You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
Thank you for taking the time to contribute to the Microsoft Azure documentation.
4
4
5
-
This guide covers some general topics related to contribution and refers to the [contributors guide](https://docs.microsoft.com/contribute) for more detailed explanations when required.
5
+
This guide covers some general topics related to contribution and refers to the [contributors guide](/contribute) for more detailed explanations when required.
6
6
7
7
## Code of Conduct
8
8
@@ -21,8 +21,8 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
21
21
22
22
### Editing in GitHub
23
23
24
-
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-existing-documents) in our contributors guide.
24
+
Follow the guidance for [Quick edits to existing documents](/contribute/#quick-edits-to-existing-documents) in our contributors guide.
25
25
26
26
### Pull Request
27
27
28
-
Review the guidance for [Pull Requests](https://docs.microsoft.com/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.
28
+
Review the guidance for [Pull Requests](/contribute/how-to-write-workflows-major#pull-request-processing) in our contributors guide.
Copy file name to clipboardExpand all lines: README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ Contributing to open source is more than just providing updates, it's also about
10
10
11
11
You've decided to contribute, that's great! To contribute to the documentation, you need a few tools.
12
12
13
-
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for the [GitHub account setup](https://docs.microsoft.com/contribute/get-started-setup-github) from our contributor guide.
13
+
Contributing to the documentation requires a GitHub account. If you don't have an account, follow the instructions for the [GitHub account setup](/contribute/get-started-setup-github) from our contributor guide.
14
14
15
15
#### Download
16
16
@@ -22,7 +22,7 @@ Install the following tools:
22
22
23
23
#### Install
24
24
25
-
Follow the instructions provided in the [Install content authoring tools](https://docs.microsoft.com/contribute/get-started-setup-tools) from our contributor guide.
25
+
Follow the instructions provided in the [Install content authoring tools](/contribute/get-started-setup-tools) from our contributor guide.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/faq.yml
+2-2
Original file line number
Diff line number
Diff line change
@@ -245,12 +245,12 @@ sections:
245
245
Follow the following steps to check if the refresh token is valid or revoked:
246
246
1. Retrieve the `RefreshToken` and the `AccessToken` by redeeming `authorization_code`.
247
247
1. Wait for 7 minutes.
248
-
1. Use PowerShell cmdlet [Revoke-AzureADUserAllRefreshToken](https://docs.microsoft.com/powershell/module/azuread/revoke-azureaduserallrefreshtoken?view=azureadps-2.0) or Microsoft Graph API [invalidateAllRefreshTokens](https://docs.microsoft.com/graph/api/user-invalidateallrefreshtokens?view=graph-rest-beta&tabs=http) to run the `RevokeAllRefreshToken` command.
248
+
1. Use PowerShell cmdlet [Revoke-AzureADUserAllRefreshToken](/powershell/module/azuread/revoke-azureaduserallrefreshtoken?view=azureadps-2.0) or Microsoft Graph API [invalidateAllRefreshTokens](/graph/api/user-invalidateallrefreshtokens?tabs=http&view=graph-rest-beta) to run the `RevokeAllRefreshToken` command.
249
249
1. Wait for 10 minutes.
250
250
251
251
1. Retrieve the `RefreshToken` again.
252
252
253
253
- question: |
254
254
How do I report issues with Azure AD B2C?
255
255
answer: |
256
-
See [File support requests for Azure Active Directory B2C](support-options.md).
256
+
See [File support requests for Azure Active Directory B2C](support-options.md).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/certificate-based-authentication-faq.yml
+2-3
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ sections:
61
61
We highly recommend not to disable certificate revocation list (CRL) checking as you won't be able to revoke certificates.
62
62
However, to disable CRL checking if there are issues with CRL for a particular CA, you can update a trusted certificate authority and set the crlDistributionPoint attribute to """.
63
63
64
-
Use the [Set-AzureADTrustedCertificateAuthority](https://docs.microsoft.com/powershell/module/azuread/set-azureadtrustedcertificateauthority) cmdlet:
64
+
Use the [Set-AzureADTrustedCertificateAuthority](/powershell/module/azuread/set-azureadtrustedcertificateauthority) cmdlet:
65
65
66
66
```powershell
67
67
$c=Get-AzureADTrustedCertificateAuthority
@@ -97,5 +97,4 @@ additionalContent: |
97
97
* [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
98
98
* [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
99
99
* [How to configure Azure AD CBA](how-to-certificate-based-authentication.md)
100
-
* [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
101
-
100
+
* [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-certificate-based-authentication.md
+2-3
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ Make sure that the following prerequisites are in place.
