Skip to content

Commit f76db8f

Browse files
authored
Merge pull request #199623 from MicrosoftDocs/main
Merge Main to Live, 4 AM
2 parents c5d8403 + 4539ed2 commit f76db8f

File tree

136 files changed

+1486
-1054
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

136 files changed

+1486
-1054
lines changed

articles/active-directory/enterprise-users/domains-verify-custom-subdomain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Because subdomains inherit the authentication type of the root domain by default
6464
Use the following command to promote the subdomain:
6565

6666
```http
67-
POST https://graph.microsoft.com/v1.0/domains/foo.contoso.com/promote
67+
POST https://graph.windows.net/{tenant-id}/domains/foo.contoso.com/promote
6868
```
6969

7070
### Promote command error conditions
@@ -114,4 +114,4 @@ Invoking API with a federated verified subdomain with user references | POST | 4
114114

115115
- [Add custom domain names](../fundamentals/add-custom-domain.md?context=azure%2factive-directory%2fusers-groups-roles%2fcontext%2fugr-context)
116116
- [Manage domain names](domains-manage.md)
117-
- [ForceDelete a custom domain name with Microsoft Graph API](/graph/api/domain-forcedelete)
117+
- [ForceDelete a custom domain name with Microsoft Graph API](/graph/api/domain-forcedelete)

articles/active-directory/saas-apps/timeclock-365-saml-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Timeclock 365 SAML | Microsoft Docs'
2+
title: 'Tutorial: Azure AD SSO integration with Timeclock 365 SAML'
33
description: Learn how to configure single sign-on between Azure Active Directory and Timeclock 365 SAML.
44
services: active-directory
55
author: jeevansd
@@ -9,12 +9,12 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 09/02/2021
12+
ms.date: 05/27/2022
1313
ms.author: jeedes
1414

1515
---
1616

17-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Timeclock 365 SAML
17+
# Tutorial: Azure AD SSO integration with Timeclock 365 SAML
1818

1919
In this tutorial, you'll learn how to integrate Timeclock 365 SAML with Azure Active Directory (Azure AD). When you integrate Timeclock 365 SAML with Azure AD, you can:
2020

@@ -34,7 +34,7 @@ To get started, you need the following items:
3434
In this tutorial, you configure and test Azure AD SSO in a test environment.
3535

3636
* Timeclock 365 SAML supports **SP** initiated SSO.
37-
* Timeclock 365 SAML supports [Automated user provisioning](timeclock-365-provisioning-tutorial.md).
37+
* Timeclock 365 SAML supports [Automated user provisioning](timeclock-365-saml-provisioning-tutorial.md).
3838

3939
## Adding Timeclock 365 SAML from the gallery
4040

@@ -141,7 +141,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
141141
1. Click on **Create** button to create the test user.
142142

143143
> [!NOTE]
144-
> Timeclock 365 SAML also supports automatic user provisioning, you can find more details [here](./timeclock-365-provisioning-tutorial.md) on how to configure automatic user provisioning.
144+
> Timeclock 365 SAML also supports automatic user provisioning, you can find more details [here](./timeclock-365-saml-provisioning-tutorial.md) on how to configure automatic user provisioning.
145145
146146
## Test SSO
147147

