Skip to content

Commit f491653

Browse files
authored
Merge branch 'main' into sign-in-updates-1
2 parents 41580ac + d799636 commit f491653

File tree

910 files changed

+5432
-6285
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

910 files changed

+5432
-6285
lines changed

.openpublishing.redirection.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13437,6 +13437,21 @@
1343713437
"redirect_url": "/azure/governance/policy/samples/rbi-itf-nbfc-2017",
1343813438
"redirect_document_id": false
1343913439
},
13440+
{
13441+
"source_path_from_root": "/articles/governance/policy/samples/gov-dod-impact-level-4.md",
13442+
"redirect_url": "/azure/governance/policy/samples",
13443+
"redirect_document_id": false
13444+
},
13445+
{
13446+
"source_path_from_root": "/articles/governance/policy/samples/gov-dod-impact-level-5.md",
13447+
"redirect_url": "/azure/governance/policy/samples",
13448+
"redirect_document_id": false
13449+
},
13450+
{
13451+
"source_path_from_root": "/articles/governance/policy/samples/swift-cscf-v2021.md",
13452+
"redirect_url": "/azure/governance/policy/samples/swift-csp-cscf-2021",
13453+
"redirect_document_id": false
13454+
},
1344013455
{
1344113456
"source_path_from_root": "/articles/azure-policy/create-manage-policy.md",
1344213457
"redirect_url": "/azure/governance/policy/tutorials/create-and-manage",
@@ -24342,6 +24357,26 @@
2434224357
"redirect_url": "/azure/networking/manage-apps/connectivity-interoperability-data-plane",
2434324358
"redirect_document_id": false
2434424359
},
24360+
{
24361+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-preface.md",
24362+
"redirect_url": "/azure/networking/connectivity-interoperability-preface",
24363+
"redirect_document_id": false
24364+
},
24365+
{
24366+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-configuration.md",
24367+
"redirect_url": "/azure/networking/connectivity-interoperability-configuration",
24368+
"redirect_document_id": false
24369+
},
24370+
{
24371+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-control-plane.md",
24372+
"redirect_url": "/azure/networking/connectivity-interoperability-control-plane",
24373+
"redirect_document_id": false
24374+
},
24375+
{
24376+
"source_path_from_root": "/articles/networking/manage-apps/connectivty-interoperability-data-plane.md",
24377+
"redirect_url": "/azure/networking/connectivity-interoperability-data-plane",
24378+
"redirect_document_id": false
24379+
},
2434524380
{
2434624381
"source_path_from_root": "/articles/operator-nexus/howto-hybrid-aks.md",
2434724382
"redirect_url": "/azure/operator-nexus/howto-kubernetes-cluster-agent-pools",

articles/active-directory-b2c/deploy-custom-policies-github-action.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ For the GitHub Action to access data in Microsoft Graph, grant the registered ap
4848

4949
GitHub secrets are encrypted environment variables that you create in an organization, repository, or repository environment. In this step, you store the application secret for the application you registered earlier in the [Register an MS Graph application](#register-a-microsoft-graph-application) step.
5050

51-
The GitHub Action for deploying Azure AD B2C custom policies uses the secret to acquire an access token that is used to interact with the Microsoft Graph API. For more information, see [Creating encrypted secrets for a repository](https://docs.github.com/en/actions/security-guides/using-secrets-in-github-actions#creating-encrypted-secrets-for-a-repository).
51+
The GitHub Action for deploying Azure AD B2C custom policies uses the secret to acquire an access token that is used to interact with the Microsoft Graph API. For more information, see [Creating encrypted secrets for a repository](https://docs.github.com/actions/security-guides/using-secrets-in-github-actions#creating-encrypted-secrets-for-a-repository).
5252

5353
To create a GitHub secret, follow these steps:
5454

@@ -141,9 +141,9 @@ To test the workflow you created, **Push** the changes of your custom policy. On
141141