42
42
>Each CA should have a certificate revocation list (CRL) that can be referenced from internet-facing URLs. If the trusted CA does not have a CRL configured, Azure AD will not perform any CRL checking, revocation of user certificates will not work, and authentication will not be blocked.
43
43
44
44
>[!IMPORTANT]
45
-
>Make sure the PKI is secure and cannot be easily compromised. In the event of a compromise, the attacker can create and sign client certificates and compromise any user in the tenant, both synced and cloud-only users. However, a strong key protection strategy, along with other physical and logical controls such as HSM activation cards or tokens for the secure storage of artifacts, can provide defense-in-depth to prevent external attackers or insider threats from compromising the integrity of the PKI. For more information, see [Securing PKI](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn786443(v=ws.11)).
45
+
>Make sure the PKI is secure and cannot be easily compromised. In the event of a compromise, the attacker can create and sign client certificates and compromise any user in the tenant, both synced and cloud-only users. However, a strong key protection strategy, along with other physical and logical controls such as HSM activation cards or tokens for the secure storage of artifacts, can provide defense-in-depth to prevent external attackers or insider threats from compromising the integrity of the PKI. For more information, see [Securing PKI](/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn786443(v=ws.11)).
46
46
47
47
## Steps to configure and test Azure AD CBA
48
48
@@ -331,5 +331,4 @@ To enable the certificate-based authentication and configure username bindings u
331
331
- [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
332
332
- [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
333
333
- [FAQ](certificate-based-authentication-faq.yml)
334
-
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
335
-
334
+
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation-create-trust-gcp.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ Take note of the *object ID* of the app (not the application (client) ID) which
31
31
32
32
## Grant your app permissions to resources
33
33
34
-
Grant your app the permissions necessary to access the Azure AD protected resources targeted by your software workload running in Google Cloud. For example, [assign the Storage Blob Data Contributor role](/azure/storage/blobs/assign-azure-role-data-access) to your app if your application needs to read, write, and delete blob data in [Azure Storage](/azure/storage/blobs/storage-blobs-introduction).
34
+
Grant your app the permissions necessary to access the Azure AD protected resources targeted by your software workload running in Google Cloud. For example, [assign the Storage Blob Data Contributor role](../../storage/blobs/assign-azure-role-data-access.md) to your app if your application needs to read, write, and delete blob data in [Azure Storage](../../storage/blobs/storage-blobs-introduction.md).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation-create-trust-github.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -206,6 +206,6 @@ az rest -m DELETE -u 'https://graph.microsoft.com/beta/applications/f6475511-fd
206
206
Before configuring your GitHub Actions workflow, get the *tenant-id* and *client-id* values of your app registration. You can find these values in the Azure portal. Go to the list of [registered applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) and select your app registration. In **Overview**->**Essentials**, find the **Application (client) ID** and **Directory (tenant) ID**. Set these values in your GitHub environment to use in the Azure login action for your workflow.
207
207
208
208
## Next steps
209
-
For an end-to-end example, read [Deploy to App Service using GitHub Actions](/azure/app-service/deploy-github-actions?tabs=openid).
209
+
For an end-to-end example, read [Deploy to App Service using GitHub Actions](../../app-service/deploy-github-actions.md?tabs=openid).
210
210
211
211
Read the [GitHub Actions documentation](https://docs.github.com/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure) to learn more about configuring your GitHub Actions workflow to get an access token from Microsoft identity provider and access Azure resources.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/cross-tenant-access-overview.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ The output is a summary of all available sign-in events for inbound and outbound
91
91
92
92
### Sign-in logs PowerShell script
93
93
94
-
To determine your users' access to external Azure AD organizations, you can use the [Get-MgAuditLogSignIn](https://aka.ms/cross-tenant-log-ps) cmdlet in the Microsoft Graph PowerShell SDK to view data from your sign-in logs for the last 30 days. For example, run the following command:
94
+
To determine your users' access to external Azure AD organizations, you can use the [Get-MgAuditLogSignIn](/powershell/module/microsoft.graph.reports/get-mgauditlogsignin) cmdlet in the Microsoft Graph PowerShell SDK to view data from your sign-in logs for the last 30 days. For example, run the following command:
95
95
96
96
```powershell
97
97
Get-MgAuditLogSignIn `
@@ -113,4 +113,4 @@ If your organization exports sign-in logs to a Security Information and Event Ma
113
113
114
114
## Next steps
115
115
116
-
[Configure cross-tenant access settings for B2B collaboration](cross-tenant-access-settings-b2b-collaboration.md)
116
+
[Configure cross-tenant access settings for B2B collaboration](cross-tenant-access-settings-b2b-collaboration.md)
# Automate Azure AD Identity Governance tasks via Azure Automation and Microsoft Graph
24
24
25
-
[Azure Automation](/azure/automation/overview) is an Azure cloud service that allows you to automate common or repetitive systems management and processes. Microsoft Graph is the Microsoft unified API endpoint for Azure AD features that manage users, groups, access packages, access reviews, and other resources in the directory. You can manage Azure AD at scale from the PowerShell command line, using the [Microsoft Graph PowerShell SDK](/graph/powershell/get-started). You can also include the Microsoft Graph PowerShell cmdlets from a [PowerShell-based runbook in Azure Automation](/azure/automation/automation-intro), so that you can automate Azure AD tasks from a simple script.