articles/active-directory/saas-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3009,6 +3009,8 @@
30093009
href: webroot-security-awareness-training-provisioning-tutorial.md
30103010
- name: WEDO
30113011
href: wedo-provisioning-tutorial.md
3012+
- name: Whimsical
3013+
href: whimsical-provisioning-tutorial.md
30123014
- name: Workday to Active Directory
30133015
href: workday-inbound-tutorial.md
30143016
- name: Workday to Azure AD
Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
---
2+
title: 'Tutorial: Configure Whimsical for automatic user provisioning with Azure Active Directory | Microsoft Docs'
3+
description: Learn how to automatically provision and de-provision user accounts from Azure AD to Whimsical.
4+
services: active-directory
5+
author: twimmers
6+
writer: twimmers
7+
manager: beatrizd
8+
ms.assetid: 4457a724-ed81-4f7b-bb3e-70beea80cb51
9+
ms.service: active-directory
10+
ms.subservice: saas-app-tutorial
11+
ms.workload: identity
12+
ms.topic: tutorial
13+
ms.date: 05/11/2022
14+
ms.author: thwimmer
15+
---
16+
17+
# Tutorial: Configure Whimsical for automatic user provisioning
18+
19+
This tutorial describes the steps you need to perform in both Whimsical and Azure Active Directory (Azure AD) to configure automatic user provisioning. When configured, Azure AD automatically provisions and de-provisions users and groups to [Whimsical](https://service-portaltest.benq.com/login) using the Azure AD Provisioning service. For important details on what this service does, how it works, and frequently asked questions, see [Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](../app-provisioning/user-provisioning.md).
20+
21+
## Capabilities Supported
22+
> [!div class="checklist"]
23+
> * Create users in Whimsical
24+
> * Remove users in Whimsical when they do not require access anymore
25+
> * Keep user attributes synchronized between Azure AD and Whimsical
26+
> * [Single sign-on](benq-iam-tutorial.md) to Whimsical (recommended)
27+
28+
## Prerequisites
29+
30+
The scenario outlined in this tutorial assumes that you already have the following prerequisites:
31+
32+
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
33+
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
34+
* To use SCIM, SAML has to be enabled and correctly configured.
35+
36+
## Step 1. Plan your provisioning deployment
37+
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
38+
2. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
39+
3. Determine what data to [map between Azure AD and Whimsical](../app-provisioning/customize-application-attributes.md).
40+
41+
## Step 2. Configure Whimsical to support provisioning with Azure AD
42+
1. To enable SCIM, you must first set up SAML SSO with AAD.
43+
1. Go to "Workspace Settings", which you'll find under your workspace name in the top left.
44+
1. Enable SCIM provisioning and click "Reveal" to retrieve the token.
45+
1. In the "Provisioning" tab in AAD, set "Provisioning Mode" to "Automatic", and paste "https://whimsical.com/public-api/scim-v2/?aadOptscim062020" into "Tenant URL"
46+
47+
## Step 3. Add Whimsical from the Azure AD application gallery
48+
49+
Add Whimsical from the Azure AD application gallery to start managing provisioning to Whimsical. If you have previously setup Whimsical for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
50+
51+
## Step 4. Define who will be in scope for provisioning
52+
53+
The Azure AD provisioning service allows you to scope who will be provisioned based on assignment to the application and or based on attributes of the user / group. If you choose to scope who will be provisioned to your app based on assignment, you can use the following [steps](../manage-apps/assign-user-or-group-access-portal.md) to assign users and groups to the application. If you choose to scope who will be provisioned based solely on attributes of the user or group, you can use a scoping filter as described [here](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
54+
55+
* When assigning users and groups to Whimsical, you must select a role other than **Default Access**. Users with the Default Access role are excluded from provisioning and will be marked as not effectively entitled in the provisioning logs. If the only role available on the application is the default access role, you can [update the application manifest](../develop/howto-add-app-roles-in-azure-ad-apps.md) to add additional roles.
