Skip to content

Commit f589c66

Browse files
authored
Merge pull request #239365 from MicrosoftDocs/main
5/25 PM Publish
2 parents decaae9 + 54ec4e8 commit f589c66

File tree

161 files changed

+3602
-1075
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

161 files changed

+3602
-1075
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Microsoft Azure Documentation
22

3-
Welcome to the open-source [documentation](/azure) of [Microsoft Azure](https://azure.microsoft.com). Please review this README file to understand how you can assist in contributing to the Microsoft Azure documentation.
3+
Welcome to the open-source [documentation](/azure) of [Microsoft Azure](https://azure.microsoft.com). Please review this README file to understand how you can assist in contributing to the Microsoft Azure documentation.
44

55
## Getting Started
66

articles/active-directory/develop/msal-android-shared-devices.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -95,13 +95,10 @@ These Microsoft applications support Azure AD's shared device mode:
9595

9696
- [Microsoft Teams](/microsoftteams/platform/)
9797
- [Microsoft Managed Home Screen](/mem/intune/apps/app-configuration-managed-home-screen-app) app for Android Enterprise
98-
- [Microsoft Edge](/microsoft-edge) (in Public Preview)
99-
- [Outlook](/mem/intune/apps/app-configuration-policies-outlook) (in Public Preview)
100-
- [Microsoft Power Apps](/power-apps) (in Public Preview)
101-
- [Yammer](/yammer) (in Public Preview)
102-
103-
> [!IMPORTANT]
104-
> Public preview is provided without a service-level agreement and isn't recommended for production workloads. Some features might be unsupported or have constrained capabilities. For more information, see [Supplemental terms of use for Microsoft Azure previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
98+
- [Microsoft Edge](/microsoft-edge)
99+
- [Outlook](/mem/intune/apps/app-configuration-policies-outlook)
100+
- [Microsoft Power Apps](/power-apps)
101+
- [Microsoft Viva Engage](/viva/engage/overview) (previously [Yammer](/yammer))
105102

106103
## Shared device sign-out and the overall app lifecycle
107104

articles/active-directory/external-identities/customers/how-to-facebook-federation-customers.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: ciam
1010
ms.topic: how-to
11-
ms.date: 04/28/2023
11+
ms.date: 05/24/2023
1212
ms.author: mimart
1313
ms.custom: it-pro
1414

@@ -38,17 +38,21 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
3838
1. Enter a URL for the **Terms of Service URL**, for example `https://www.contoso.com/tos`. The policy URL is a page you maintain to provide terms and conditions for your application.
3939
1. Enter a URL for the **User Data Deletion**, for example `https://www.contoso.com/delete_my_data`. The User Data Deletion URL is a page you maintain to provide away for users to request that their data be deleted.
4040
1. Choose a **Category**, for example `Business and Pages`. Facebook requires this value, but it's not used for Azure AD.
41-
2. At the bottom of the page, select **Add Platform**, and then select **Website**.
42-
3. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
43-
4. Select **Save Changes**.
44-
5. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
45-
6. From the menu, select **Facebook Login**, select **Settings**.
46-
7. In **Valid OAuth redirect URIs**, enter:
47-
- `https://login.microsoftonline.com`
48-
- `https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp`. Replace the tenant ID with your Azure AD for customers tenant ID. To find your tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
49-
- `https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp`. Replace the tenant name with your Azure AD for customers tenant name.
50-
8. Select **Save Changes** at the bottom of the page.
51-
9. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
41+
1. At the bottom of the page, select **Add Platform**, and then select **Website**.
42+
1. In **Site URL**, enter the address of your website, for example `https://contoso.com`.
43+
1. Select **Save Changes**.
44+
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
45+
1. From the menu, select **Facebook Login**, select **Settings**.
46+
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
47+
- `https://login.microsoftonline.com/te/<tenant-ID>/oauth2/authresp`
48+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oidc/www.facebook.com`
49+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oidc/www.facebook.com`
50+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oauth2`
51+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oauth2`
52+
> [!NOTE]
53+
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
54+
1. Select **Save Changes** at the bottom of the page.
55+
1. To make your Facebook application available to Azure AD, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5256

5357
## Configure Facebook federation in Azure AD for customers
5458

articles/active-directory/external-identities/customers/how-to-google-federation-customers.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: ciam
1010
ms.topic: how-to
11-
ms.date: 04/28/2023
11+
ms.date: 05/24/2023
1212
ms.author: mimart
1313
ms.custom: it-pro
1414

