Skip to content

Commit f51686d

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 73388fa + 0415f4d commit f51686d

File tree

136 files changed

+10879
-520
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

136 files changed

+10879
-520
lines changed

.openpublishing.redirection.json

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9843,7 +9843,7 @@
98439843
},
98449844
{
98459845
"source_path_from_root": "/articles/azure-supportability/low-priority-quota.md",
9846-
"redirect_url": "/azure/azure-portal/supportability/low-priority-quota",
9846+
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
98479847
"redirect_document_id": true
98489848
},
98499849
{
@@ -9876,6 +9876,11 @@
98769876
"redirect_url": "/azure/azure-portal/supportability/sku-series-unavailable",
98779877
"redirect_document_id": true
98789878
},
9879+
{
9880+
"source_path_from_root": "/articles/azure-portal/supportability/low-priority-quota.md",
9881+
"redirect_url": "/azure/azure-portal/supportability/spot-quota",
9882+
"redirect_document_id": false
9883+
},
98799884
{
98809885
"source_path_from_root": "/articles/managed-applications/concepts-custom-providers-built-in-policy.md",
98819886
"redirect_url": "/azure/azure-resource-manager/custom-providers/concepts-built-in-policy",
@@ -46326,6 +46331,26 @@
4632646331
"redirect_url": "/azure/sentinel/monitor-your-data",
4632746332
"redirect_document_id": false
4632846333
},
46334+
{
46335+
"source_path": "articles/sentinel/connect-azure-security-center.md",
46336+
"redirect_url": "/azure/sentinel/connect-defender-for-cloud",
46337+
"redirect_document_id": false
46338+
},
46339+
{
46340+
"source_path": "articles/sentinel/entities-in-azure-sentinel.md",
46341+
"redirect_url": "/azure/sentinel/entities",
46342+
"redirect_document_id": false
46343+
},
46344+
{
46345+
"source_path": "articles/sentinel/azure-sentinel-billing.md",
46346+
"redirect_url": "/azure/sentinel/billing",
46347+
"redirect_document_id": false
46348+
},
46349+
{
46350+
"source_path": "articles/sentinel/automation-in-azure-sentinel.md",
46351+
"redirect_url": "/azure/sentinel/automation",
46352+
"redirect_document_id": false
46353+
},
4632946354
{
4633046355
"source_path": "articles/virtual-desktop/connect-android.md",
4633146356
"redirect_url": "/azure/virtual-desktop/user-documentation/connect-android",

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
206206

207207
##### /Users:
208208
* The entitlements attribute is not supported.
209-
* Any attributes that are considered for user uniqueness must be usable as part of a filtered query. (e.g. if user uniqueness is evaluated for both userName and emails[type eq "work"], a GET to /Users with a filter must allow for both _userName eq "[email protected]"_ and _emails[type eq "work"] eq "[email protected]"_ queries.
209+
* Any attributes that are considered for user uniqueness must be usable as part of a filtered query. (e.g. if user uniqueness is evaluated for both userName and emails[type eq "work"], a GET to /Users with a filter must allow for both _userName eq "[email protected]"_ and _emails[type eq "work"].value eq "[email protected]"_ queries.
210210

211211
##### /Groups:
212212
* Groups are optional, but only supported if the SCIM implementation supports **PATCH** requests.

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/12/2021
9+
ms.date: 11/17/2021
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -21,11 +21,12 @@ ms.collection: M365-identity-device-management
2121
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
2222

2323
>[!NOTE]
24-
>Number matching is a key security upgrade to traditional second factor notifications in the Microsoft Authenticator app that will be enabled by default for all tenants at some point after general availability (GA). We highly recommend enabling number matching in the near-term for improved sign-in security.
24+
>Number matching is a key security upgrade to traditional second factor notifications in the Microsoft Authenticator app that will be enabled by default for all tenants a few months after general availability (GA).<br>
25+
>We highly recommend enabling number matching in the near-term for improved sign-in security.
2526
2627
## Prerequisites
2728

28-
Your organization will need to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups using the new Authentication Methods Policy API. For a consistent experience, upgrade to the latest versions of the AD FS adapter and NPS extension.
29+
Your organization will need to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups using the new Authentication Methods Policy API. If your organization is using ADFS adapter or NPS extensions, please upgrade to the latest versions for a consistent experience.
2930

3031
## Number matching
3132

@@ -52,7 +53,7 @@ When a user responds to an MFA push notification using Microsoft Authenticator,
5253
During self-service password reset, Microsoft Authenticator notification will show a number that the user will need to type in their Authenticator app notification. This number will only be seen to users who have been enabled for number matching.
5354

