Skip to content

Commit f5a835f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into ds-fixtoclinks
2 parents 4471c2c + fb4492a commit f5a835f

7 files changed

+10
-12
lines changed

articles/active-directory/hybrid/how-to-connect-sso.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Seamless SSO can be combined with either the [Password Hash Synchronization](how
3030
![Seamless Single Sign-On](./media/how-to-connect-sso/sso1.png)
3131

3232
>[!IMPORTANT]
33-
>Seamless SSO needs the user's device to be **domain-joined**, but doesn't need for the device to be [Azure AD Joined](../active-directory-azureadjoin-overview.md).
33+
>Seamless SSO needs the user's device to be **domain-joined** only, but it is not used on [Azure AD Joined](../active-directory-azureadjoin-overview.md) or [Hybrid Azure AD joined] (../active-directory-azureadjoin-overview.md) devices. SSO pn Azure AD joined and Hybrid Azure AD joined works based on the [Primary refresh token] (../active-directory/devices/concept-primary-refresh-token.md)
3434
3535
## Key benefits
3636

articles/active-directory/saas-apps/alibaba-cloud-service-role-based-sso-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ the **Note** field, click **Upload** to upload the federation metadata file you
164164
7. Associate the Alibaba Cloud RAM role (AADrole) with the Azure AD user (u2):
165165
To associate the RAM role with the Azure AD user, you must create a role in Azure AD by following these steps:
166166

167-
a. Sign on to the [Azure AD Graph Explorer](https://developer.microsoft.com/graph/graph-explorer?spm=a2c63.p38356.879954.9.7d904e167h6Yg9).
167+
a. Sign on to the [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
168168

169169
b. Click **modify permissions** to obtain required permissions for creating a role.
170170

articles/active-directory/saas-apps/aws-multi-accounts-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ If you want to know more details about SaaS app integration with Azure AD, see [
3838
3939
**Please note that we do not recommend to use this approach for following reasons:**
4040

41-
* You have to use the Graph Explorer approach to patch all the roles to the app. We don’t recommend using the manifest file approach.
41+
* You have to use the Microsoft Graph Explorer approach to patch all the roles to the app. We don’t recommend using the manifest file approach.
4242

4343
* We have seen customers reporting that after adding ~1200 app roles for a single AWS app, any operation on the app started throwing the errors related to size. There is a hard limit of size on the application object.
4444

@@ -243,7 +243,7 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
243243

244244
16. Perform the above step for all the roles in all the accounts and store all of them in format **Role ARN,Trusted entities** in a notepad.
245245

246-
17. Open [Azure AD Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window.
246+
17. Open [Microsoft Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) in another window.
247247

248248
a. Sign in to the Graph Explorer site using the Global Admin/Co-admin credentials for your tenant.
249249

@@ -322,9 +322,9 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
322322
> [!Note]
323323
> You can only add new roles after the **msiam_access** for the patch operation. Also, you can add as many roles as you want per your Organization need. Azure AD will send the **value** of these roles as the claim value in SAML response.
324324
325-
j. Go back to your Graph Explorer and change the method from **GET** to **PATCH**. Patch the Service Principal object to have desired roles by updating appRoles property similar to the one shown above in the example. Click **Run Query** to execute the patch operation. A success message confirms the creation of the role for your Amazon Web Services application.
325+
j. Go back to Microsoft Graph Explorer and change the method from **GET** to **PATCH**. Patch the Service Principal object to have desired roles by updating appRoles property similar to the one shown above in the example. Click **Run Query** to execute the patch operation. A success message confirms the creation of the role for your Amazon Web Services application.
326326
327-
![Graph explorer dialog box](./media/aws-multi-accounts-tutorial/graph-explorer-new11.png)
327+
![Microsoft Graph explorer dialog box](./media/aws-multi-accounts-tutorial/graph-explorer-new11.png)
328328
329329
18. After the Service Principal is patched with more roles, you can assign Users/Groups to the respective roles. This can be done by going to portal and navigating to the Amazon Web Services application. Click on the **Users and Groups** tab on the top.
330330
@@ -360,7 +360,7 @@ For more information about the Access Panel, see [Introduction to the Access
360360
361361
## Additional resources
362362
363-
* [How to configure provisioning using MS Graph APIs](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-configure-api)
363+
* [How to configure provisioning using Microsoft Graph APIs](https://docs.microsoft.com/azure/active-directory/manage-apps/application-provisioning-configure-api)
364364
* [List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](tutorial-list.md)
365365
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
366366

articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -329,7 +329,7 @@ Users can now sign into SharePoint 2016 using identities from Azure AD, but ther
329329