142142
## Optional: Schedule your workflow
143143

144-
The workflow you created is triggered by the [push](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#push) event. If you prefer, you can choose another event to trigger the workflow, for example a [pull request](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#pull_request).
144+
The workflow you created is triggered by the [push](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#push) event. If you prefer, you can choose another event to trigger the workflow, for example a [pull request](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#pull_request).
145145

146-
You can also schedule a workflow to run at specific UTC times using [POSIX cron syntax](https://pubs.opengroup.org/onlinepubs/9699919799/utilities/crontab.html#tag_20_25_07). The schedule event allows you to trigger a workflow at a scheduled time. For more information, see [Scheduled events](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#scheduled-events).
146+
You can also schedule a workflow to run at specific UTC times using [POSIX cron syntax](https://pubs.opengroup.org/onlinepubs/9699919799/utilities/crontab.html#tag_20_25_07). The schedule event allows you to trigger a workflow at a scheduled time. For more information, see [Scheduled events](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#scheduled-events).
147147

148148
The following example triggers the workflow every day at 5:30 and 17:30 UTC:
149149

@@ -170,4 +170,4 @@ To edit your workflow:
170170

171171
## Next steps
172172

173-
- Learn how to configure [Events that trigger workflows](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows)
173+
- Learn how to configure [Events that trigger workflows](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows)

articles/active-directory-b2c/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -217,10 +217,10 @@ conceptualContent:
217217
url: custom-domain.md
218218
itemType: how-to-guide
219219
- text: Customize user experiences using custom policies
220-
url: add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy
220+
url: add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy
221221
itemType: how-to-guide
222222
- text: Custom policy how-to guide series
223-
url: custom-policies-series-overview.md
223+
url: custom-policies-series-overview.md
224224
itemType: how-to-guide
225225
# - text: Use API connectors
226226
# url: add-api-connector.md?pivots=b2c-user-flow

articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this step, you'll configure the Postman app and invoke the API using the conf
3131
1. From the **Workspaces** menu, select **Create Workspace** to create a new Workspace called **Microsoft Entra ID Provisioning API**.
3232
1. Download the following Postman collections and save it in your local directory.
3333
- [Entra ID Inbound Provisioning.postman_collection.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Entra%20ID%20Inbound%20Provisioning.postman_collection.json) (Request collection)
34-
- [Test-API2AAD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AAD.postman_environment.json) (Environment collection for API-driven provisioning to on-premises AD)-
34+
- [Test-API2AAD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AAD.postman_environment.json) (Environment collection for API-driven provisioning to Azure AD)-
3535
- [Test-API2AD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AD.postman_environment.json) (Environment collection for API-driven provisioning to on-premises AD)
3636
1. Use the **Import** option in Postman to import both of these files into your Workspace.
3737
:::image type="content" source="media/inbound-provisioning-api-postman/postman-import-elements.png" alt-text="Screenshot of Postman Import elements." lightbox="media/inbound-provisioning-api-postman/postman-import-elements.png":::

articles/active-directory/app-provisioning/index.yml

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,11 @@ landingContent:
2929
- linkListType: tutorial
3030
links:
3131
- text: SAP Cloud Platform Identity Authentication provisioning
32-
url: ../saas-apps/sap-cloud-platform-identity-authentication-provisioning-tutorial.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
32+
url: ../saas-apps/sap-cloud-platform-identity-authentication-provisioning-tutorial.md?context=/azure/active-directory/app-provisioning/context/app-provisioning-context
3333
- text: Oracle Fusion ERP provisioning
34-
url: ../saas-apps/oracle-fusion-erp-provisioning-tutorial.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
34+
url: ../saas-apps/oracle-fusion-erp-provisioning-tutorial.md?context=/azure/active-directory/app-provisioning/context/app-provisioning-context
3535
- text: Atlassian Cloud provisioning
36-
url: ../saas-apps/atlassian-cloud-provisioning-tutorial.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
36+
url: ../saas-apps/atlassian-cloud-provisioning-tutorial.md?context=/azure/active-directory/app-provisioning/context/app-provisioning-context
3737
- linkListType: how-to-guide
3838
links:
3939
- text: Adding a gallery app? Configure provisioning to the app
@@ -47,7 +47,7 @@ landingContent:
4747
- linkListType: overview
4848
links:
4949
- text: Provisioning with SCIM (Identity Standards Blog)
50-
url: https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010
50+
url: https://techcommunity.microsoft.com/t5/security-compliance-and-identity/provisioning-with-scim-getting-started/ba-p/880010
5151
- linkListType: how-to-guide
5252
links:
5353
- text: Developing an app? Use SCIM for automatic provisioning
@@ -61,7 +61,6 @@ landingContent:
6161
- linkListType: tutorial
6262
links:
6363
- text: Workday provisioning
64-
url: ../saas-apps/workday-inbound-tutorial.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
64+
url: ../saas-apps/workday-inbound-tutorial.md?context=/azure/active-directory/app-provisioning/context/app-provisioning-context
6565
- text: SAP SuccessFactors provisioning
66-
url: ../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
67-
66+
url: ../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md?context=/azure/active-directory/app-provisioning/context/app-provisioning-context

