/saas-apps/watch-by-colors-tutorial), [Harness](https://docs.microsoft.com/azure/active-directory/saas-apps/harness-tutorial), [EAB Navigate Strategic Care](https://docs.microsoft.com/azure/active-directory/saas-apps/eab-navigate-strategic-care-tutorial)
143143

144144
For more information about the apps, see [SaaS application integration with Azure Active Directory](https://aka.ms/appstutorial). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](https://aka.ms/azureadapprequest).
145145

@@ -398,7 +398,7 @@ All Azure AD administrators can now select the banner at the top of existing sec
398398

399399
- Risk state, covering: At risk, Dismissed, Remediated, and Confirmed compromised
400400

401-
For more information, see [Risky users report](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risky-users-signins#risky-users-report) and [Risky sign-ins report](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risky-users-signins#risky-sign-ins-report).
401+
For more information, see [Risky users report](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risk#risky-users-report) and [Risky sign-ins report](https://docs.microsoft.com/azure/active-directory/identity-protection/howto-investigate-risk#risky-sign-ins-report).
402402

403403
---
404404

articles/active-directory/hybrid/how-to-connect-fed-saml-idp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ The following procedure walks you through converting an existing standard domain
183183

184184
1. Connect to your Azure AD Directory as a tenant administrator: Connect-MsolService .
185185
2. Configure your desired Office 365 domain to use federation with SAML 2.0:
186-
`$dom = "contoso.com" $BrandName - "Sample SAML 2.0 IDP" $LogOnUrl = "https://WS2012R2-0.contoso.com/passiveLogon" $LogOffUrl = "https://WS2012R2-0.contoso.com/passiveLogOff" $ecpUrl = "https://WS2012R2-0.contoso.com/PAOS" $MyURI = "urn:uri:MySamlp2IDP" $MySigningCert = @" MIIC7jCCAdagAwIBAgIQRrjsbFPaXIlOG3GTv50fkjANBgkqhkiG9w0BAQsFADAzMTEwLwYDVQQDEyh BREZTIFNpZ25pbmcgLSBXUzIwMTJSMi0wLnN3aW5mb3JtZXIuY29tMB4XDTE0MDEyMDE1MTY0MFoXDT E1MDEyMDE1MTY0MFowMzExMC8GA1UEAxMoQURGUyBTaWduaW5nIC0gV1MyMDEyUjItMC5zd2luZm9yb WVyLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKe+rLVmXy1QwCwZwqgbbp1/kupQ VcjKuKLitVDbssFyqbDTjP7WRjlVMWAHBI3kgNT7oE362Gf2WMJFf1b0HcrsgLin7daRXpq4Qi6OA57 sW1YFMj3sqyuTP0eZV3S4+ZbDVob6amsZIdIwxaLP9Zfywg2bLsGnVldB0+XKedZwDbCLCVg+3ZWxd9 T/jV0hpLIIWr+LCOHqq8n8beJvlivgLmDJo8f+EITnAxWcsJUvVai/35AhHCUq9tc9sqMp5PWtabAEM b2AU72/QlX/72D2/NbGQq1BWYbqUpgpCZ2nSgvlWDHlCiUo//UGsvfox01kjTFlmqQInsJVfRxF5AcC AwEAATANBgkqhkiG9w0BAQsFAAOCAQEAi8c6C4zaTEc7aQiUgvnGQgCbMZbhUXXLGRpjvFLKaQzkwa9 eq7WLJibcSNyGXBa/SfT5wJgsm3TPKgSehGAOTirhcqHheZyvBObAScY7GOT+u9pVYp6raFrc7ez3c+ CGHeV/tNvy1hJNs12FYH4X+ZCNFIT9tprieR25NCdi5SWUbPZL0tVzJsHc1y92b2M2FxqRDohxQgJvy JOpcg2mSBzZZIkvDg7gfPSUXHVS1MQs0RHSbwq/XdQocUUhl9/e/YWCbNNxlM84BxFsBUok1dH/gzBy Sx+Fc8zYi7cOq9yaBT3RLT6cGmFGVYZJW4FyhPZOCLVNsLlnPQcX3dDg9A==" "@ $uri = "http://WS2012R2-0.contoso.com/adfs/services/trust" $Protocol = "SAMLP" Set-MsolDomainAuthentication -DomainName $dom -FederationBrandName $dom -Authentication Federated -PassiveLogOnUri $MyURI -ActiveLogOnUri $ecpUrl -SigningCertificate $MySigningCert -IssuerUri $uri -LogOffUri $url -PreferredAuthenticationProtocol $Protocol`
186+
`$dom = "contoso.com" $BrandName - "Sample SAML 2.0 IDP" $LogOnUrl = "https://WS2012R2-0.contoso.com/passiveLogon" $LogOffUrl = "https://WS2012R2-0.contoso.com/passiveLogOff" $ecpUrl = "https://WS2012R2-0.contoso.com/PAOS" $MyURI = "urn:uri:MySamlp2IDP" $MySigningCert = @" MIIC7jCCAdagAwIBAgIQRrjsbFPaXIlOG3GTv50fkjANBgkqhkiG9w0BAQsFADAzMTEwLwYDVQQDEyh BREZTIFNpZ25pbmcgLSBXUzIwMTJSMi0wLnN3aW5mb3JtZXIuY29tMB4XDTE0MDEyMDE1MTY0MFoXDT E1MDEyMDE1MTY0MFowMzExMC8GA1UEAxMoQURGUyBTaWduaW5nIC0gV1MyMDEyUjItMC5zd2luZm9yb WVyLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKe+rLVmXy1QwCwZwqgbbp1/kupQ VcjKuKLitVDbssFyqbDTjP7WRjlVMWAHBI3kgNT7oE362Gf2WMJFf1b0HcrsgLin7daRXpq4Qi6OA57 sW1YFMj3sqyuTP0eZV3S4+ZbDVob6amsZIdIwxaLP9Zfywg2bLsGnVldB0+XKedZwDbCLCVg+3ZWxd9 T/jV0hpLIIWr+LCOHqq8n8beJvlivgLmDJo8f+EITnAxWcsJUvVai/35AhHCUq9tc9sqMp5PWtabAEM b2AU72/QlX/72D2/NbGQq1BWYbqUpgpCZ2nSgvlWDHlCiUo//UGsvfox01kjTFlmqQInsJVfRxF5AcC AwEAATANBgkqhkiG9w0BAQsFAAOCAQEAi8c6C4zaTEc7aQiUgvnGQgCbMZbhUXXLGRpjvFLKaQzkwa9 eq7WLJibcSNyGXBa/SfT5wJgsm3TPKgSehGAOTirhcqHheZyvBObAScY7GOT+u9pVYp6raFrc7ez3c+ CGHeV/tNvy1hJNs12FYH4X+ZCNFIT9tprieR25NCdi5SWUbPZL0tVzJsHc1y92b2M2FxqRDohxQgJvy JOpcg2mSBzZZIkvDg7gfPSUXHVS1MQs0RHSbwq/XdQocUUhl9/e/YWCbNNxlM84BxFsBUok1dH/gzBy Sx+Fc8zYi7cOq9yaBT3RLT6cGmFGVYZJW4FyhPZOCLVNsLlnPQcX3dDg9A==" "@ $uri = "http://WS2012R2-0.contoso.com/adfs/services/trust" $Protocol = "SAMLP" Set-MsolDomainAuthentication -DomainName $dom -FederationBrandName $BrandName -Authentication Federated -PassiveLogOnUri $LogOnUrl -ActiveLogOnUri $ecpUrl -SigningCertificate $MySigningCert -IssuerUri $MyURI -LogOffUri $LogOffUrl -PreferredAuthenticationProtocol $Protocol`
187187

