Skip to content

Commit f9c9780

Browse files
authored
Merge pull request #235630 from MicrosoftDocs/main
4/24 PM Publish
2 parents 1147398 + bba8106 commit f9c9780

File tree

113 files changed

+2258
-2041
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+2258
-2041
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -965,6 +965,11 @@
965965
"redirect_url": "/azure/aks/workload-identity-migrate-from-pod-identity",
966966
"redirect_document_id": false
967967
},
968+
{
969+
"source_path_from_root": "/articles/aks/managed-aad.md",
970+
"redirect_url": "/azure/aks/managed-azure-ad",
971+
"redirect_document_id": false
972+
},
968973
{
969974
"source_path": "articles/germany/germany-developer-guide.md",
970975
"redirect_url": "/previous-versions/azure/germany/germany-developer-guide",

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 04/19/2023
11+
ms.date: 04/24/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -258,7 +258,7 @@ For example: In the diagram, the provisioning apps are set up for each geographi
258258
* Use the [provisioning agent configuration wizard](../cloud-sync/how-to-install.md#install-the-agent) to register all child AD domains with your Azure AD tenant.
259259
* Create a separate HR2AD provisioning app for each target domain.
260260
* When configuring the provisioning app, select the respective child AD domain from the dropdown of available AD domains.
261-
* Use [scoping filters](define-conditional-rules-for-provisioning-user-accounts.md) in the provisioning app to define users to be processed by each app.
261+
* Use [scoping filters](define-conditional-rules-for-provisioning-user-accounts.md) in the provisioning app to define users that each app processes.
262262
* Configure [skip out of scope deletions flag](skip-out-of-scope-deletions.md) to prevent accidental account deactivations.
263263

264264

@@ -275,9 +275,9 @@ For example: In the diagram, the provisioning apps are set up for each geographi
275275
* Configure [referral chasing](../cloud-sync/how-to-manage-registry-options.md#configure-referral-chasing) on the provisioning agent.
276276
* Use the [provisioning agent configuration wizard](../cloud-sync/how-to-install.md#install-the-agent) to register the parent AD domain and all child AD domains with your Azure AD tenant.
277277
* Create a separate HR2AD provisioning app for each target domain.
278-
* When configuring each provisioning app, select the parent AD domain from the dropdown of available AD domains. This ensures forest-wide lookup while generating unique values for attributes like *userPrincipalName*, *samAccountName* and *mail*.
278+
* When configuring each provisioning app, select the parent AD domain from the dropdown of available AD domains. Selecting the parent domain ensures forest-wide lookup while generating unique values for attributes like *userPrincipalName*, *samAccountName* and *mail*.
279279
* Use *parentDistinguishedName* with expression mapping to dynamically create user in the correct child domain and [OU container](#configure-active-directory-ou-container-assignment).
280-
* Use [scoping filters](define-conditional-rules-for-provisioning-user-accounts.md) in the provisioning app to define users to be processed by each app.
280+
* Use [scoping filters](define-conditional-rules-for-provisioning-user-accounts.md) in the provisioning app to define users that each app processes.
281281
* To resolve cross-domain managers references, create a separate HR2AD provisioning app for updating only the *manager* attribute. Set the scope of this app to all users.
282282
* Configure [skip out of scope deletions flag](skip-out-of-scope-deletions.md) to prevent accidental account deactivations.
283283

@@ -294,7 +294,7 @@ For example: In the diagram, a single provisioning app manages users present in
294294
* Configure [referral chasing](../cloud-sync/how-to-manage-registry-options.md#configure-referral-chasing) on the provisioning agent.
295295
* Use the [provisioning agent configuration wizard](../cloud-sync/how-to-install.md#install-the-agent) to register the parent AD domain and all child AD domains with your Azure AD tenant.
296296
* Create a single HR2AD provisioning app for the entire forest.
297-
* When configuring the provisioning app, select the parent AD domain from the dropdown of available AD domains. This ensures forest-wide lookup while generating unique values for attributes like *userPrincipalName*, *samAccountName* and *mail*.
297+
* When configuring the provisioning app, select the parent AD domain from the dropdown of available AD domains. Selecting the parent domain ensures forest-wide lookup while generating unique values for attributes like *userPrincipalName*, *samAccountName* and *mail*.
298298
* Use *parentDistinguishedName* with expression mapping to dynamically create user in the correct child domain and [OU container](#configure-active-directory-ou-container-assignment).
299299
* If you're using scoping filters, configure [skip out of scope deletions flag](skip-out-of-scope-deletions.md) to prevent accidental account deactivations.
300300