articles/active-directory/app-provisioning/insufficient-access-rights-error-troubleshooting.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,4 +110,3 @@ You can set the registry option to [skip GMSA configuration](https://go.microsof
110110
## Next steps
111111

112112
* [Learn more about the Inbound Provisioning API](inbound-provisioning-api-concepts.md)
113-

articles/active-directory/app-provisioning/scim-validator-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP
8282
> [!NOTE]
8383
> You can only use HTTP endpoints for local tests. The Azure AD provisioning service requires that your endpoint support HTTPS.
8484
85-
1. Download [Postman](https://www.getpostman.com/downloads/) and start the application.
85+
1. Download [Postman](https://www.postman.com/downloads/) and start the application.
8686
1. Copy and paste this link into Postman to import the test collection: `https://aka.ms/ProvisioningPostman`.
8787

8888
![Screenshot that shows importing the test collection in Postman.](media/scim-validator-tutorial/postman-collection.png)

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ items:
102102
- name: Export and import your configuration
103103
href: export-import-provisioning-configuration.md
104104
- name: Provisioning reports
105-
href: ../reports-monitoring/concept-provisioning-logs.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
105+
href: ../reports-monitoring/concept-provisioning-logs.md?context=/azure/active-directory/app-provisioning/context/app-provisioning-context
106106
- name: Provisioning insights workbook
107107
href: provisioning-workbook.md
108108
- name: Workday provisioning scenarios
@@ -124,7 +124,7 @@ items:
124124
- name: Troubleshooting on-premises provisioning
125125
href: on-premises-ecma-troubleshoot.md
126126
- name: Provisioning logs
127-
href: ../reports-monitoring/concept-provisioning-logs.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
127+
href: ../reports-monitoring/concept-provisioning-logs.md?context=/azure/active-directory/app-provisioning/context/app-provisioning-context
128128
- name: Troubleshoot HR provisioning
129129
items:
130130
- name: Attribute retrieval issues

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1377,7 +1377,7 @@ The SCIM spec doesn't define a SCIM-specific scheme for authentication and autho
13771377

