Skip to content

Commit f4d31ed

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-client-intune
2 parents 1514e9a + 20add9a commit f4d31ed

File tree

986 files changed

+14154
-14461
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

986 files changed

+14154
-14461
lines changed

.openpublishing.publish.config.json

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -878,6 +878,12 @@
878878
"branch": "docs-snippets",
879879
"branch_mapping": {}
880880
},
881+
{
882+
"path_to_root": "ms-identity-python-webapp",
883+
"url": "https://github.com/Azure-Samples/ms-identity-python-webapp",
884+
"branch": "main",
885+
"branch_mapping": {}
886+
},
881887
{
882888
"path_to_root": "ms-identity-node",
883889
"url": "https://github.com/Azure-Samples/ms-identity-node",
@@ -937,6 +943,12 @@
937943
"url": "https://github.com/Azure-Samples/azure-cache-redis-samples",
938944
"branch": "main",
939945
"branch_mapping": {}
946+
},
947+
{
948+
"path_to_root": "microsoft-graph",
949+
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs",
950+
"branch": "main",
951+
"branch_mapping": {}
940952
}
941953
],
942954
"branch_target_mapping": {
@@ -972,8 +984,6 @@
972984
".openpublishing.redirection.baremetal-infrastructure.json",
973985
".openpublishing.redirection.defender-for-cloud.json",
974986
".openpublishing.redirection.defender-for-iot.json",
975-
".openpublishing.redirection.deployment-environments.json",
976-
".openpublishing.redirection.dev-box.json",
977987
".openpublishing.redirection.healthcare-apis.json",
978988
".openpublishing.redirection.iot-hub-device-update.json",
979989
".openpublishing.redirection.json",
@@ -1030,6 +1040,8 @@
10301040
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
10311041
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
10321042
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
1033-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
1043+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
1044+
"articles/dev-box/.openpublishing.redirection.dev-box.json",
1045+
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json"
10341046
]
10351047
}

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11180,6 +11180,16 @@
1118011180
"source_path_from_root": "/articles/active-directory/governance/create-access-review-privileged-access-groups.md",
1118111181
"redirect_url": "/azure/active-directory/governance/create-access-review-pim-for-groups",
1118211182
"redirect_document_id": false
11183+
},
11184+
{
11185+
"source_path_from_root": "/articles/active-directory-domain-services/concepts-resource-forest.md",
11186+
"redirect_url": "/azure/active-directory-domain-services/concepts-forest-trust",
11187+
"redirect_document_id": false
11188+
},
11189+
{
11190+
"source_path_from_root": "/articles/active-directory-domain-services/create-resource-forest-powershell.md",
11191+
"redirect_url": "/azure/active-directory-domain-services/create-forest-trust-powershell",
11192+
"redirect_document_id": false
1118311193
}
1118411194
]
1118511195
}

.openpublishing.redirection.azure-resource-manager.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1395,6 +1395,11 @@
13951395
"redirect_url": "/azure/azure-resource-manager/managed-applications/cli-samples",
13961396
"redirect_document_id": false
13971397
},
1398+
{
1399+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/cli-samples.md",
1400+
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-service-catalog-app",
1401+
"redirect_document_id": false
1402+
},
13981403
{
13991404
"source_path_from_root": "/articles/managed-applications/concepts-custom-providers-built-in-policy.md",
14001405
"redirect_url": "/azure/azure-resource-manager/custom-providers/concepts-built-in-policy",
@@ -1585,6 +1590,11 @@
15851590
"redirect_url": "/azure/azure-resource-manager/managed-applications/powershell-samples",
15861591
"redirect_document_id": false
15871592
},
1593+
{
1594+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/powershell-samples.md",
1595+
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-service-catalog-app",
1596+
"redirect_document_id": false
1597+
},
15881598
{
15891599
"source_path_from_root": "/articles/managed-applications/publish-managed-app-definition-quickstart.md",
15901600
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-service-catalog-app",
@@ -1889,6 +1899,26 @@
18891899
"source_path_from_root": "/articles/xplat-cli-azure-resource-manager.md",
18901900
"redirect_url": "/azure/azure-resource-manager/management/manage-resources-cli",
18911901
"redirect_document_id": false
1902+
},
1903+
{
1904+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/scripts/managed-application-define-create-cli-sample.md",
1905+
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-service-catalog-app",
1906+
"redirect_document_id": false
1907+
},
1908+
{
1909+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/scripts/managed-application-powershell-sample-create-definition.md",
1910+
"redirect_url": "/azure/azure-resource-manager/managed-applications/publish-service-catalog-app",
1911+
"redirect_document_id": false
1912+
},
1913+
{
1914+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/scripts/managed-application-poweshell-sample-create-application.md",
1915+
"redirect_url": "/azure/azure-resource-manager/managed-applications/deploy-service-catalog-quickstart",
1916+
"redirect_document_id": false
1917+
},
1918+
{
1919+
"source_path_from_root": "/articles/azure-resource-manager/managed-applications/scripts/managed-application-powershell-sample-get-managed-group-resize-vm.md",
1920+
"redirect_url": "/azure/azure-resource-manager/managed-applications/overview",
1921+
"redirect_document_id": false
18921922
}
18931923
]
18941924
}

.openpublishing.redirection.dev-box.json

Lines changed: 0 additions & 19 deletions
This file was deleted.