25
+
[Azure Automation](../../automation/overview.md) is an Azure cloud service that allows you to automate common or repetitive systems management and processes. Microsoft Graph is the Microsoft unified API endpoint for Azure AD features that manage users, groups, access packages, access reviews, and other resources in the directory. You can manage Azure AD at scale from the PowerShell command line, using the [Microsoft Graph PowerShell SDK](/graph/powershell/get-started). You can also include the Microsoft Graph PowerShell cmdlets from a [PowerShell-based runbook in Azure Automation](/azure/automation/automation-intro), so that you can automate Azure AD tasks from a simple script.
26
26
27
27
Azure Automation and the PowerShell Graph SDK supports certificate-based authentication and application permissions, so you can have Azure Automation runbooks authenticate to Azure AD without needing a user context.
28
28
29
29
This article will show you how to get started using Azure Automation for Azure AD Identity Governance, by creating a simple runbook that queries entitlement management via Microsoft Graph PowerShell.
30
30
31
31
## Create an Azure Automation account
32
32
33
-
Azure Automation provides a cloud-hosted environment for [runbook execution](/azure/automation/automation-runbook-execution). Those runbooks can start automatically based on a schedule, or be triggered by webhooks or by Logic Apps.
33
+
Azure Automation provides a cloud-hosted environment for [runbook execution](../../automation/automation-runbook-execution.md). Those runbooks can start automatically based on a schedule, or be triggered by webhooks or by Logic Apps.
34
34
35
35
Using Azure Automation requires you to have an Azure subscription.
Once your runbook is published, your can create a schedule in Azure Automation, and link your runbook to that schedule to run automatically. Scheduling runbooks from Azure Automation is suitable for runbooks that do not need to interact with other Azure or Office 365 services.
184
184
185
-
If you wish to send the output of your runbook to another service, then you may wish to consider using [Azure Logic Apps](/azure/logic-apps/logic-apps-overview) to start your Azure Automation runbook, as Logic Apps can also parse the results.
185
+
If you wish to send the output of your runbook to another service, then you may wish to consider using [Azure Logic Apps](../../logic-apps/logic-apps-overview.md) to start your Azure Automation runbook, as Logic Apps can also parse the results.
186
186
187
187
1. In Azure Logic Apps, create a Logic App in the Logic Apps Designer starting with **Recurrence**.
188
188
@@ -192,7 +192,7 @@ If you wish to send the output of your runbook to another service, then you may
192
192
193
193
1. Select **New step** and add the operation **Get job output**. Select the same Subscription, Resource Group, Automation Account as the previous step, and select the Dynamic value of the **Job ID** from the previous step.
194
194
195
-
1. You can then add more operations to the Logic App, such as the [**Parse JSON** action](/azure/logic-apps/logic-apps-perform-data-operations#parse-json-action), that use the **Content** returned when the runbook completes.
195
+
1. You can then add more operations to the Logic App, such as the [**Parse JSON** action](../../logic-apps/logic-apps-perform-data-operations.md#parse-json-action), that use the **Content** returned when the runbook completes.
196
196
197
197
Note that in Azure Automation, a PowerShell runbook can fail to complete if it tries to write a large amount of data to the output stream at once. You can typically work around this issue by having the runbook output just the information needed by the Logic App, such as by using the `Select-Object -Property` cmdlet to exclude unneeded properties.
198
198
@@ -207,5 +207,5 @@ There are two places where you can see the expiration date in the Azure portal.
