You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/groups-approval-workflow.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ As a delegated approver, you'll receive an email notification when an Azure reso
41
41
42
42
1. Find and select the request that you want to approve and select **Approve**.
43
43
44
-

44
+

45
45
46
46
1. In the **Justification** box, enter the business justification.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/groups-assign-member-owner.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Follow these steps to make a user eligible to be a member or owner of a privileg
43
43
44
44
1. Select the members or owners you want to make eligible for the privileged access group.
45
45
46
-

46
+

47
47
48
48
1. Select **Next** to set the membership or ownership duration.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -191,7 +191,7 @@ If you want to delegate the required approval to activate a role, follow these s
191
191
192
192
1. Set the **Require approval** switch to **Enabled**. The pane expands with options to select approvers.
193
193
194
-

194
+

195
195
196
196
If you don't specify any approvers, the Privileged role administrator becomes the default approver and is then required to approve all activation requests for this role.
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-how-to-use-audit-log.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Beginning in November 2019, the Azure AD roles portion of Privileged Identity Ma
28
28
1. Sign in to the [Azure portal](https://portal.azure.com/) with a user who is in the [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
29
29
1. Open **Azure AD Privileged Identity Management**. If you have a banner on the top of the overview page, follow the instructions in the **New version** tab of this article. Otherwise, follow the instructions in the **Previous version** tab.
30
30
31
-
[](media/pim-how-to-use-audit-log/directory-roles-audit-history.png)
31
+
[](media/pim-how-to-use-audit-log/directory-roles-audit-history.png)
32
32
33
33
# [New version](#tab/new)
34
34
@@ -119,11 +119,11 @@ Follow these steps to view the audit history for Azure AD roles.
119
119
- See the reason for an audit event in the **Status reason** column.
120
120
- See the approver in the **Initiated by (actor)** column for the "add member to role request approved" event.
121
121
122
-
[](media/pim-how-to-use-audit-log/filter-audit-logs.png)
122
+
[](media/pim-how-to-use-audit-log/filter-audit-logs.png)
123
123
124
124
1. Select an audit log event to see the ticket number on the **Activity** tab of the **Details** pane.
125
125
126
-
[](media/pim-how-to-use-audit-log/audit-event-ticket-number.png)
126
+
[](media/pim-how-to-use-audit-log/audit-event-ticket-number.png)
127
127
128
128
1. You can view the requester (person activating the role) on the **Targets** tab of the **Details** pane for an audit event. There are two target types for Azure AD roles:
Copy file name to clipboardExpand all lines: articles/active-directory/privileged-identity-management/pim-security-wizard.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Also, keep role assignments permanent if a user has a Microsoft account (in othe
41
41
42
42
1. Select **Reduce global administrators**.
43
43
44
-

44
+

45
45
46
46
1. Review the list of Global Administrator role assignments.
> 
127
127
2. Complete the **Create Security Group** task.
128
128
129
129
* There are two types of security groups in Workday:
@@ -148,7 +148,7 @@ In this step, you'll grant "domain security" policy permissions for the worker d
148
148
149
149
1. Enter **Domain Security Configuration** in the search box, and then click on the link **Domain Security Configuration Report**.
>
152
152
2. In the **Domain** text box, search for the following domains and add them to the filter one by one.
153
153
**External Account Provisioning*
154
154
**Worker Data: Workers*
@@ -160,10 +160,10 @@ In this step, you'll grant "domain security" policy permissions for the worker d
>
>
167
167
168
168
Click **OK**.
169
169
@@ -173,7 +173,7 @@ In this step, you'll grant "domain security" policy permissions for the worker d
173
173
174
174
4. On the **Edit Domain Security Policy Permissions** page, scroll down to the section **Integration Permissions**. Click on the "+" sign to add the integration system group to the list of security groups with **Get** and **Put** integration permissions.
>
177
177
178
178
5. Click on the "+" sign to add the integration system group to the list of security groups with **Get** and **Put** integration permissions.
179
179
@@ -204,12 +204,12 @@ In this step, you'll grant "business process security" policy permissions for th
204
204
1. Enter **Business Process Policy** in the search box, and then click on the link **Edit Business Process Security Policy** task.
205
205
206
206
>[!div class="mx-imgBorder"]
207
-
>
207
+
>
208
208
209
209
2. In the **Business Process Type** textbox, search for *Contact* and select **Work Contact Change** business process and click **OK**.
210
210
211
211
>[!div class="mx-imgBorder"]
212
-
>
212
+
>
213
213
214
214
3. On the **Edit Business Process Security Policy** page, scroll to the **Change Work Contact Information (Web Service)** section.
215
215
@@ -409,7 +409,7 @@ In this step, we establish connectivity with Workday and Active Directory in the
409
409
* Click the **Test Connection** button. If the connection test succeeds, click the **Save** button at the top. If it fails, double-check that the Workday credentials and the AD credentials configured on the agent setup are valid.
>
413
413
414
414
* Once the credentials are saved successfully, the **Mappings** section will display the default mapping **Synchronize Workday Workers to On Premises Active Directory**
415
415
@@ -478,7 +478,7 @@ In this section, you will configure how user data flows from Workday to Active D
478
478
479
479
1. To save your mappings, click **Save** at the top of the Attribute-Mapping section.
>
482
482
483
483
#### Below are some example attribute mappings between Workday and Active Directory, with some common expressions
484
484
@@ -943,11 +943,11 @@ When you click on any of the audit log records, the **Activity Details** page op
943
943
944
944
Look for a HTTP POST record corresponding to the timestamp of the export operation with *Event ID = 2*. This record will contain the attribute values sent by the provisioning service to the provisioning agent.
:::image type="content" source="media/workday-inbound-tutorial/wd_event_viewer_05.png" alt-text="Screenshot that shows the 'HTTP POST' record in the 'Provisioning Agent' log." lightbox="media/workday-inbound-tutorial/wd_event_viewer_05.png":::
947
947
948
948
Immediately following the above event, there should be another event that captures the response of the create AD account operation. This event returns the new objectGuid created in AD and it is set as the TargetAnchor attribute in the provisioning service.
:::image type="content" source="media/workday-inbound-tutorial/wd_event_viewer_06.png" alt-text="Screenshot that shows the 'Provisioning Agent' log with the objectGuid created in AD highlighted." lightbox="media/workday-inbound-tutorial/wd_event_viewer_06.png":::
951
951
952
952
### Understanding logs for manager update operations
953
953
@@ -1041,14 +1041,14 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s
1041
1041
1042
1042
5. Select **External**, and select the Human_Resources WSDL file you downloaded in step 2.