@@ -363,7 +363,7 @@ You can also [customize the default attribute mappings](../app-provisioning/cust
363363

364364
### Determine user account status
365365

366-
By default, the provisioning connector app maps the HR user profile status to the user account status in Active Directory or Azure AD to determine whether to enable or disable the user account.
366+
By default, the provisioning connector app maps the HR user profile status to the user account status. The status is used to determine whether to enable or disable the user account.
367367

368368
When you initiate the Joiners-Leavers process, gather the following requirements.
369369

@@ -399,8 +399,8 @@ When you initiate the Joiners-Movers-Leavers process, gather the following requi
399399
Depending on your requirements, you can modify the mappings to meet your integration goals. For more information, see the specific cloud HR app tutorial (such as [Workday](../saas-apps/workday-inbound-tutorial.md#part-4-configure-attribute-mappings)) for a list of custom attributes to map.
400400

401401
### Generate a unique attribute value
402+
Attributes like CN, samAccountName, and the UPN have unique constraints. You may need to generate unique attribute values when you initiate the Joiners process.
402403

403-
When you initiate the Joiners process, you might need to generate unique attribute values when you set attributes like CN, samAccountName, and the UPN, which has unique constraints.
404404

405405
The Azure AD function [SelectUniqueValues](../app-provisioning/functions-for-customizing-application-data.md#selectuniquevalue) evaluates each rule and then checks the value generated for uniqueness in the target system. For an example, see [Generate unique value for the userPrincipalName (UPN) attribute](../app-provisioning/functions-for-customizing-application-data.md#generate-unique-value-for-userprincipalname-upn-attribute).
406406

@@ -439,8 +439,7 @@ When the Azure AD provisioning service runs for the first time, it performs an [
439439
After you're satisfied with the results of the initial cycle for test users, start the [incremental updates](../app-provisioning/how-provisioning-works.md#incremental-cycles).
440440

441441
## Plan testing and security
442-
443-
At each stage of your deployment from initial pilot through enabling user provisioning, ensure that you're testing that results are as expected and auditing the provisioning cycles.
442+
A deployment consists of stages ranging from the initial pilot to enabling user provisioning. At each stage, ensure that you're testing for expected results. Also, audit the provisioning cycles.
444443

445444
### Plan testing
446445

@@ -452,7 +451,7 @@ After you configure the cloud HR app to Azure AD user provisioning, run test cas
452451
|User is terminated in the cloud HR app.|- The user account is disabled in Active Directory.</br>- The user can't log into any enterprise apps protected by Active Directory.
453452
|User supervisory organization is updated in the cloud HR app.|Based on the attribute mapping, the user account moves from one OU to another in Active Directory.|
454453
|HR updates the user's manager in the cloud HR app.|The manager field in Active Directory is updated to reflect the new manager's name.|
455-
|HR rehires an employee into a new role.|Behavior depends on how the cloud HR app is configured to generate employee IDs:</br>- If the old employee ID is used for a rehired employee, the connector enables the existing Active Directory account for the user.</br>- If the rehired employee gets a new employee ID, the connector creates a new Active Directory account for the user.|
454+
|HR rehires an employee into a new role.|Behavior depends on how the cloud HR app is configured to generate employee IDs. If the old employee ID is used for a rehired employee, the connector enables the existing Active Directory account for the user. If the rehired employee gets a new employee ID, the connector creates a new Active Directory account for the user.|
456455
|HR converts the employee to a contract worker or vice versa.|A new Active Directory account is created for the new persona and the old account gets disabled on the conversion effective date.|
457456

458457
Use the previous results to determine how to transition your automatic user provisioning implementation into production based on your established timelines.
@@ -482,7 +481,7 @@ Choose the cloud HR app that aligns to your solution requirements.
482481