13781378
|Authorization method|Pros|Cons|Support|
13791379
|--|--|--|--|
1380-
|Username and password (not recommended or supported by Azure AD)|Easy to implement|Insecure - [Your Pa$$word doesn't matter](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984)|Not supported for new gallery or non-gallery apps.|
1380+
|Username and password (not recommended or supported by Azure AD)|Easy to implement|Insecure - [Your Pa$$word doesn't matter](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/your-pa-word-doesn-t-matter/ba-p/731984)|Not supported for new gallery or non-gallery apps.|
13811381
|Long-lived bearer token|Long-lived tokens don't require a user to be present. They're easy for admins to use when setting up provisioning.|Long-lived tokens can be hard to share with an admin without using insecure methods such as email. |Supported for gallery and non-gallery apps. |
13821382
|OAuth authorization code grant|Access tokens have a shorter life than passwords, and have an automated refresh mechanism that long-lived bearer tokens don't have. A real user must be present during initial authorization, adding a level of accountability. |Requires a user to be present. If the user leaves the organization, the token is invalid, and authorization needs to be completed again.|Supported for gallery apps, but not non-gallery apps. However, you can provide an access token in the UI as the secret token for short term testing purposes. Support for OAuth code grant on non-gallery is in our backlog, in addition to support for configurable auth / token URLs on the gallery app.|
13831383
|OAuth client credentials grant|Access tokens have a shorter life than passwords, and have an automated refresh mechanism that long-lived bearer tokens don't have. Both the authorization code grant and the client credentials grant create the same type of access token, so moving between these methods is transparent to the API. Provisioning can be automated, and new tokens can be silently requested without user interaction. ||Supported for gallery apps, but not non-gallery apps. However, you can provide an access token in the UI as the secret token for short term testing purposes. Support for OAuth client credentials grant on non-gallery is in our backlog.|
@@ -1433,8 +1433,8 @@ To help drive awareness and demand of our joint integration, we recommend you up
14331433
> * Ensure your sales and customer support teams are aware, ready, and can speak to the integration capabilities. Brief your teams, provide them with FAQs and include the integration into your sales materials.
14341434
> * Craft a blog post or press release that describes the joint integration, the benefits and how to get started. [Example: Imprivata and Azure AD Press Release](https://www.imprivata.com/company/press/imprivata-introduces-iam-cloud-platform-healthcare-supported-microsoft)
14351435
> * Leverage your social media like Twitter, Facebook or LinkedIn to promote the integration to your customers. Be sure to include @AzureAD so we can retweet your post. [Example: Imprivata Twitter Post](https://twitter.com/azuread/status/1123964502909779968)
1436-
> * Create or update your marketing pages/website (e.g. integration page, partner page, pricing page, etc.) to include the availability of the joint integration. [Example: Pingboard integration Page](https://pingboard.com/org-chart-for), [Smartsheet integration page](https://www.smartsheet.com/marketplace/apps/microsoft-azure-ad), [Monday.com pricing page](https://monday.com/pricing/)
1437-
> * Create a help center article or technical documentation on how customers can get started. [Example: Envoy + Microsoft Azure AD integration.](https://envoy.help/en/articles/3453335-microsoft-azure-active-directory-integration/)
1436+
> * Create or update your marketing pages/website (e.g. integration page, partner page, pricing page, etc.) to include the availability of the joint integration. [Example: Pingboard integration Page](https://pingboard.com/org-chart-for), [Smartsheet integration page](https://www.smartsheet.com/marketplace/apps/directory-integrations), [Monday.com pricing page](https://monday.com/pricing/)
1437+
> * Create a help center article or technical documentation on how customers can get started. [Example: Envoy + Microsoft Azure AD integration.](https://envoy.help/en/articles/3453335-microsoft-azure-active-directory-integration)
14381438
> * Alert customers of the new integration through your customer communication (monthly newsletters, email campaigns, product release notes).
14391439

14401440
## Next steps

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Azure AD user provisioning can help address these challenges. To learn more abou
7676
7777
## What applications and systems can I use with Azure AD automatic user provisioning?
7878

79-
Azure AD features preintegrated support for many popular SaaS apps and human resources systems, and generic support for apps that implement specific parts of the [SCIM 2.0 standard](https://techcommunity.microsoft.com/t5/Identity-Standards-Blog/Provisioning-with-SCIM-getting-started/ba-p/880010).
79+
Azure AD features preintegrated support for many popular SaaS apps and human resources systems, and generic support for apps that implement specific parts of the [SCIM 2.0 standard](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/provisioning-with-scim-getting-started/ba-p/880010).
8080

8181
* **Preintegrated applications (gallery SaaS apps)**: You can find all applications for which Azure AD supports a preintegrated provisioning connector in [Tutorials for integrating SaaS applications with Azure Active Directory](../saas-apps/tutorial-list.md). The preintegrated applications listed in the gallery generally use SCIM 2.0-based user management APIs for provisioning.
8282

0 commit comments

Comments
 (0)