articles/active-directory-b2c/billing.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@ Usage charges for Azure AD B2C are billed to an Azure subscription. You need to
7474

7575
A subscription linked to an Azure AD B2C tenant can be used for the billing of Azure AD B2C usage or other Azure resources, including additional Azure AD B2C resources. It can't be used to add other Azure license-based services or Office 365 licenses within the Azure AD B2C tenant.
7676

77+
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-create-subscription.md)]
78+
7779
### Prerequisites
7880

7981
* [Azure subscription](https://azure.microsoft.com/free/)

articles/active-directory-b2c/manage-users-portal.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,10 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/24/2023
11+
ms.date: 03/30/2023
1212
ms.author: godonnell
1313
ms.subservice: B2C
14+
ms.custom: "b2c-support"
1415
---
1516

1617
# Use the Azure portal to create and delete consumer users in Azure AD B2C
@@ -34,7 +35,7 @@ This article focuses on working with **consumer accounts** in the Azure portal.
3435
1. Sign in to the [Azure portal](https://portal.azure.com).
3536
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
3637
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
37-
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
38+
1. In the left menu, select **Azure Active Directory**. Or, select **All services** and search for and select **Azure Active Directory**.
3839
1. Under **Manage**, select **Users**.
3940
1. Select **New user**.
4041
1. Select **Create Azure AD B2C user**.

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,11 @@ Before you create your Azure AD B2C tenant, you need to take the following consi
4040

4141
- An Azure account that's been assigned at least the [Contributor](../role-based-access-control/built-in-roles.md) role within the subscription or a resource group within the subscription is required.
4242

43+
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-create-subscription.md)]
44+
4345
## Create an Azure AD B2C tenant
4446
>[!NOTE]
45-
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched off, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
47+
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched on, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
4648
4749
1. Sign in to the [Azure portal](https://portal.azure.com/).
4850

articles/active-directory-domain-services/TOC.yml

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@
3737
href: template-create-instance.md
3838
- name: Configure scoped synchronization using Azure AD PowerShell
3939
href: powershell-scoped-synchronization.md
40-
- name: Create a resource forest and trust using Azure PowerShell
41-
href: create-resource-forest-powershell.md
40+
- name: Create a forest trust using Azure PowerShell
41+
href: create-forest-trust-powershell.md
4242
- name: Concepts
4343
items:
4444
- name: Administration basics
@@ -47,12 +47,8 @@
4747
href: scenarios.md
4848
- name: Replica sets
4949
href: concepts-replica-sets.md
50-
- name: Forests and trusts
51-
items:
52-
- name: Resource forests
53-
href: concepts-resource-forest.md
54-
- name: Forest trusts
55-
href: concepts-forest-trust.md
50+
- name: Forests trusts
51+
href: concepts-forest-trust.md
5652
- name: How Azure AD DS synchronization works
5753
href: synchronization.md
5854
- name: How password hash synchronization works

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/29/2023
12+
ms.date: 03/23/2023
1313
ms.author: justinha
1414

1515
---
@@ -69,8 +69,6 @@ By default, a managed domain is created as a *user* forest. This type of forest
6969

7070
In an Azure AD DS *resource* forest, users authenticate over a one-way forest *trust* from their on-premises AD DS. With this approach, the user objects and password hashes aren't synchronized to Azure AD DS. The user objects and credentials only exist in the on-premises AD DS. This approach lets enterprises host resources and application platforms in Azure that depend on classic authentication such LDAPS, Kerberos, or NTLM, but any authentication issues or concerns are removed.
7171

72-
For more information about forest types in Azure AD DS, see [What are resource forests?][concepts-forest] and [How do forest trusts work in Azure AD DS?][concepts-trust]
73-
7472
## Azure AD DS SKUs
7573

7674
In Azure AD DS, the available performance and features are based on the SKU. You select a SKU when you create the managed domain, and you can switch SKUs as your business requirements change after the managed domain has been deployed. The following table outlines the available SKUs and the differences between them:

articles/active-directory-domain-services/change-sku.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 01/29/2023
12+
ms.date: 03/23/2023
1313
ms.author: justinha
1414

1515
#Customer intent: As an identity administrator, I want to change the SKU for my Azure AD Domain Services managed domain to use different features as my business requirements change.
@@ -36,12 +36,9 @@ To complete this article, you need the following resources and privileges:
3636

3737
## SKU change limitations
3838

39-
You can change SKUs up or down after the managed domain has been deployed. However, if you use a resource forest and have created one-way outbound forest trusts from Azure AD DS to an on-premises AD DS environment, there are some limitations for the SKU change operation. The *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
39+
You can change SKUs up or down after the managed domain has been deployed. However, the *Premium* and *Enterprise* SKUs define a limit on the number of trusts you can create. You can't change to a SKU with a lower maximum limit than you currently have configured.
4040

41-
For example:
42-
43-
* You can't change down to the *Standard* SKU. Azure AD DS resource forest doesn't support the *Standard* SKU.
44-
* Or, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
41+
For example, if you have created seven trusts on the *Premium* SKU, you can't change down to the *Enterprise* SKU. The *Enterprise* SKU supports a maximum of five trusts.
4542

4643
For more information on these limits, see [Azure AD DS SKU features and limits][concepts-sku].
4744

0 commit comments

Comments
 (0)