Skip to content

Commit 92b3de2

Browse files
committed
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into title3
2 parents 0258e10 + bbe7475 commit 92b3de2

File tree

107 files changed

+208
-229
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+208
-229
lines changed

articles/active-directory/active-directory-application-proxy-conditional-access.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Conditional Access for Applications Published with Azure AD Application Proxy
2+
title: Conditional access to on-prem apps - Azure AD | Microsoft Docs
33
description: Covers how to set up conditional access for applications you publish to be accessed remotely using Azure AD Application Proxy.
44
services: active-directory
55
documentationcenter: ''
@@ -13,11 +13,11 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 06/22/2016
16+
ms.date: 01/23/2017
1717
ms.author: kgremban
1818

1919
---
20-
# Working with conditional access
20+
# Working with conditional access in Azure AD Application Proxy
2121
You can configure access rules to grant conditional access to applications published using Application Proxy. This enables you to:
2222

2323
* Require multi-factor authentication per application
@@ -40,11 +40,11 @@ Access rules are evaluated when a user accesses a federated application that use
4040
3. Click **Applications** and scroll down to the **Access Rules** section. The access rules section only appears for applications published using Application Proxy that use federated authentication.
4141
4. Enable the rule by selecting **Enable Access Rules** to **On**.
4242
5. Specify the users and groups to whom the rules will apply. Use the **Add Group** button to select one or more groups to which the access rule will apply. This dialog can also be used to remove selected groups. When the rules are selected to apply to groups, the access rules will only be enforced for users that belong to one of the specified security groups.
43-
43+
4444
* To explicitly exclude security groups from the rule, check **Except** and specify one or more groups. Users who are members of a group in the Except list will not be required to perform multi-factor authentication.
4545
* If a user was configured using the per-user multi-factor authentication feature, this setting will take precedence over the application multi-factor authentication rules. This means that a user who has been configured for per-user multi-factor authentication will be required to perform multi-factor authentication even if they have been exempted from the application's multi-factor authentication rules. Learn more about [multi-factor authentication and per-user settings](../multi-factor-authentication/multi-factor-authentication.md).
4646
6. Select the access rule you want to set:
47-
47+
4848
* **Require Multi-factor authentication**: Users to whom access rules apply will be required to complete multi-factor authentication before accessing the application to which the rule applies.
4949
* **Require Multi-factor authentication when not at work**: Users trying to access the application from a trusted IP address will not be required to perform multi-factor authentication. The trusted IP address ranges can be configured on the multi-factor authentication settings page.
5050
* **Block access when not at work**: Users trying to access the application from outside your corporate network will not be able to access the application.
@@ -63,4 +63,3 @@ In addition to setting this flag, the federated tenant AD FS instance must be co
6363
* [Publish applications using your own domain name](active-directory-application-proxy-custom-domains.md)
6464

6565
For the latest news and updates, check out the [Application Proxy blog](http://blogs.technet.com/b/applicationproxyblog/)
66-

articles/active-directory/active-directory-application-proxy-native-client.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to enable publishing of native client apps with proxy applications | Microsoft Docs
2+
title: Publish native client apps - Azure AD | Microsoft Docs
33
description: Covers how to enable native client apps to communicate with Azure AD Application Proxy Connector to provide secure remote access to your on-premises apps.
44
services: active-directory
55
documentationcenter: ''
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 06/22/2016
16+
ms.date: 01/23/2017
1717
ms.author: kgremban
1818

1919
---
@@ -80,4 +80,3 @@ For more information about the native application flow, see [Native application
8080
* [Enable single-sign on](active-directory-application-proxy-sso-using-kcd.md)
8181

8282
For the latest news and updates, check out the [Application Proxy blog](http://blogs.technet.com/b/applicationproxyblog/)
83-

articles/active-directory/role-based-access-built-in-roles.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'RBAC: Built-in Roles | Microsoft Docs'
2+
title: Actions and NotActions - roles in Azure RBAC | Microsoft Docs
33
description: This topic describes the built in roles for role-based access control (RBAC).
44
services: active-directory
55
documentationcenter: ''
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 08/25/2016
16+
ms.date: 01/23/2017
1717
ms.author: kgremban
1818

1919
---
@@ -25,8 +25,8 @@ The following table provides brief descriptions of the built-in roles. Click the
2525