207
207
208
208
## Next steps
209
209
210
-
-[Create an Automation account using the Azure portal](/azure/automation/quickstarts/create-account-portal)
211
-
-[Manage access to resources in Active Directory entitlement management using Microsoft Graph PowerShell](/powershell/microsoftgraph/tutorial-entitlement-management?view=graph-powershell-beta)
210
+
-[Create an Automation account using the Azure portal](../../automation/quickstarts/create-account-portal.md)
211
+
-[Manage access to resources in Active Directory entitlement management using Microsoft Graph PowerShell](/powershell/microsoftgraph/tutorial-entitlement-management?view=graph-powershell-beta)
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-sync-feature-directory-extensions.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -50,8 +50,8 @@ An object in Azure AD can have up to 100 attributes for directory extensions. Th
50
50
51
51
> [!NOTE]
52
52
> It is not supported to sync constructed attributes, such as msDS-UserPasswordExpiryTimeComputed. If you upgrade from an old version of AADConnect you may still see these attributes show up in the installation wizard, you should not enable them though. Their value will not sync to Azure AD if you do.
53
-
> You can read more about constructed attributes in [this artice](https://docs.microsoft.com/openspecs/windows_protocols/ms-adts/a3aff238-5f0e-4eec-8598-0a59c30ecd56).
54
-
> You should also not attempt to sync [Non-replicated attributes](https://docs.microsoft.com/windows/win32/ad/attributes), such as badPwdCount, Last-Logon, and Last-Logoff, as their values will not be synced to Azure AD.
53
+
> You can read more about constructed attributes in [this artice](/openspecs/windows_protocols/ms-adts/a3aff238-5f0e-4eec-8598-0a59c30ecd56).
54
+
> You should also not attempt to sync [Non-replicated attributes](/windows/win32/ad/attributes), such as badPwdCount, Last-Logon, and Last-Logoff, as their values will not be synced to Azure AD.
55
55
56
56
## Configuration changes in Azure AD made by the wizard
57
57
@@ -100,4 +100,4 @@ One of the more useful scenarios is to use these attributes in dynamic security
100
100
## Next steps
101
101
Learn more about the [Azure AD Connect sync](how-to-connect-sync-whatis.md) configuration.
102
102
103
-
Learn more about [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md).
103
+
Learn more about [Integrating your on-premises identities with Azure Active Directory](whatis-hybrid-identity.md).
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/tshoot-connect-sync-errors.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Errors can occur when identity data is synced from Windows Server Active Directo
24
24
This article assumes you're familiar with the underlying [design concepts of Azure AD and Azure AD Connect](plan-connect-design-concepts.md).
25
25
26
26
>[!IMPORTANT]
27
-
>This article attempts to address the most common synchronization errors. Unfortunately, covering every scenario in one document is not possible. For more information including in-depth troubleshooting steps, see [End-to-end troubleshooting of Azure AD Connect objects and attributes](https://docs.microsoft.com/troubleshoot/azure/active-directory/troubleshoot-aad-connect-objects-attributes) and the [User Provisioning and Synchronization](https://docs.microsoft.com/troubleshoot/azure/active-directory/welcome-azure-ad) section under the Azure AD troubleshooting documentation.
27
+
>This article attempts to address the most common synchronization errors. Unfortunately, covering every scenario in one document is not possible. For more information including in-depth troubleshooting steps, see [End-to-end troubleshooting of Azure AD Connect objects and attributes](/troubleshoot/azure/active-directory/troubleshoot-aad-connect-objects-attributes) and the [User Provisioning and Synchronization](/troubleshoot/azure/active-directory/welcome-azure-ad) section under the Azure AD troubleshooting documentation.
28
28
29
29
With the latest version of Azure AD Connect \(August 2016 or higher\), a Synchronization Errors Report is available in the [Azure portal](https://aka.ms/aadconnecthealth) as part of Azure AD Connect Health for sync.
30
30
@@ -299,5 +299,5 @@ To resolve this issue:
299
299
300
300
*[Locate Active Directory objects in Active Directory Administrative Center](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd560661(v=ws.10))
301
301
*[Query Azure AD for an object by using Azure AD PowerShell](/previous-versions/azure/jj151815(v=azure.100))
302
-
*[End-to-end troubleshooting of Azure AD Connect objects and attributes](https://docs.microsoft.com/troubleshoot/azure/active-directory/troubleshoot-aad-connect-objects-attributes)
303
-
*[Azure AD Troubleshooting](https://docs.microsoft.com/troubleshoot/azure/active-directory/welcome-azure-ad)
302
+
*[End-to-end troubleshooting of Azure AD Connect objects and attributes](/troubleshoot/azure/active-directory/troubleshoot-aad-connect-objects-attributes)
303
+
*[Azure AD Troubleshooting](/troubleshoot/azure/active-directory/welcome-azure-ad)
0 commit comments