483482
## Manage your configuration
484483

485-
Azure AD can provide additional insights into your organization's user provisioning usage and operational health through audit logs and reports.
484+
Azure AD can provide more insights into your organization's user provisioning usage and operational health through audit logs and reports.
486485

487486
### Gain insights from reports and logs
488487

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,6 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
4141

4242
## Enable Authenticator Lite
4343

44-
>[!NOTE]
45-
>Rollout has not yet completed across Outlook applications. If this feature is enabled in your tenant, your users may not yet be prompted for the experience. To minimize user disruption, we recommend enabling this feature when the rollout completes.
46-
4744
By default, Authenticator Lite is [Microsoft managed](concept-authentication-default-enablement.md#microsoft-managed-settings) and disabled during preview. After general availability, the Microsoft managed state default value will change to enable Authenticator Lite.
4845

4946
### Enablement Authenticator Lite in Azure portal UX

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/20/2022
11+
ms.date: 04/24/2023
1212
ms.author: jfields
1313
---
1414

@@ -17,7 +17,7 @@ ms.author: jfields
1717
This article describes how to enable Permissions Management in your organization. Once you've enabled Permissions Management, you can connect it to your Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) platforms.
1818

1919
> [!NOTE]
20-
> To complete this task, you must have *global administrator* permissions as a user in that tenant. You can't enable Permissions Management as a user from other tenant who has signed in via B2B or via Azure Lighthouse.
20+
> To complete this task, you must have *Microsoft Entra Permissions Management Administrator* permissions. You can't enable Permissions Management as a user from another tenant who has signed in via B2B or via Azure Lighthouse.
2121
2222
:::image type="content" source="media/onboard-enable-tenant/dashboard.png" alt-text="A preview of what the permissions management dashboard looks like." lightbox="media/onboard-enable-tenant/dashboard.png":::
2323

articles/active-directory/develop/msal-logging-dotnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Example:
8080
{
8181
public EventLogLevel MinLogLevel { get; }
8282

83-
public TestIdentityLogger()
83+
public MyIdentityLogger()
8484
{
8585
//Try to pull the log level from an environment variable
8686
var msalEnvLogLevel = Environment.GetEnvironmentVariable("MSAL_LOG_LEVEL");

articles/active-directory/enterprise-users/groups-bulk-download-members.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: barclayn
66
ms.author: barclayn
77
manager: amycolannino
8-
ms.date: 06/23/2022
8+
ms.date: 04/24/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -24,7 +24,7 @@ You can bulk download the members of a group in your organization to a comma-sep
2424
1. Sign in to [the Azure portal](https://portal.azure.com) with an account in the organization.
2525
1. In Azure AD, select **Groups** > **All groups**.
2626
1. Open the group whose membership you want to download, and then select **Members**.
27-
1. On the **Members** page, select **Download members** to download a CSV file listing the group members.
27+
1. On the **Members** page, select **Bulk operations** and choose, **Download members** to download a CSV file listing the group members.
2828

2929
![The Download Members command is on the profile page for the group](./media/groups-bulk-download-members/download-panel.png)
3030

-3.23 KB
Loading

articles/aks/TOC.yml

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -325,7 +325,13 @@
325325
- name: Enable Azure Active Directory integration
326326
items:
327327
- name: AKS-managed Azure AD
328-
href: managed-aad.md
328+
items:
329+
- name: Enable AKS-managed Azure AD integration
330+
href: managed-azure-ad.md
331+
- name: Manage local accounts
332+
href: manage-local-accounts-managed-azure-ad.md
333+
- name: Cluster access control
334+
href: access-control-managed-azure-ad.md
329335
- name: Azure AD integration (legacy)
330336
href: azure-ad-integration-cli.md
331337
- name: Enable GMSA integration
@@ -421,7 +427,9 @@
421427
href: coredns-custom.md
422428
- name: Egress
423429
items:
424-
- name: Restrict and control cluster egress traffic
430+
- name: Outbound network and FQDN rules for AKS clusters
431+
href: outbound-rules-control-egress.md
432+
- name: Control cluster egress traffic using Azure Firewall
425433
href: limit-egress-traffic.md
426434
- name: Configure outbound type for AKS
427435
href: egress-outboundtype.md

0 commit comments

Comments
 (0)