@@ -31,21 +31,27 @@ To enable sign-in for customers with a Google account, you need to create an app
3131
1. Under the **Quick access**, or in the left menu, select **APIs & services** and then **OAuth consent screen**.
3232
1. For the **User Type**, select **External** and then select **Create**.
3333
1. On the **OAuth consent screen**, under **App information**
34-
1. Enter a **Name** for your application.
35-
2. Select a **User support email** address.
36-
1. Under the **Authorized domains** section, select **Add domain**, and then type *microsoftonline.com*.
34+
1. Enter a **Name** for your application.
35+
1. Select a **User support email** address.
36+
1. Under the **Authorized domains** section, select **Add domain**, and then add `ciamlogin.com` and `microsoftonline.com`.
3737
1. In the **Developer contact information** section, enter comma separated emails for Google to notify you about any changes to your project.
3838
1. Select **Save and Continue**.
3939
1. From the left menu, select **Credentials**
4040
1. Select **Create credentials**, and then **OAuth client ID**.
4141
1. Under **Application type**, select **Web application**.
42-
1. Enter a suitable **Name** for your application, such as "Azure AD for customers."
43-
1. For the **Authorized redirect URIs**, enter:
44-
- `https://login.microsoftonline.com`
45-
- `https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp`. Replace the tenant ID with your Azure AD for customers tenant ID. To find your tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
46-
- `https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp`. Replace the tenant name with your Azure AD for customers tenant name.
47-
1. Select **Create**.
48-
1. Copy the values of **Client ID** and **Client secret**. You need both values to configure Google as an identity provider in your tenant. **Client secret** is an important security credential.
42+
1. Enter a suitable **Name** for your application, such as "Azure AD for customers."
43+
1. In **Valid OAuth redirect URIs**, enter the following URIs, replacing `<tenant-ID>` with your customer tenant ID and `<tenant-name>` with your customer tenant name:
44+
- `https://login.microsoftonline.com`
45+
- `https://login.microsoftonline.com/te/<tenant-ID>/oauth2/authresp`
46+
- `https://login.microsoftonline.com/te/<tenant-name>.onmicrosoft.com/oauth2/authresp`
47+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oidc/accounts.google.com`
48+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oidc/accounts.google.com`
49+
- `https://<tenant-ID>.ciamlogin.com/<tenant-ID>/federation/oauth2`
50+
- `https://<tenant-ID>.ciamlogin.com/<tenant-name>.onmicrosoft.com/federation/oauth2`
51+
> [!NOTE]
52+
> To find your customer tenant ID, go to the [Microsoft Entra admin center](https://entra.microsoft.com). Under **Azure Active Directory**, select **Overview**. Then select the **Overview** tab and copy the **Tenant ID**.
53+
2. Select **Create**.
54+
3. Copy the values of **Client ID** and **Client secret**. You need both values to configure Google as an identity provider in your tenant. **Client secret** is an important security credential.
4955

5056
> [!NOTE]
5157
> In some cases, your app might require verification by Google (for example, if you update the application logo). For more information, check out the [Google's verification status guid](https://support.google.com/cloud/answer/10311615#verification-status).

articles/active-directory/saas-apps/parallels-desktop-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/23/2023
12+
ms.date: 05/25/2023
1313
ms.author: jeedes
1414

1515
---
@@ -66,7 +66,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6666
`https://account.parallels.com/webapp/sso/acs/<ID>`
6767

6868
> [!NOTE]
69-
> These values are not real. Update these values with the actual Identifier and Reply URL. Please note the Identifier and Reply URL values are customer specific and should be able to specify it manually by copying it from Parallels My Account to the identity provider Azure. Contact [Parallels Desktop Client support team](mailto:parallels.desktop.sso@alludo.com) for any help. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
69+
> These values are not real. Update these values with the actual Identifier and Reply URL. Please note the Identifier and Reply URL values are customer specific and should be able to specify it manually by copying it from Parallels My Account to the identity provider Azure. Contact [Parallels Desktop support team](https://www.parallels.com/support/) for any help. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
7070
7171
c. In the **Sign on URL** textbox, type the URL:-
7272
`https://my.parallels.com/login?sso=1`
@@ -81,11 +81,11 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
8181

8282
## Configure Parallels Desktop SSO
8383

84-
To configure single sign-on on **Parallels Desktop** side, you need to send the downloaded **Certificate (PEM)** and appropriate copied URLs from Azure portal to [Parallels Desktop support team](mailto:parallels.desktop.sso@alludo.com). They set this setting to have the SAML SSO connection set properly on both sides.
84+
To configure single sign-on on **Parallels Desktop** side, you need to send the downloaded **Certificate (PEM)** and appropriate copied URLs from Azure portal to [Parallels Desktop support team](https://www.parallels.com/support/). They set this setting to have the SAML SSO connection set properly on both sides.
8585