2626
> [!NOTE]
2727
> The Azure role definitions are constantly evolving. This article is kept as up to date as possible, but you can always find the latest roles definitions in Azure PowerShell. Use the cmdlets `(get-azurermroledefinition "<role name>").actions` or `(get-azurermroledefinition "<role name>").notactions` as applicable.
28-
>
29-
>
28+
>
29+
>
3030
3131
| Role name | Description |
3232
| --- | --- |
@@ -549,4 +549,3 @@ Can manage websites but not the web plans to which they are connected
549549
* [Custom roles in Azure RBAC](role-based-access-control-custom-roles.md): Learn how to create custom roles to fit your access needs.
550550
* [Create an access change history report](role-based-access-control-access-change-history-report.md): Keep track of changing role assignments in RBAC.
551551
* [Role-Based Access Control troubleshooting](role-based-access-control-troubleshooting.md): Get suggestions for fixing common issues.
552-

articles/active-directory/role-based-access-control-custom-roles.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: Custom Roles in Azure RBAC | Microsoft Docs
2+
title: Create custom roles for Azure RBAC | Microsoft Docs
33
description: Learn how to define custom roles with Azure Role-Based Access Control for more precise identity management in your Azure subscription.
44
services: active-directory
55
documentationcenter: ''
66
author: kgremban
7-
manager: kgremban
7+
manager: femila
88
editor: ''
99

1010
ms.assetid: e4206ea9-52c3-47ee-af29-f6eef7566fa5
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 07/25/2016
16+
ms.date: 01/23/2017
1717
ms.author: kgremban
1818

1919
---
@@ -81,8 +81,8 @@ Use the **NotActions** property if the set of operations that you wish to allow
8181

8282
> [!NOTE]
8383
> If a user is assigned a role that excludes an operation in **NotActions**, and is assigned a second role that grants access to the same operation, the user will be allowed to perform that operation. **NotActions** is not a deny rule – it is simply a convenient way to create a set of allowed operations when specific operations need to be excluded.
84-
>
85-
>
84+
>
85+
>
8686
8787
## AssignableScopes
8888
The **AssignableScopes** property of the custom role specifies the scopes (subscriptions, resource groups, or resources) within which the custom role is available for assignment. You can make the custom role available for assignment in only the subscriptions or resource groups that require it, and not clutter user experience for the rest of the subscriptions or resource groups.
@@ -95,8 +95,8 @@ Examples of valid assignable scopes include:
9595

9696
> [!NOTE]
9797
> You must use at least one subscription, resource group, or resource ID.
98-
>
99-
>
98+
>
99+
>
100100
101101
## Custom roles access control
102102
The **AssignableScopes** property of the custom role also controls who can view, modify, and delete the role.
@@ -116,4 +116,3 @@ The **AssignableScopes** property of the custom role also controls who can view,
116116
* [Azure CLI](role-based-access-control-manage-access-azure-cli.md)
117117
* [REST API](role-based-access-control-manage-access-rest.md)
118118
* [Built-in roles](role-based-access-built-in-roles.md): Get details about the roles that come standard in RBAC.
119-

articles/active-directory/role-based-access-control-what-is.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Role-Based Access Control | Microsoft Docs
2+
title: Manage access and permissions with roles - Azure RBAC | Microsoft Docs
33
description: Get started in access management with Azure role-based access control in the Azure Portal. Use role assignments to assign permissions in your directory.
44
services: active-directory
55
documentationcenter: ''
@@ -13,7 +13,7 @@ ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
16-
ms.date: 08/03/2016
16+
ms.date: 01/23/2017
1717
ms.author: kgremban
1818

1919
---
@@ -64,4 +64,3 @@ Azure RBAC only supports management operations of the Azure resources in the Azu
6464
* Get started with [Role-Based Access Control in the Azure portal](role-based-access-control-configure.md).
6565
* See the [RBAC built-in roles](role-based-access-built-in-roles.md)
6666
* Define your own [Custom roles in Azure RBAC](role-based-access-control-custom-roles.md)
67-

articles/app-service-web/web-sites-dotnet-rest-service-aspnet-api-sql-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create a REST service using ASP.NET Web API and SQL Database in Azure App Service
2+
title: Create a REST API in Azure with ASP.NET and SQL DB | Microsoft Docs
33
description: A tutorial that teaches you how to deploy an app that uses the ASP.NET Web API to an Azure web app by using Visual Studio.
44
services: app-service\web
55
documentationcenter: .net

articles/azure-resource-manager/best-practices-resource-manager-design-templates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Patterns for Resource Manager templates | Microsoft Docs
3-
description: Show design patterns for Azure Resource Manager templates
2+
title: Design Azure templates for complex solutions | Microsoft Docs
3+
description: Shows best practices for designing Azure Resource Manager templates for complex scenarios
44
services: azure-resource-manager
55
documentationcenter: ''
66
author: tfitzmac
@@ -17,7 +17,7 @@ ms.date: 12/19/2016
1717
ms.author: tomfitz
1818

