Skip to content

Commit fb23286

Browse files
authored
Merge pull request #110968 from MicrosoftDocs/master
4/10 AM Publish
2 parents ae3d707 + a44009e commit fb23286

File tree

89 files changed

+676
-833
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+676
-833
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
356356
"redirect_document_id": true
357357
},
358-
358+
359359
{
360360
"source_path": "articles/machine-learning/service/how-to-understand-accuracy-metrics.md",
361361
"redirect_url": "/azure/machine-learning/service/how-to-understand-automated-ml",
@@ -50644,11 +50644,6 @@
5064450644
"redirect_url": "/azure/developer/ansible/vm-scale-set-update-image",
5064550645
"redirect_document_id": false
5064650646
},
50647-
{
50648-
"source_path": "articles/ansible/",
50649-
"redirect_url": "/azure/developer/ansible/",
50650-
"redirect_document_id": false
50651-
},
5065250647
{
5065350648
"source_path": "articles/ansible/index.yml",
5065450649
"redirect_url": "/azure/developer/ansible/",
@@ -50683,6 +50678,16 @@
5068350678
"source_path": "articles/chef/index.yml",
5068450679
"redirect_url": "/azure/developer/chef/",
5068550680
"redirect_document_id": false
50681+
},
50682+
{
50683+
"source_path": "articles/security/fundamentals/database-security-overview.md",
50684+
"redirect_url": "/azure/sql-database/sql-database-security-overview",
50685+
"redirect_document_id": false
50686+
},
50687+
{
50688+
"source_path": "articles/security/fundamentals/database-best-practices.md",
50689+
"redirect_url": "/azure/sql-database/sql-database-security-best-practice",
50690+
"redirect_document_id": false
5068650691
}
5068750692
]
5068850693
}