330330
There is no validation on the values you search for, which can lead to misspellings or users accidentally choosing the wrong claim type to assign such as the **SurName** claim. This can prevent users from successfully accessing resources.
331331

332-
To assist with this scenario, there is an open-source solution called [AzureCP](https://yvand.github.io/AzureCP/) that provides a custom claims provider for SharePoint 2016. It will use the Azure AD Graph to resolve what users enter and perform validation. Learn more at [AzureCP](https://yvand.github.io/AzureCP/).
332+
To assist with this scenario, there is an open-source solution called [AzureCP](https://yvand.github.io/AzureCP/) that provides a custom claims provider for SharePoint 2016. It will use the Microsoft Graph API to resolve what users enter and perform validation. Learn more at [AzureCP](https://yvand.github.io/AzureCP/).
333333

334334
### Assign the Azure AD Security Group in the Azure portal
335335

articles/active-directory/saas-apps/workday-inbound-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -816,7 +816,7 @@ No, the solution does not maintain a cache of user profiles. The Azure AD provis
816816

817817
#### Does the solution support assigning on-premises AD groups to the user?
818818

819-
This functionality is not supported currently. Recommended workaround is to deploy a PowerShell script that queries the Azure AD Graph API endpoint for audit log data and use that to trigger scenarios such as group assignment. This PowerShell script can be attached to a task scheduler and deployed on the same box running the provisioning agent.
819+
This functionality is not supported currently. Recommended workaround is to deploy a PowerShell script that queries the Microsoft Graph API endpoint for [audit log data](https://docs.microsoft.com/graph/api/resources/azure-ad-auditlog-overview?view=graph-rest-beta) and use that to trigger scenarios such as group assignment. This PowerShell script can be attached to a task scheduler and deployed on the same box running the provisioning agent.
820820

821821
#### Which Workday APIs does the solution use to query and update Workday worker profiles?
822822

articles/storage/files/storage-files-how-to-create-large-file-share.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Enabling large file shares on an account is an irreversible process. After you e
3939
![Screenshot showing how to create a resource group in the portal](media/storage-files-how-to-create-large-file-share/create-large-file-share.png)
4040

4141
1. Next, enter a name for your storage account. The name must be unique across Azure. The name also must be 3 to 24 characters in length, and it can only have numbers and lowercase letters.
42-
1. Select a location for your storage account, and make sure it's [one of the regions supported for large file shares](storage-files-planning.md#regional-availability).
42+
1. Select a location for your storage account, and make sure it's [one of the supported replication for large file shares](storage-files-planning.md#regional-availability).
4343
1. Set the replication to either **Locally redundant storage** or **Zone-redundant storage**.
4444
1. Leave these fields at their default values:
4545

articles/storage/files/storage-files-planning.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -172,8 +172,6 @@ This section only applies to the standard file shares. All premium file shares a
172172
Standard file shares with 100 TiB capacity limit are available globally in all Azure regions -
173173
174174
- LRS: All regions, except for South Africa North and South Africa West.
175-
- East US and West Europe: All new accounts are supported. A small number of existing accounts have not completed the upgrade process. You can check if your existing storage accounts have completed the upgrade process by attempting to [Enable large file shares](storage-files-how-to-create-large-file-share.md).
176-
177175
- ZRS: All regions, except for Japan East, North Europe, South Africa North.
178176
- GRS/GZRS: Not supported.
179177

0 commit comments

Comments
 (0)