1919
---
20-
# Patterns for designing Azure Resource Manager templates
20+
# Design patterns for Azure Resource Manager templates when deploying complex solutions
2121
Using a flexible approach based on Azure Resource Manager templates, you can deploy complex topologies quickly and consistently. You can adapt these deployments easily as core offerings evolve or to accommodate variants for outlier scenarios or customers.
2222

2323
This topic is part of a larger whitepaper. To read the full paper, download [World Class Azure Resource Manager Templates Considerations and Proven Practices](http://download.microsoft.com/download/8/E/1/8E1DBEFA-CECE-4DC9-A813-93520A5D7CFE/World Class ARM Templates - Considerations and Proven Practices.pdf).

articles/azure-resource-manager/best-practices-resource-manager-state.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Handling State in Resource Manager Templates | Microsoft Docs
3-
description: Shows recommended approaches for using complex objects to share state data with Azure Resource Manager templates and linked templates
2+
title: Pass complex values between Azure templates | Microsoft Docs
3+
description: Shows recommended approaches for using complex objects to share state data with Azure Resource Manager templates and linked templates.
44
services: azure-resource-manager
55
documentationcenter: ''
66
author: tfitzmac
@@ -17,7 +17,7 @@ ms.date: 10/26/2016
1717
ms.author: tomfitz
1818

1919
---
20-
# Sharing state in Azure Resource Manager templates
20+
# Share state to and from Azure Resource Manager templates
2121
This topic shows best practices for managing and sharing state within templates. The parameters and variables shown in this topic are examples of the type of objects you can define to conveniently organize your deployment requirements. From these examples, you can implement your own objects with property values that make sense for your environment.
2222

2323
This topic is part of a larger whitepaper. To read the full paper, download [World Class Resource Manager Templates Considerations and Proven Practices](http://download.microsoft.com/download/8/E/1/8E1DBEFA-CECE-4DC9-A813-93520A5D7CFE/World Class ARM Templates - Considerations and Proven Practices.pdf).

articles/azure-resource-manager/powershell-azure-resource-manager.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure PowerShell with Resource Manager | Microsoft Docs
3-
description: Introduction to using Azure PowerShell to deploy multiple resources as a resource group to Azure.
2+
title: Manage Azure solutions with PowerShell | Microsoft Docs
3+
description: Use Azure PowerShell and Resource Manager to manage your resources.
44
services: azure-resource-manager
55
documentationcenter: ''
66
author: tfitzmac
@@ -17,7 +17,7 @@ ms.date: 12/05/2016
1717
ms.author: tomfitz
1818

1919
---
20-
# Manage Azure resources with PowerShell and Resource Manager
20+
# Manage resources with Azure PowerShell and Resource Manager
2121
> [!div class="op_single_selector"]
2222
> * [Portal](resource-group-portal.md)
2323
> * [Azure CLI](xplat-cli-azure-resource-manager.md)

articles/azure-resource-manager/resource-group-audit.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Activity logs to manage Azure resources | Microsoft Docs
3-
description: Use the activity log in Resource Manager to review user actions and errors. Shows Azure Portal PowerShell, Azure CLI, and REST.
2+
title: View Azure activity logs to monitor resources | Microsoft Docs
3+
description: Use the activity logs to review user actions and errors. Shows Azure Portal PowerShell, Azure CLI, and REST.
44
services: azure-resource-manager
55
documentationcenter: ''
66
author: tfitzmac
@@ -17,7 +17,7 @@ ms.date: 01/09/2017
1717
ms.author: tomfitz
1818

1919
---
20-
# View activity logs to manage Azure resources
20+
# View activity logs to audit actions on resources
2121
Through activity logs, you can determine:
2222

2323
* what operations were taken on the resources in your subscription

0 commit comments

Comments
 (0)