188188
3. You can obtain the signing certificate base64 encoded string from your IDP metadata file. An example of this location has been provided but may differ slightly based on your implementation.
189189

294 KB
Loading

articles/active-directory/hybrid/reference-connect-ports.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ This table describes the ports and protocols that are required for communication
3535
| SMB | 445 (TCP/UDP) |Used by Seamless SSO to create a computer account in the AD forest. |
3636
| LDAP/SSL |636 (TCP/UDP) |Used for data import from AD. The data transfer is signed and encrypted. Only used if you are using SSL. |
3737
| RPC |49152- 65535 (Random high RPC Port)(TCP/UDP) |Used during the initial configuration of Azure AD Connect when it binds to the AD forests, and during Password synchronization. See [KB929851](https://support.microsoft.com/kb/929851), [KB832017](https://support.microsoft.com/kb/832017), and [KB224196](https://support.microsoft.com/kb/224196) for more information. |
38+
|WinRM | 5985 (TCP/UDP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard|
39+
|AD DS Web Services | 9389 (TCP/UDP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard |
3840

3941
## Table 2 - Azure AD Connect and Azure AD
4042
This table describes the ports and protocols that are required for communication between the Azure AD Connect server and Azure AD.
@@ -97,8 +99,10 @@ This table describes the following outbound ports and protocols that are require
9799

98100
| Protocol | Ports | Description |
99101
| --- | --- | --- |
100-
| HTTPS |443(TCP/UDP) |Outbound |
101-
| Azure Service Bus |5671 (TCP/UDP) |Outbound |
102+
| HTTPS |443(TCP) |Outbound |
103+
| Azure Service Bus |5671 (TCP) |Outbound |
104+
105+
Azure Service Bus port 5671 is no longer required for the latest version of agent. The latest Azure AD Connect Health agent version only required port 443.
102106

103107
### 7b - Endpoints for Azure AD Connect Health agent for (AD FS/Sync) and Azure AD
104108
For a list of endpoints, see [the Requirements section for the Azure AD Connect Health agent](how-to-connect-health-agent-install.md#requirements).