1045
1045
1046
1046
6. Set the **Location** field to `https://IMPL-CC.workday.com/ccx/service/TENANT/Human_Resources`, but replacing "IMPL-CC" with your actual instance type, and "TENANT" with your real tenant name.
1047
1047
1048
1048
7. Set **Operation** to **Get_Workers**
1049
1049
1050
1050
8. Click the small **configure** link below the Request/Response panes to set your Workday credentials. Check **Authentication**, and then enter the user name and password for your Workday integration system account. Be sure to format the user name as name\@tenant, and leave the **WS-Security UsernameToken** option selected.

1052
1052
1053
1053
9. Select **OK**.
1054
1054
@@ -1087,7 +1087,7 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s
1087
1087
1088
1088
13. In the command bar of Workday Studio, select **File > Open File...** and open the XML file you saved. This action will open the file in the Workday Studio XML editor.

1091
1091
1092
1092
14. In the file tree, navigate through **/env: Envelope > env: Body > wd:Get_Workers_Response > wd:Response_Data > wd: Worker** to find your user's data.
1093
1093
@@ -1113,7 +1113,7 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s

1117
1117
1118
1118
6. Scroll to the bottom of the attribute list to where the input fields are.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-create-private-site-access.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ The first step in this tutorial is to create a new virtual machine inside a virt
68
68
1. Choose the _Networking_ tab and select **Create new** to configure a new virtual network.
69
69
70
70
>[!div class="mx-imgBorder"]
71
-
>
71
+
>
72
72
73
73
1. In _Create virtual network_, use the settings in the table below the image:

52
52
53
53
Copy the **HTTPS** URL generated when *ngrok* is run. This value is used when configuring the event grid event endpoint.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-deployment-slots.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -109,7 +109,7 @@ You can swap slots via the [CLI](/cli/azure/functionapp/deployment/slot?view=azu
109
109
1. Navigate to the function app.
110
110
1. Select **Deployment slots**, and then select **Swap**.
111
111
112
-
:::image type="content" source="./media/functions-deployment-slots/functions-swap-deployment-slot.png" alt-text="Swap the deployment slot." border="true":::
112
+
:::image type="content" source="./media/functions-deployment-slots/functions-swap-deployment-slot.png" alt-text="Screenshot that shows the 'Deployment slot' page with the 'Add Slot' action selected." border="true":::
113
113
114
114
1. Verify the configuration settings for your swap and select **Swap**
115
115
@@ -131,7 +131,7 @@ You can remove a slot via the [CLI](/cli/azure/functionapp/deployment/slot?view=
131
131
132
132
1. Select **Delete**.
133
133
134
-
:::image type="content" source="./media/functions-deployment-slots/functions-delete-deployment-slot.png" alt-text="Delete the deployment slot in the Azure portal." border="true":::
134
+
:::image type="content" source="./media/functions-deployment-slots/functions-delete-deployment-slot.png" alt-text="Screenshot that shows the 'Overview' page with the 'Delete' action selected." border="true":::
135
135
136
136
1. Type the name of the deployment slot you want to delete, and then select **Delete**.
Copy file name to clipboardExpand all lines: articles/azure-functions/functions-manually-run-non-http.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ You use this request location in Postman along with the function's master key in
43
43
44
44
1. After copying the *_master* key, select **Code + Test**, and then select **Logs**. You'll see messages from the function logged here when you manually run the function from Postman.
45
45
46
-
:::image type="content" source="./media/functions-manually-run-non-http/azure-portal-function-log.png" alt-text="View the logs to see the master key test results." border="true":::
46
+
:::image type="content" source="./media/functions-manually-run-non-http/azure-portal-function-log.png" alt-text="Screenshot that shows the 'Code + Test' page with a message from the logs displayed." border="true":::
47
47
48
48
> [!CAUTION]
49
49
> Due to the elevated permissions in your function app granted by the master key, you should not share this key with third parties or distribute it in an application. The key should only be sent to an HTTPS endpoint.
0 commit comments