Skip to content

Commit f5fb957

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into work-fslogix-containers
2 parents f39ddab + 421566c commit f5fb957

File tree

174 files changed

+1499
-715
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

174 files changed

+1499
-715
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50644,11 +50644,6 @@
5064450644
"redirect_url": "/azure/developer/ansible/vm-scale-set-update-image",
5064550645
"redirect_document_id": false
5064650646
},
50647-
{
50648-
"source_path": "articles/ansible/",
50649-
"redirect_url": "/azure/developer/ansible/",
50650-
"redirect_document_id": false
50651-
},
5065250647
{
5065350648
"source_path": "articles/ansible/index.yml",
5065450649
"redirect_url": "/azure/developer/ansible/",

articles/active-directory/manage-apps/common-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Identity can only be your control plane if it can connect everything across clou
8585

8686
- [Application management](https://docs.microsoft.com/azure/active-directory/manage-apps/index)
8787
- [Application provisioning](https://docs.microsoft.com/azure/active-directory/app-provisioning/user-provisioning)
88-
- [Hybrid secure access]()
88+
- [Hybrid secure access](https://docs.microsoft.com/azure/active-directory/manage-apps/secure-hybrid-access)
8989
- [Identity governance](https://docs.microsoft.com/azure/active-directory/governance/identity-governance-overview)
9090
- [Microsoft identity platform](https://docs.microsoft.com/azure/active-directory/develop/v2-overview)
9191
- [Identity security](https://docs.microsoft.com/azure/active-directory/conditional-access/index)

articles/active-directory/saas-apps/icims-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ In this tutorial, you'll learn how to integrate ICIMS with Azure Active Director
2727
* Enable your users to be automatically signed-in to ICIMS with their Azure AD accounts.
2828
* Manage your accounts in one central location - the Azure portal.
2929

30-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/what-is-single-sign-on).
30+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
3131

3232
## Prerequisites
3333

@@ -147,7 +147,7 @@ When you click the ICIMS tile in the Access Panel, you should be automatically s
147147

148148
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
149149

150-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/what-is-single-sign-on)
150+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
151151

152152
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
153153

articles/active-directory/saas-apps/opsgenie-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ In this tutorial, you'll learn how to integrate OpsGenie with Azure Active Direc
2626
* Enable your users to be automatically signed-in to OpsGenie with their Azure AD accounts.
2727
* Manage your accounts in one central location - the Azure portal.
2828

29-
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/what-is-single-sign-on).
29+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on).
3030

3131
## Prerequisites
3232

@@ -192,7 +192,7 @@ When you click the OpsGenie tile in the Access Panel, you should be automaticall
192192

193193
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
194194

195-
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/what-is-single-sign-on)
195+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on)
196196

197197
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
198198

articles/active-directory/users-groups-roles/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,10 @@
122122
items:
123123
- name: Create a dynamic group
124124
href: groups-create-rule.md
125-
- name: Dynamic group rule syntax
125+
- name: Dynamic group rule syntax
126126
href: groups-dynamic-membership.md
127+
- name: Validate a membership rule
128+
href: groups-dynamic-rule-validation.md
127129
- name: Change group membership type
128130
href: groups-change-type.md
129131
- name: Assign licenses

articles/active-directory/users-groups-roles/groups-dynamic-membership.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Rules for dynamic group membership - Azure AD | Microsoft Docs
2+
title: Rules for dynamically populated groups membership - Azure AD | Microsoft Docs
33
description: How to create membership rules to automatically populate groups, and a rule reference.
44
services: active-directory
55
documentationcenter: ''
@@ -321,7 +321,7 @@ user.objectId -ne null
321321
If you want your group to exclude guest users and include only members of your tenant, you can use the following syntax:
322322

323323
```
324-
(user.objectId -ne null) -and (user.userType -eq Member)
324+
(user.objectId -ne null) -and (user.userType -eq "Member")
325325
```
326326

327327
### Create an "All devices" rule
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: Validate rules for dynamic group membership (preview) - Azure AD | Microsoft Docs
3+
description: How to test members against a membership rule for a dynamic groups in Azure Active Directory.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: curtand
7+
manager: daveba
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.subservice: users-groups-roles
11+
ms.topic: article
12+
ms.date: 04/10/2020
13+
ms.author: curtand
14+
ms.reviewer: yukarppa
15+
ms.custom: it-pro
16+
ms.collection: M365-identity-device-management
17+
---
18+
19+
# Validate a dynamic group membership rule (preview) in Azure Active Directory
20+
21+
Azure Active Directory (Azure AD) now provides the means to validate dynamic group rules (in public preview). On the **Validate rules** tab, you can validate your dynamic rule against sample group members to confirm the rule is working as expected. When creating or updating dynamic group rules, administrators want to know whether a user or a device will be a member of the group. This helps evaluate whether user or device meets the rule criteria and aid in troubleshooting when membership is not expected.
22+
23+
## Step-by-step walk-through
24+
25+
To get started, go to **Azure Active Directory** > **Groups**. Select an existing dynamic group or create a new dynamic group and click on Dynamic membership rules. You can then see the **Validate Rules** tab.
26+
27+
![Find the Validate rules tab and start with an existing rule](./media/groups-dynamic-rule-validation/validate-tab.png)
28+
29+
On **Validate rules** tab, you can select users to validate their memberships. 20 users or devices can be selected at one time.
30+
31+
![Add users to validate the existing rule against](./media/groups-dynamic-rule-validation/validate-tab-add-users.png)
32+
33+
After choosing the users or devices from the picker, and **Select**, validation will automatically start and validation results will appear.
34+
35+
![View the results of the rule validation](./media/groups-dynamic-rule-validation/validate-tab-results.png)
36+
37+
The results tell whether a user is a member of the group or not. If the rule is not valid or there is a network issue, the result will show as **Unknown**. In case of **Unknown**, the detailed error message will describe the issue and actions needed.
38+
39+
![View the details of the results of the rule validation](./media/groups-dynamic-rule-validation/validate-tab-view-details.png)
40+
41+
You can modify the rule and validation of memberships will be triggered. To see why user is not a member of the group, click on "View details" and verification details will show the result of each expression composing the rule. Click **OK** to exit.
42+
43+
## Next steps
44+
45+
- [Dynamic membership rules for groups](groups-dynamic-membership.md)
45.5 KB
Loading
58.3 KB
Loading
55.8 KB
Loading

0 commit comments

Comments
 (0)