Skip to content

Commit fe44e9c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-check-access-update
2 parents 996d2dc + c8e5e33 commit fe44e9c

File tree

673 files changed

+2962
-1672
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

673 files changed

+2962
-1672
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -510,6 +510,11 @@
510510
"source_path_from_root": "/articles/azure-monitor/logs/workspace-design-service-providers.md" ,
511511
"redirect_url": "/azure/azure-monitor/logs/workspace-design",
512512
"redirect_document_id": false
513+
},
514+
{
515+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-transition-hybrid.md" ,
516+
"redirect_url": "/azure/azure-monitor/containers/container-insights-onboard",
517+
"redirect_document_id": false
513518
}
514519
]
515520
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22348,6 +22348,11 @@
2234822348
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-key-vault",
2234922349
"redirect_document_id": false
2235022350
},
22351+
{
22352+
"source_path_from_root": "/articles/storage/common/customer-managed-keys-configure-key-vault.md",
22353+
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-existing-account",
22354+
"redirect_document_id": false
22355+
},
2235122356
{
2235222357
"source_path_from_root": "/articles/storage/common/encryption-customer-managed-keys.md",
2235322358
"redirect_url": "/azure/storage/common/customer-managed-keys-overview",

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ Your final configuration file should look like the following JSON:
182182
```json
183183
{
184184
"credentials": {
185-
"tenantName": "<your-tenant-name>",
185+
"tenantName": "<your-tenant-name>.ommicrosoft.com",
186186
"clientID": "<your-webapi-application-ID>",
187187
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
188188
},

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ Note, the [list](/graph/api/authentication-list-phonemethods) operation returns
6060

6161
An email address that can be used by a [username sign-in account](sign-in-options.md#username-sign-in) to reset the password. For more information, see [Azure AD authentication methods API](/graph/api/resources/emailauthenticationmethod).
6262

63-
- [Add](/graph/api/emailauthenticationmethod-post)
64-
- [List](/graph/api/emailauthenticationmethod-list)
63+
- [Add](/graph/api/authentication-post-emailmethods)
64+
- [List](/graph/api/authentication-list-emailmethods)
6565
- [Get](/graph/api/emailauthenticationmethod-get)
6666
- [Update](/graph/api/emailauthenticationmethod-update)
6767
- [Delete](/graph/api/emailauthenticationmethod-delete)

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: conceptual
99
ms.workload: identity
10-
ms.date: 07/05/2022
10+
ms.date: 08/25/2022
1111
ms.author: billmath
1212
ms.reviewer: arvinh
1313
---
@@ -22,6 +22,7 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2222
- An Azure AD tenant with Azure AD Premium P1 or Premium P2 (or EMS E3 or E5). [!INCLUDE [active-directory-p1-license.md](../../../includes/active-directory-p1-license.md)]
2323
- Administrator role for installing the agent. This task is a one-time effort and should be an Azure account that's either a hybrid administrator or a global administrator.
2424
- Administrator role for configuring the application in the cloud (application administrator, cloud application administrator, global administrator, or a custom role with permissions).
25+
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2526

2627
## Deploying Azure AD provisioning agent
2728
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a seperate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or seperate hosts, again as long as each SCIM endpoint is reachable by the agent.
@@ -49,6 +50,9 @@ Once the agent is installed, no further configuration is necesary on-prem, and a
4950
12. Go to the **Provisioning** pane, and select **Start provisioning**.
5051
13. Monitor using the [provisioning logs](../../active-directory/reports-monitoring/concept-provisioning-logs.md).
5152

53+
The following video provides an overview of on-premises provisoning.
54+
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
55+
5256
## Additional requirements
5357
* Ensure your [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) implementation meets the [Azure AD SCIM requirements](use-scim-to-provision-users-and-groups.md).
5458

articles/active-directory/cloud-sync/concept-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes the Azure AD schema, the attributes that the
44
services: active-directory
55
documentationcenter: ''
66
author: billmath
7-
manager: karenhoran
7+
manager: amycolannino
88
editor: ''
99
ms.service: active-directory
1010
ms.topic: conceptual
@@ -250,4 +250,4 @@ To view the schema and verify it, follow these steps.
250250
## Next steps
251251
252252
- [What is provisioning?](what-is-provisioning.md)
253-
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)
253+
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)

articles/active-directory/cloud-sync/concept-how-it-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Azure AD Connect cloud sync deep dive - how it works'
33
description: This topic provides deep dive information on how cloud sync works.
44
services: active-directory
55
author: billmath
6-
manager: karenhoran
6+
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual

articles/active-directory/cloud-sync/how-to-accidental-deletes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Azure AD Connect cloud sync accidental deletes'
33
description: This topic describes how to use the accidental delete feature to prevent deletions.
44
services: active-directory
55
author: billmath
6-
manager: karenhoran
6+
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: conceptual

articles/active-directory/cloud-sync/how-to-attribute-mapping.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: 'Attribute mapping in Azure AD Connect cloud sync'
33
description: This article describes how to use the cloud sync feature of Azure AD Connect to map attributes.
44
services: active-directory
55
author: billmath
6-
manager: karenhoran
6+
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
@@ -156,4 +156,4 @@ To test your attribute mapping, you can use [on-demand provisioning](how-to-on-d
156156
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)
157157
- [Writing expressions for attribute mappings](reference-expressions.md)
158158
- [How to use expression builder with cloud sync](how-to-expression-builder.md)
159-
- [Attributes synchronized to Azure Active Directory](../hybrid/reference-connect-sync-attributes-synchronized.md?context=azure%2factive-directory%2fcloud-provisioning%2fcontext%2fcp-context/hybrid/reference-connect-sync-attributes-synchronized.md)
159+
- [Attributes synchronized to Azure Active Directory](../hybrid/reference-connect-sync-attributes-synchronized.md?context=azure%2factive-directory%2fcloud-provisioning%2fcontext%2fcp-context/hybrid/reference-connect-sync-attributes-synchronized.md)

articles/active-directory/cloud-sync/how-to-automatic-upgrade.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes the built-in automatic upgrade feature in th
44
services: active-directory
55
documentationcenter: ''
66
author: billmath
7-
manager: karenhoran
7+
manager: amycolannino
88
editor: ''
99
ms.service: active-directory
1010
ms.topic: how-to

0 commit comments

Comments
 (0)