8686
### Create Parallels Desktop test user
8787

88-
In this section, you create a user called Britta Simon at Parallels Desktop. Work with [Parallels Desktop support team](mailto:parallels.desktop.sso@alludo.com) to add the users in the Parallels Desktop platform. Users must be created and activated before you use single sign-on.
88+
In this section, you create a user called Britta Simon at Parallels Desktop. Work with [Parallels Desktop support team](https://www.parallels.com/support/) to add the users in the Parallels Desktop platform. Users must be created and activated before you use single sign-on.
8989

9090
## Test SSO
9191

articles/active-directory/saas-apps/servicenow-tutorial.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/29/2023
12+
ms.date: 05/25/2023
1313
ms.author: jeedes
1414
---
1515

@@ -108,7 +108,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
108108
| Reply URL|
109109
|----------|
110110
| `https://<instancename>.service-now.com/navpage.do` |
111-
| `https://<instancename>.service-now.com/customer.do` |
111+
| `https://<instancename>.service-now.com/consumer.do` |
112112
|
113113

114114
d. In **Logout URL**, enter a URL that uses the following pattern:
@@ -177,7 +177,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
177177
| Sign on URL |
178178
|-----------|
179179
| `https://<instance-name>.service-now.com/login_with_sso.do?glide_sso_id=<sys_id of the sso configuration>` |
180-
| `https://<instancename>.service-now.com/customer.do` |
180+
| `https://<instancename>.service-now.com/consumer.do` |
181181
|
182182

183183
b. For **Identifier (Entity ID)**, enter a URL that uses the following pattern:
@@ -188,7 +188,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
188188
| Reply URL |
189189
|-----------|
190190
| `https://<instancename>.service-now.com/navpage.do` |
191-
| `https://<instancename>.service-now.com/customer.do` |
191+
| `https://<instancename>.service-now.com/consumer.do` |
192192
|
193193

194194
d. In **Logout URL**, enter a URL that uses the following pattern:

articles/active-directory/saas-apps/superannotate-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/13/2023
12+
ms.date: 05/25/2023
1313
ms.author: jeedes
1414

1515
---
@@ -81,13 +81,13 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
8181
| ---------------| --------- |
8282
| groups | user.groups [ApplicationGroup] |
8383

84-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, click copy button to copy **App Federation Metadata Url** and save it on your computer.
84+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, copy the **App Federation Metadata Url** or download the **Federation Metadata XML** and save it on your computer.
8585

8686
![Screenshot shows the Certificate download link.](common/copy-metadataurl.png "Certificate")
8787

8888
## Configure SuperAnnotate SSO
8989

90-
To configure single sign-on on **SuperAnnotate** side, you need to send the **App Federation Metadata Url** to [SuperAnnotate support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides
90+
To configure single sign-on on **SuperAnnotate** side, you need to set up the copied **App Federation Metadata Url** or the downloaded **Federation Metadata XML** in the SSO setup page of the SuperAnnotate side to have the SAML SSO connection set properly on both sides.
9191

9292
### Create SuperAnnotate test user
9393

articles/advisor/advisor-cost-recommendations.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,10 @@ In some cases recommendations can't be adopted or might not be applicable, such
8282

8383
In such cases, simply use the Dismiss/Postpone options associated with the recommendation.
8484

85+
### Limitations
86+
- The savings associated with the recommendations are based on retail rates and don't take into account any temporary or long-term discounts that might apply to your account. As a result, the listed savings might be higher than actually possible.
87+
- The recommendations don't take into account the presence of Reserved Instances (RI) / Savings plan purchases. As a result, the listed savings might be higher than actually possible. In some cases, for example in the case of cross-series recommendations, depending on the types of SKUs that reserved instances have been purchased for, the costs might increase when the optimization recommendations are followed. We caution you to consider your RI/Savings plan purchases when you act on the right-size recommendations.
88+
8589
We're constantly working on improving these recommendations. Feel free to share feedback on [Advisor Forum](https://aka.ms/advisorfeedback).
8690

8791
## Next steps

articles/aks/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -398,10 +398,10 @@
398398
href: csi-secrets-store-nginx-tls.md
399399
- name: Configure private clusters
400400
items:
401-
- name: Create a private cluster
402-
href: private-clusters.md
403-
- name: Access a private cluster remotely
404-
href: command-invoke.md
401+
- name: Create a private cluster
402+
href: private-clusters.md
403+
- name: Access a private cluster remotely
404+
href: command-invoke.md
405405
- name: Configure networking
406406
items:
407407
- name: Create or use existing virtual network
@@ -612,6 +612,8 @@
612612
items:
613613
- name: About Open Service Mesh
614614
href: open-service-mesh-about.md
615+
- name: Migration Guidance to Istio AKS add-on
616+
href: open-service-mesh-istio-migration-guidance.md
615617
- name: Use the Azure CLI
616618
href: open-service-mesh-deploy-addon-az-cli.md
617619
- name: Use Bicep template

0 commit comments

Comments
 (0)