5455
>[!NOTE]
55-
>Number matching for admin roles during SSPR is initially pending and unavailable for a couple days.
56+
>Number matching for admin roles during SSPR is pending and unavailable for a couple days.
5657
5758
### Combined registration
5859

@@ -246,7 +247,7 @@ To enable number matching in the Azure AD portal, complete the following steps:
246247

247248
## Known issues
248249

249-
- Number matching for admin roles during SSPR is initially pending and unavailable for a couple days.
250+
- Number matching for admin roles during SSPR is pending and unavailable for a couple days.
250251

251252
## Next steps
252253

19.6 KB
Loading

articles/active-directory/hybrid/how-to-connect-staged-rollout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,8 @@ The following scenarios are supported for staged rollout. The feature works only
6464

6565
- Windows 10 Hybrid Join or Azure AD Join primary refresh token acquisition without line-of-sight to the federation server for Windows 10 version 1903 and newer, when user’s UPN is routable and domain suffix is verified in Azure AD.
6666

67+
- Autopilot enrollment is supported in Staged rollout with Windows 10 version 1909 or later.
68+
6769
## Unsupported scenarios
6870

6971
The following scenarios are not supported for staged rollout:
@@ -93,8 +95,6 @@ The following scenarios are not supported for staged rollout:
9395

9496
- If you have a Windows Hello for Business hybrid certificate trust with certs that are issued via your federation server acting as Registration Authority or smartcard users, the scenario isn't supported on a staged rollout.
9597

96-
- Autopilot enrollment is not supported in Staged rollout. Users enabled for Staged rollout will continue using federated authentication at autopilot enrollment time. If your device has Windows 10 version 1903 or later, after autopilot enrollment, all auth requests will go through Staged rollout.
97-
9898
>[!NOTE]
9999
>You still need to make the final cutover from federated to cloud authentication by using Azure AD Connect or PowerShell. Staged rollout doesn't switch domains from federated to managed. For more information about domain cutover, see [Migrate from federation to password hash synchronization](./migrate-from-federation-to-cloud-authentication.md) and [Migrate from federation to pass-through authentication](./migrate-from-federation-to-cloud-authentication.md).
100100

articles/active-directory/saas-apps/bic-cloud-design-provisioning-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.author: Thwimmer
2020

2121
# Tutorial: Configure BIC Cloud Design for automatic user provisioning
2222

23-
This tutorial describes the steps you need to perform in both BIC Cloud Design and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [BIC Cloud Design](https://www.gbtec.de/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
23+
This tutorial describes the steps you need to perform in both BIC Cloud Design and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [BIC Cloud Design](https://www.gbtec.com/) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
2424

2525

2626
## Capabilities supported
@@ -37,7 +37,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
3737

3838
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md).
3939
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (for example, Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
40-
40+
* BIC Cloud Design User Management API enabled subscription.
4141

4242
## Step 1. Plan your provisioning deployment
4343
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
@@ -73,7 +73,7 @@ This section guides you through the steps to configure the Azure AD provisioning
7373

7474
1. In the applications list, select **BIC Cloud Design**.
7575

76-
![The Contoso link in the Applications list](common/all-applications.png)
76+
![The BIC Cloud Design link in the Applications list](common/all-applications.png)
7777

7878
1. Select the **Provisioning** tab.
7979

@@ -97,7 +97,7 @@ This section guides you through the steps to configure the Azure AD provisioning
9797

9898
1. Review the user attributes that are synchronized from Azure AD to BIC Cloud Design in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in BIC Cloud Design for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the BIC Cloud Design API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
9999

100-
|Attribute|Type|Supported for filtering|Required by Real Links|
100+
|Attribute|Type|Supported for filtering|Required by BIC Cloud Design|
101101
|---|---|---|---|
102102
|userName|String|&check;|&check;
103103
|emails[type eq "work"].value|String|&check;|&check;
@@ -110,7 +110,7 @@ This section guides you through the steps to configure the Azure AD provisioning
110110

111111
1. Review the group attributes that are synchronized from Azure AD to BIC Cloud Design in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the groups in BIC Cloud Design for update operations. Select the **Save** button to commit any changes.
112112

113-
|Attribute|Type|Supported for filtering|Required by Real Links|
113+
|Attribute|Type|Supported for filtering|Required by BIC Cloud Design|
114114
|---|---|---|---|
115115
|displayName|String|&check;|&check;
116116
|externalId|String||&check;
13.1 KB
Loading

0 commit comments

Comments
 (0)