56+
57+
* Start small. Test with a small set of users and groups before rolling out to everyone. When scope for provisioning is set to assigned users and groups, you can control this by assigning one or two users or groups to the app. When scope is set to all users and groups, you can specify an [attribute based scoping filter](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
58+
59+
## Step 5. Configure automatic user provisioning to Whimsical
60+
61+
This section guides you through the steps to configure the Azure AD provisioning service to create, update, and disable users and/or groups in TestApp based on user and/or group assignments in Azure AD.
62+
63+
### To configure automatic user provisioning for Whimsical in Azure AD:
64+
65+
1. Sign in to the [Azure portal](https://portal.azure.com). Select **Enterprise Applications**, then select **All applications**.
66+
67+
![Enterprise applications blade](common/enterprise-applications.png)
68+
69+
2. In the applications list, select **Whimsical**.
70+
71+
![The Whimsical link in the Applications list](common/all-applications.png)
72+
73+
3. Select the **Provisioning** tab.
74+
75+
![Provision tab](common/provisioning.png)
76+
77+
4. Set the **Provisioning Mode** to **Automatic**.
78+
79+
![Provisioning tab](common/provisioning-automatic.png)
80+
81+
5. Under the **Admin Credentials** section, input your Whimsical Tenant URL and Secret Token. Click **Test Connection** to ensure Azure AD can connect to Whimsical. If the connection fails, ensure your Whimsical account has Admin permissions and try again.
82+
83+
![Token](common/provisioning-testconnection-tenanturltoken.png)
84+
85+
6. In the **Notification Email** field, enter the email address of a person or group who should receive the provisioning error notifications and select the **Send an email notification when a failure occurs** check box.
86+
87+
![Notification Email](common/provisioning-notification-email.png)
88+
89+
7. Select **Save**.
90+
91+
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to Whimsical**.
92+
93+
9. Review the user attributes that are synchronized from Azure AD to Whimsical in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in Whimsical for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the Whimsical API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
94+
95+
|Attribute|Type|Supported for filtering|
96+
|---|---|---|
97+
|userName|String|✓
98+
|externalId|String|
99+
|active|Boolean|
100+
|displayName|String|
101+
102+
10. To configure scoping filters, refer to the following instructions provided in the [Scoping filter tutorial](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
103+
104+
11. To enable the Azure AD provisioning service for Whimsical, change the **Provisioning Status** to **On** in the **Settings** section.
105+
106+
![Provisioning Status Toggled On](common/provisioning-toggle-on.png)
107+
108+
12. Define the users and/or groups that you would like to provision to Whimsical by choosing the desired values in **Scope** in the **Settings** section.
109+
110+
![Provisioning Scope](common/provisioning-scope.png)
111+
112+
13. When you are ready to provision, click **Save**.
113+
114+
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
115+
116+
This operation starts the initial synchronization cycle of all users and groups defined in **Scope** in the **Settings** section. The initial cycle takes longer to perform than subsequent cycles, which occur approximately every 40 minutes as long as the Azure AD provisioning service is running.
117+
118+
## Step 6. Monitor your deployment
119+
Once you've configured provisioning, use the following resources to monitor your deployment:
120+
121+
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
122+
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
123+
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
124+
125+
## Additional resources
126+
127+
* [Managing user account provisioning for Enterprise Apps](../app-provisioning/configure-automatic-user-provisioning-portal.md)
128+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
129+
130+
## Next steps
131+
132+
* [Learn how to review logs and get reports on provisioning activity](../app-provisioning/check-status-user-account-provisioning.md)

