Skip to content

Commit f45eddf

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 52455c2 + ff6d152 commit f45eddf

File tree

110 files changed

+883
-483
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

110 files changed

+883
-483
lines changed

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 01/31/2022
11+
ms.date: 02/03/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -202,12 +202,12 @@ The following table describes how you can configure deprovisioning actions with
202202

203203
|Scenario|How to configure in Azure AD|
204204
|--|--|
205-
|If a user is unassigned from an app, soft-deleted in Azure AD, or blocked from sign-in, do nothing.|Remove isSoftDeleted from the attribute mappings and / or set the [skip out of scope deletions](https://docs.microsoft.com/azure/active-directory/app-provisioning/skip-out-of-scope-deletions) property to true.|
205+
|If a user is unassigned from an app, soft-deleted in Azure AD, or blocked from sign-in, do nothing.|Remove isSoftDeleted from the attribute mappings and / or set the [skip out of scope deletions](skip-out-of-scope-deletions.md) property to true.|
206206
|If a user is unassigned from an app, soft-deleted in Azure AD, or blocked from sign-in, set a specific attribute to true / false.|Map isSoftDeleted to the attribute that you would like to set to false.|
207207
|When a user is disabled in Azure AD, unassigned from an app, soft-deleted in Azure AD, or blocked from sign-in, send a DELETE request to the target application.|This is currently supported for a limited set of gallery applications where the functionality is required. It is not configurable by customers.|
208-
|When a user is deleted in Azure AD, do nothing in the target application.|Ensure that "Delete" is not selected as one of the target object actions in the [attriubte configuration experience](https://docs.microsoft.com/azure/active-directory/app-provisioning/skip-out-of-scope-deletions).|
208+
|When a user is deleted in Azure AD, do nothing in the target application.|Ensure that "Delete" is not selected as one of the target object actions in the [attriubte configuration experience](skip-out-of-scope-deletions.md).|
209209
|When a user is deleted in Azure AD, set the value of an attribute in the target application.|Not supported.|
210-
|When a user is deleted in Azure AD, delete the user in the target application|This is supported. Ensure that Delete is selected as one of the target object actions in the [attribute configuration experience](https://docs.microsoft.com/azure/active-directory/app-provisioning/skip-out-of-scope-deletions).|
210+
|When a user is deleted in Azure AD, delete the user in the target application|This is supported. Ensure that Delete is selected as one of the target object actions in the [attribute configuration experience](skip-out-of-scope-deletions.md).|
211211