articles/active-directory/develop/quickstart-v2-netcore-daemon.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,6 @@ app = ConfidentialClientApplicationBuilder.Create(config.ClientId)
193193
.WithClientSecret(config.ClientSecret)
194194
.WithAuthority(new Uri(config.Authority))
195195
.Build();
196-
);
197196
```
198197

199198
> | Where: ||

articles/active-directory/reports-monitoring/concept-provisioning-logs.md

Lines changed: 32 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -86,23 +86,31 @@ Select an item in the list view to get more detailed information.
8686

8787
## Filter provisioning activities
8888

89-
To narrow down the reported data to a level that works for you, you can filter the provisioning data using the following default fields. Note that the values in the filters are dynamically populated based on your tenant. If, for example, you don't have any create events in your tenant, there won't be a filter option for create.
89+
You can filter your provisioning data. Some filter values are dynamically populated based on your tenant. If, for example, you don't have any create events in your tenant, there won't be a filter option for create.
90+
In the default view, you can select the following filters:
9091

9192
- Identity
92-
- Action
93-
- Source system
94-
- Target system
95-
- Status
9693
- Date
94+
- Status
95+
- Action
9796

9897

99-
![Filter](./media/concept-provisioning-logs/filter.png "Filter")
98+
![Filter](./media/concept-provisioning-logs/default-filter.png "Filter")
10099

101100
The **Identity** filter enables you to specify the name or the identity that you care about. This identity could be a user, group, role, or other object. You can search by the name or ID of the object. The ID varies by scenario. For example, when provisioning an object from Azure AD to SalesForce, the Source ID is the object ID of the user in Azure AD while the TargetID is the ID of the user in Salesforce. When provisioning from Workday to Active Directory, the Source ID is the Workday worker employee ID. Note that the Name of the user may not always be present in the Identity column. There will always be one ID.
102101

103-
The **Source System** filter enables you to specify where the identity is getting provisioned from. For example, when provisioning an object from Azure AD to ServiceNow, the Source system is Azure AD.
104102

105-
The **Target System** filter enables you to specify where the identity is getting provisioned to. For example, when provisioning an object from Azure AD to ServiceNow, the Target System is ServiceNow.
103+
The **Date** filter enables to you to define a timeframe for the returned data.
104+
Possible values are:
105+
106+
- 1 month
107+
- 7 days
108+
- 30 days
109+
- 24 hours
110+
- Custom time interval
111+
112+
When you select a custom time frame, you can configure a start date and an end date.
113+
106114

107115
The **Status** filter enables you to select:
108116

@@ -111,6 +119,8 @@ The **Status** filter enables you to select:
111119
- Failure
112120
- Skipped
113121

122+
123+
114124
The **Action** filter enables you to filter the:
115125

116126
- Create
@@ -119,19 +129,18 @@ The **Action** filter enables you to filter the:
119129
- Disable
120130
- Other
121131

122-
The **Date** filter enables to you to define a timeframe for the returned data.
123-
Possible values are:
132+
In addition, to the filters of the default view, you can also set the following filters:
124133

125-
- 1 month
126-
- 7 days
127-
- 30 days
128-
- 24 hours
129-
- Custom time interval
134+
- Job ID
135+
- Cycle ID
136+
- Change ID
137+
- Source ID
138+
- Target ID
139+
- Application
130140

131-
When you select a custom time frame, you can configure a start date and an end date.
132141

142+
![Pick a field](./media/concept-provisioning-logs/add-filter.png "Pick a field")
133143

134-
In addition to the default fields, when selected, you can also include the following fields in your filter:
135144

136145
- **Job ID** - A unique Job ID is associated with each application that you have enabled provisioning for.
137146

@@ -140,8 +149,13 @@ In addition to the default fields, when selected, you can also include the follo
140149
- **Change ID** - Unique identifier for the provisioning event. You can share this ID to support to look up the provisioning event.
141150

142151

152+
- **Source System** - Enables you to specify where the identity is getting provisioned from. For example, when provisioning an object from Azure AD to ServiceNow, the Source system is Azure AD.
153+
154+
- **Target System** - Enables you to specify where the identity is getting provisioned to. For example, when provisioning an object from Azure AD to ServiceNow, the Target System is ServiceNow.
155+
156+
- **Application** - Enables you to show only records of applications with a display name that contains a specific string.
143157

144-
158+
145159

146160
## Provisioning details
147161

8.7 KB
Loading
12.6 KB
Loading
14 Bytes
Loading

articles/active-directory/users-groups-roles/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,10 @@
122122
items:
123123
- name: Create a dynamic group
124124
href: groups-create-rule.md
125-
- name: Dynamic group rule syntax
125+
- name: Dynamic group rule syntax
126126
href: groups-dynamic-membership.md
127+
- name: Validate a membership rule
128+
href: groups-dynamic-rule-validation.md
127129
- name: Change group membership type
128130
href: groups-change-type.md
129131
- name: Assign licenses

articles/active-directory/users-groups-roles/groups-dynamic-membership.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Rules for dynamic group membership - Azure AD | Microsoft Docs
2+
title: Rules for dynamically populated groups membership - Azure AD | Microsoft Docs
33
description: How to create membership rules to automatically populate groups, and a rule reference.
44
services: active-directory
55
documentationcenter: ''
@@ -321,7 +321,7 @@ user.objectId -ne null
321321
If you want your group to exclude guest users and include only members of your tenant, you can use the following syntax:
322322

323323
```
324-
(user.objectId -ne null) -and (user.userType -eq Member)
324+
(user.objectId -ne null) -and (user.userType -eq "Member")
325325
```
326326

327327
### Create an "All devices" rule
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: Validate rules for dynamic group membership (preview) - Azure AD | Microsoft Docs
3+
description: How to test members against a membership rule for a dynamic groups in Azure Active Directory.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: curtand
7+
manager: daveba
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.subservice: users-groups-roles
11+
ms.topic: article
12+
ms.date: 04/10/2020
13+
ms.author: curtand
14+
ms.reviewer: yukarppa
15+
ms.custom: it-pro
16+
ms.collection: M365-identity-device-management
17+
---
18+
19+
# Validate a dynamic group membership rule (preview) in Azure Active Directory
20+
21+
Azure Active Directory (Azure AD) now provides the means to validate dynamic group rules (in public preview). On the **Validate rules** tab, you can validate your dynamic rule against sample group members to confirm the rule is working as expected. When creating or updating dynamic group rules, administrators want to know whether a user or a device will be a member of the group. This helps evaluate whether user or device meets the rule criteria and aid in troubleshooting when membership is not expected.
22+
23+
## Step-by-step walk-through
24+
25+
To get started, go to **Azure Active Directory** > **Groups**. Select an existing dynamic group or create a new dynamic group and click on Dynamic membership rules. You can then see the **Validate Rules** tab.
26+
27+
![Find the Validate rules tab and start with an existing rule](./media/groups-dynamic-rule-validation/validate-tab.png)
28+
29+
On **Validate rules** tab, you can select users to validate their memberships. 20 users or devices can be selected at one time.
30+
31+
![Add users to validate the existing rule against](./media/groups-dynamic-rule-validation/validate-tab-add-users.png)
32+
33+
After choosing the users or devices from the picker, and **Select**, validation will automatically start and validation results will appear.
34+
35+
![View the results of the rule validation](./media/groups-dynamic-rule-validation/validate-tab-results.png)
36+
37+
The results tell whether a user is a member of the group or not. If the rule is not valid or there is a network issue, the result will show as **Unknown**. In case of **Unknown**, the detailed error message will describe the issue and actions needed.
38+
39+
![View the details of the results of the rule validation](./media/groups-dynamic-rule-validation/validate-tab-view-details.png)
40+
41+
You can modify the rule and validation of memberships will be triggered. To see why user is not a member of the group, click on "View details" and verification details will show the result of each expression composing the rule. Click **OK** to exit.
42+
43+
## Next steps
44+
45+
- [Dynamic membership rules for groups](groups-dynamic-membership.md)
45.5 KB
Loading

0 commit comments

Comments
 (0)