articles/advisor/advisor-release-notes.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,22 @@ ms.date: 01/03/2022
88

99
Learn what's new in the service. These items may be release notes, videos, blog posts, and other types of information. Bookmark this page to stay up to date with the service.
1010

11+
## May 2022
12+
13+
### Unlimited number of subscriptions
14+
It is easier now to get an overview of optimization opportunities available to your organization – no need to spend time and effort to apply filters and process subscription in batches.
15+
16+
To learn more, visit [Get started with Azure Advisor](advisor-get-started.md).
17+
18+
### Tag filtering
19+
20+
You can now get Advisor recommendations scoped to a business unit, workload, or team. Filter recommendations and calculate scores using tags you have already assigned to Azure resources, resource groups and subscriptions. Apply tag filters to:
21+
22+
* Identify cost saving opportunities by business units
23+
* Compare scores for workloads to optimize critical ones first
24+
25+
To learn more, visit [How to filter Advisor recommendations using tags](advisor-tag-filtering.md).
26+
1127
## January 2022
1228

1329
[**Shutdown/Resize your virtual machines**](advisor-cost-recommendations.md#optimize-virtual-machine-spend-by-resizing-or-shutting-down-underutilized-instances) recommendation was enhanced to increase the quality, robustness, and applicability.
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Review optimization opportunities by workload, environment or team
3+
description: Review optimization opportunities by workload, environment or team
4+
ms.topic: article
5+
ms.custom: tags
6+
ms.date: 05/25/2022
7+
---
8+
9+
# Review optimization opportunities by workload, environment or team
10+
11+
You can now get Advisor recommendations and scores scoped to a workload, environment, or team using resource tag filters. Filter recommendations and calculate scores using tags you have already assigned to Azure resources, resource groups and subscriptions. Use tag filters to:
12+
13+
* Identify cost saving opportunities by team
14+
* Compare scores for workloads to optimize the critical ones first
15+
16+
> [!TIP]
17+
> For more information on how to use resource tags to organize and govern your Azure resources, please see the [Cloud Adoption Framework’s guidance](/azure/cloud-adoption-framework/ready/azure-best-practices/resource-tagging) and [Build a cloud governance strategy on Azure](/learn/modules/build-cloud-governance-strategy-azure/).
18+
19+
## How to filter recommendations using tags
20+
21+
1. Sign in to the [Azure portal](https://portal.azure.com/).
22+
1. Search for and select [Advisor](https://aka.ms/azureadvisordashboard) from any page.
23+
1. On the Advisor dashboard, click on the **Add Filter** button.
24+
1. Select the tag in the **Filter** field and value(s).
25+
1. Click **Apply**. Summary tiles will be updated to reflect the filter.
26+
1. Click on any of the categories to review recommendations.
27+
28+
[ ![Screenshot of the Azure Advisor dashboard that shows count of recommendations after tag filter is applied.](./media/tags/overview-tag-filters.png) ](./media/tags/overview-tag-filters.png#lightbox)
29+
30+
31+
## How to calculate scores using resource tags
32+
33+
1. Sign in to the [Azure portal](https://portal.azure.com/).
34+
1. Search for and select [Advisor](https://aka.ms/azureadvisordashboard) from any page.
35+
1. Select **Advisor score (preview)** from the navigation menu on the left.
36+
1. Click on the **Add Filter** button.
37+
1. Select the tag in the **Filter** field and value(s).
38+
1. Click **Apply**. Advisor score will be updated to only include resources impacted by the filter.
39+
1. Click on any of the categories to review recommendations.
40+
41+
[ ![Screenshot of the Azure Advisor score dashboard that shows score and recommendations after tag filter is applied.](./media/tags/score-tag-filters.png) ](./media/tags/score-tag-filters.png#lightbox)
42+
43+
> [!NOTE]
44+
> Not all capabilities are available when tag filters are used. For example, tag filters are not supported for security score and score history.
45+
46+
## Next steps
47+
48+
To learn more about tagging, see:
49+
- [Define your tagging strategy - Cloud Adoption Framework](/azure/cloud-adoption-framework/ready/azure-best-practices/resource-tagging)
50+
- [Tag resources, resource groups, and subscriptions for logical organization - Azure Resource Manager](/azure/azure-resource-manager/management/tag-resources?tabs=json)
87 KB
Loading
93.8 KB
Loading

articles/advisor/toc.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,12 @@
4040
href: ./resource-graph-samples.md
4141
- name: How-to guides
4242
items:
43-
- name: Security
44-
href: advisor-security-recommendations.md
4543
- name: Optimize costs
4644
href: advisor-cost-recommendations.md
45+
- name: Improve security
46+
href: advisor-security-recommendations.md
47+
- name: Use tags to filter recommendations and score
48+
href: advisor-tag-filtering.md
4749
- name: Configure recommendations
4850
href: view-recommendations.md
4951
- name: Permissions and blocked actions

articles/aks/use-tags.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Azure tags in Azure Kubernetes Service (AKS)
33
description: Learn how to use Azure provider tags to track resources in Azure Kubernetes Service (AKS).
44
services: container-service
55
ms.topic: article
6-
ms.date: 02/08/2022
6+
ms.date: 05/26/2022
77
---
88

99
# Use Azure tags in Azure Kubernetes Service (AKS)
@@ -42,6 +42,13 @@ When you create or update an AKS cluster with the `--tags` parameter, the follow
4242
* The public IP that's associated with the cluster
4343
* The network security group that's associated with the cluster
4444
* The virtual network that's associated with the cluster
45+
* The AKS managed kubelet msi associated with the cluster
46+
* The AKS managed addon msi associated with the cluster
47+
* The private DNS zone associated with the private cluster
48+
* The private endpoint associated with the private cluster
49+
50+
> [!NOTE]
51+
> Azure Private DNS only supports 15 tags. [tag resources](../azure-resource-manager/management/tag-resources.md).
4552
4653
To create a cluster and assign Azure tags, run `az aks create` with the `--tags` parameter, as shown in the following command. Running the command creates a *myAKSCluster* in the *myResourceGroup* with the tags *dept=IT* and *costcenter=9999*.
4754

@@ -203,4 +210,4 @@ parameters:
203210
>
204211
> Any updates that you make to tags through Kubernetes will retain the value that's set through Kubernetes. For example, if your disk has tags *dept=IT* and *costcenter=5555* set by Kubernetes, and you use the portal to set the tags *team=beta* and *costcenter=3333*, the new list of tags would be *dept=IT*, *team=beta*, and *costcenter=5555*. If you then remove the disk through Kubernetes, the disk would have the tag *team=beta*.
205212
206-
[install-azure-cli]: /cli/azure/install-azure-cli
213+
[install-azure-cli]: /cli/azure/install-azure-cli

0 commit comments

Comments
 (0)