212212
**Known limitations**
213213

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: karenhoran
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 11/19/2021
10+
ms.date: 02/03/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -56,7 +56,7 @@ To resolve the following issues, run the ECMA host as an admin:
5656
5757
## Turn on verbose logging
5858
59-
By default, `switchValue` for the ECMA Connector Host is set to `Error`. This setting means it will only log events that are errors. To enable verbose logging for the ECMA host service or wizard, set `switchValue` to `Verbose` in both locations as shown.
59+
By default, `switchValue` for the ECMA Connector Host is set to `Verbose`. This will emit detailed logging that will help you troubleshoot issues. You can change the verbosity to `Error` if you would like to limit the number of logs emitted to only errors. Wen using the SQL connector without Windows Integrated Auth, we recommend setting the `switchValue` to `Error` as it will ensure that the connection string is not emitted in the logs. In order to change the verbosity to error, please update the `switchValue` to "Error" in both places as shown below.
6060
6161
The file location for verbose service logging is C:\Program Files\Microsoft ECMA2Host\Service\Microsoft.ECMA2Host.Service.exe.config.
6262
```
@@ -70,30 +70,30 @@ The file location for verbose service logging is C:\Program Files\Microsoft ECMA
7070
</appSettings>
7171
<system.diagnostics>
7272
<sources>
73-
<source name="ConnectorsLog" switchValue="Verbose">
73+
<source name="ConnectorsLog" switchValue="Error">
7474
<listeners>
7575
<add initializeData="ConnectorsLog" type="System.Diagnostics.EventLogTraceListener, System, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" name="ConnectorsLog" traceOutputOptions="LogicalOperationStack, DateTime, Timestamp, Callstack">
7676
<filter type=""/>
7777
</add>
7878
</listeners>
7979
</source>
8080
<!-- Choose one of the following switchTrace: Off, Error, Warning, Information, Verbose -->
81-
<source name="ECMA2Host" switchValue="Verbose">
81+
<source name="ECMA2Host" switchValue="Error">
8282
<listeners>
8383
<add initializeData="ECMA2Host" type="System.Diagnos
8484
```
8585
86-
The file location for verbose wizard logging is C:\Program Files\Microsoft ECMA2Host\Wizard\Microsoft.ECMA2Host.ConfigWizard.exe.config.
86+
The file location for wizard logging is C:\Program Files\Microsoft ECMA2Host\Wizard\Microsoft.ECMA2Host.ConfigWizard.exe.config.
8787
```
88-
<source name="ConnectorsLog" switchValue="Verbose">
88+
<source name="ConnectorsLog" switchValue="Error">
8989
<listeners>
9090
<add initializeData="ConnectorsLog" type="System.Diagnostics.EventLogTraceListener, System, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" name="ConnectorsLog" traceOutputOptions="LogicalOperationStack, DateTime, Timestamp, Callstack">
9191
<filter type=""/>
9292
</add>
9393
</listeners>
9494
</source>
9595
<!-- Choose one of the following switchTrace: Off, Error, Warning, Information, Verbose -->
96-
<source name="ECMA2Host" switchValue="Verbose">
96+
<source name="ECMA2Host" switchValue="Error">
9797
<listeners>
9898
<add initializeData="ECMA2Host" type="System.Diagnostics.EventLogTraceListener, System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" name="ECMA2HostListener" traceOutputOptions="LogicalOperationStack, DateTime, Timestamp, Callstack" />
9999
```

articles/active-directory/app-provisioning/whats-new-docs.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory application provisioning"
33
description: "New and updated documentation for the Azure Active Directory application provisioning."
4-
ms.date: 01/07/2022
4+
ms.date: 02/03/2022
55
ms.service: active-directory
66
ms.subservice: app-provisioning
77
ms.topic: reference
@@ -15,6 +15,14 @@ manager: karenhoran
1515

1616
Welcome to what's new in Azure Active Directory application provisioning documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the provisioning service, see [What's new in Azure Active Directory](../fundamentals/whats-new.md).
1717

18+
## January 2022
19+
20+
### Updated articles
21+
22+
- [How Azure Active Directory provisioning integrates with SAP SuccessFactors](sap-successfactors-integration-reference.md)
23+
- [Reference for writing expressions for attribute mappings in Azure Active Directory](functions-for-customizing-application-data.md)
24+
25+
1826
## December 2021
1927

2028
### Updated articles

articles/active-directory/app-proxy/whats-new-docs.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory application proxy"
33
description: "New and updated documentation for the Azure Active Directory application proxy."
4-
ms.date: 01/07/2022
4+
ms.date: 02/03/2022
55
ms.service: active-directory
66
ms.subservice: app-proxy
77
ms.topic: reference
@@ -15,6 +15,13 @@ manager: karenhoran
1515

1616
Welcome to what's new in Azure Active Directory application proxy documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the service, see [What's new in Azure Active Directory](../fundamentals/whats-new.md).
1717

18+
## January 2022
19+
20+
### Updated articles
21+
22+
- [Secure access to on-premises APIs with Azure Active Directory Application Proxy](application-proxy-secure-api-access.md)
23+
24+
1825
## December 2021
1926

2027
### Updated articles

articles/active-directory/authentication/active-directory-passwords-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ sections:
125125
- question: |
126126
How can I educate my users about where to go to reset their passwords?
127127
answer: |
128-
> Try some of the suggestions in our [SSPR deployment](howto-sspr-deployment.md#plan-communications) article.
128+
> Try some of the suggestions in our [SSPR deployment](howto-sspr-deployment.md) article.
129129
>
130130
>
131131
- question: |

0 commit comments

Comments
 (0)