articles/active-directory/hybrid/whatis-aadc-admin-agent.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 04/25/2019
10+
ms.date: 09/04/2019
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.topic: conceptual
@@ -26,19 +26,20 @@ The information that the Azure AD Connect Administration Agent retrieves from yo
2626
The Azure AD Connect Administration Agent is not installed on the Azure AD Connect Server by default.
2727

2828
## Install the Azure AD Connect Administration Agent on the Azure AD Connect server
29-
The Azure AD Connect Administration Agent binaries are placed in the AAD Connect server. To install the agent, do the following:
3029

30+
Prerequisites:
31+
1. Azure AD Connect is installed on the server
32+
2. Azure AD Connect Health is installed on the server
3133

34+
![admin agent](media/whatis-aadc-admin-agent/adminagent0.png)
3235

33-
1. Open powershell in admin mode
34-
2. Navigate to the directory where the application is located
35-
cd “C:\Program Files\Microsoft Azure Active Directory Connect\SetupFiles”
36-
3. Run the AADConnectAdminAgentSetup.exe application
37-
38-
When prompted, please enter your Azure AD global admin credentials.
36+
The Azure AD Connect Administration Agent binaries are placed in the AAD Connect server. To install the agent, do the following:
3937

40-
>[!NOTE]
41-
>There is a known issue where you will be prompted for your credentials multiple times. This will be fixed in the next release.
38+
1. Open powershell in admin mode
39+
2. Navigate to the directory where the application is located cd “C:\Program Files\Microsoft Azure Active Directory Connect\Tools”
40+
3. Run ConfigureAdminAgent.ps1
41+
42+
When prompted, please enter your Azure AD global admin credentials. This should be the same credentials entered during Azure AD Connect installation.
4243

4344
After the agent is installed, you’ll see the following two new programs in the “Add/Remove Programs” list in the Control Panel of your server:
4445

articles/active-directory/reports-monitoring/reference-audit-activities.md

Lines changed: 34 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -405,6 +405,14 @@ This articles lists the audit activities that can be logged in your audit logs.
405405
|Directory Management|Get idps for a specific admin flow|
406406
|Directory Management|Get list of all admin flows|
407407
|Directory Management|Get list of tags for all admin flows for all users|
408+
|Group Management|Bulk Download group members - started|
409+
|Group Management|Bulk Download group members - finished|
410+
|Group Management|Bulk import group members - started|
411+
|Group Management|Bulk import group members - finished|
412+
|Group Management|Bulk remove group members - started|
413+
|Group Management|Bulk remove group members - finished|
414+
|Group Management|Bulk download groups - started|
415+
|Group Management|Bulk download groups - finished|
408416
|Group Management|Get list of tenants for a user|
409417
|Group Management|Get local accounts' self-asserted claims|
410418
|Group Management|Get localized resource json|
@@ -451,28 +459,42 @@ This articles lists the audit activities that can be logged in your audit logs.
451459
|Role Management|Delete device configuration|
452460
|Role Management|Device no longer compliant|
453461
|Role Management|Device no longer managed|
454-
|User Management|Remove registered owner from device|
455-
|User Management|Remove registered users from device|
456-
|User Management|Update device|
457-
|User Management|Update device configuration|
462+
|User Management|AccessReview_Review|
463+
|User Management|AccessReview_Update|
464+
|User Management|ActivationAborted|
465+
|User Management|ActivationApproved|
466+
|User Management|ActivationCanceled|
467+
|User Management|ActivationRequested|
458468
|User Management|Add eligible member to role|
459469
|User Management|Add member to role|
460470
|User Management|Add role assignment to role definition|
461471
|User Management|Add role from template|
462472
|User Management|Add scoped member to role|
473+
|User Management|Added|
474+
|User Management|Assign|
475+
|User Management|Bulk create users - started|
476+
|User Management|Bulk create users - finished|
477+
|User Management|Bulk delete users - started|
478+
|User Management|Bulk delete users - finished|
479+
|User Management|Bulk download users - started|
480+
|User Management|Bulk download users - finished|
481+
|User Management|Bulk restore deleted users - started|
482+
|User Management|Bulk restore deleted users - finished|
483+
|User Management|Bulk invite users - started|
484+
|User Management|Bulk invite users - finished|
485+
|User Management|Remove registered owner from device|
486+
|User Management|Remove registered users from device|
463487
|User Management|Remove eligible member from role|
464488
|User Management|Remove member from role|
465489
|User Management|Remove role assignment from role definition|
466490
|User Management|Remove scoped member from role|
491+
|User Management|Update device|
492+
|User Management|Update device configuration|
467493
|User Management|Update role|
468-
|User Management|AccessReview_Review|
469-
|User Management|AccessReview_Update|
470-
|User Management|ActivationAborted|
471-
|User Management|ActivationApproved|
472-
|User Management|ActivationCanceled|
473-
|User Management|ActivationRequested|
474-
|User Management|Added|
475-
|User Management|Assign|
494+
495+
496+
497+
476498

477499

478500
## Identity protection

0 commit comments

Comments
 (0)