Skip to content

Commit a8b6013

Browse files
authored
Merge pull request #131518 from jdmartinez36/validationworkingbranch
Message fixes: Duplicate alt text validation US1760863
2 parents 9853133 + 8502f32 commit a8b6013

20 files changed

+40
-40
lines changed

articles/active-directory/privileged-identity-management/azure-ad-custom-roles-configure.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Follow these steps to open the settings for an Azure AD role.
4343
1. Select **Setting** to open the **Settings** page. Select the role for the settings you want to configure.
4444
1. Select **Edit** to open the **Role settings** page.
4545

46-
![Open the Azure AD custom role to edit settings](./media/azure-ad-custom-roles-configure/edit-settings.png)
46+
![Screenshot that shows the "Role setting details" page with the "Edit" action selected.](./media/azure-ad-custom-roles-configure/edit-settings.png)
4747

4848
## Role settings
4949

articles/active-directory/privileged-identity-management/azure-ad-pim-approval-workflow.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ As a delegated approver, you'll receive an email notification when an Azure AD r
5454

5555
1. Find and select the request that you want to approve. An approve or deny page appears.
5656

57-
![Approve requests - approve or deny pane with details and Justification box](./media/azure-ad-pim-approval-workflow/resources-approve-pane.png)
57+
![Screenshot that shows the "Approve requests - Azure AD roles" page.](./media/azure-ad-pim-approval-workflow/resources-approve-pane.png)
5858

5959
1. In the **Justification** box, enter the business justification.
6060

articles/active-directory/privileged-identity-management/groups-approval-workflow.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ As a delegated approver, you'll receive an email notification when an Azure reso
4141

4242
1. Find and select the request that you want to approve and select **Approve**.
4343

44-
![Approve requests - approve or deny pane with details and Justification box](./media/groups-approval-workflow/groups-confirm-approval.png)
44+
![Screenshot that shows the "Approve requests" page with the "Approve" and "Confirm" buttons highlighted.](./media/groups-approval-workflow/groups-confirm-approval.png)
4545

4646
1. In the **Justification** box, enter the business justification.
4747

articles/active-directory/privileged-identity-management/groups-assign-member-owner.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Follow these steps to make a user eligible to be a member or owner of a privileg
4343

4444
1. Select the members or owners you want to make eligible for the privileged access group.
4545

46-
![Select a member or group pane](./media/groups-assign-member-owner/add-assignments.png)
46+
![Screenshot that shows the "Add assignments" page with the "Select a member or group" pane open and the "Select" button highlighted.](./media/groups-assign-member-owner/add-assignments.png)
4747

4848
1. Select **Next** to set the membership or ownership duration.
4949

articles/active-directory/privileged-identity-management/pim-apis.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ If you are using the Graph Explorer to test your calls, you can specify the perm
4545

4646
1. Click **modify permissions**.
4747

48-
![Graph Explorer - modify permissions](./media/pim-apis/graph-explorer.png)
48+
![Screenshot that shows the "Graph Explorer" page with the "modify permissions" action selected.](./media/pim-apis/graph-explorer.png)
4949

5050
1. Select the checkboxes next to the permissions you want to include. `PrivilegedAccess.ReadWrite.AzureAD` is not yet available in Graph Explorer.
5151

articles/active-directory/privileged-identity-management/pim-how-to-add-role-to-user.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Follow these steps to make a user eligible for an Azure AD admin role.
4646

4747
1. Select **Roles** to see the list of roles for Azure AD permissions.
4848

49-
![Azure AD roles](./media/pim-how-to-add-role-to-user/roles-list.png)
49+
![Screenshot of the "Roles" page with the "Add assignments" action selected.](./media/pim-how-to-add-role-to-user/roles-list.png)
5050

5151
1. Select **Add assignments** to open the **Add assignments** page.
5252

articles/active-directory/privileged-identity-management/pim-how-to-change-default-settings.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ If you want to delegate the required approval to activate a role, follow these s
191191

192192
1. Set the **Require approval** switch to **Enabled**. The pane expands with options to select approvers.
193193

194-
![Azure AD roles - Settings - Require approval](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval.png)
194+
![Screenshot that shows the "Require approval" switch with "Enable" selected.](./media/pim-how-to-change-default-settings/pim-directory-roles-settings-require-approval.png)
195195

196196
If you don't specify any approvers, the Privileged role administrator becomes the default approver and is then required to approve all activation requests for this role.
197197

articles/active-directory/privileged-identity-management/pim-how-to-configure-security-alerts.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Follow the steps in this article to investigate security alerts for Azure AD rol
3333

3434
# [New version](#tab/new)
3535

36-
![Azure AD roles - Alert pane listing alerts and the severity](./media/pim-how-to-configure-security-alerts/view-alerts.png)
36+
![Screenshot that shows the "Alerts" page with a list of alerts and their severity.](./media/pim-how-to-configure-security-alerts/view-alerts.png)
3737

3838
## Security alerts
3939

articles/active-directory/privileged-identity-management/pim-how-to-use-audit-log.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Beginning in November 2019, the Azure AD roles portion of Privileged Identity Ma
2828
1. Sign in to the [Azure portal](https://portal.azure.com/) with a user who is in the [Privileged role administrator](../users-groups-roles/directory-assign-admin-roles.md#privileged-role-administrator) role.
2929
1. Open **Azure AD Privileged Identity Management**. If you have a banner on the top of the overview page, follow the instructions in the **New version** tab of this article. Otherwise, follow the instructions in the **Previous version** tab.
3030

31-
[![Azure AD roles new version](media/pim-how-to-use-audit-log/directory-roles-audit-history.png "Select the tab for your version")](media/pim-how-to-use-audit-log/directory-roles-audit-history.png)
31+
[![Screenshot that shows the "Azure AD roles - Directory roles audit history" page.](media/pim-how-to-use-audit-log/directory-roles-audit-history.png "Select the tab for your version")](media/pim-how-to-use-audit-log/directory-roles-audit-history.png)
3232

3333
# [New version](#tab/new)
3434

@@ -119,11 +119,11 @@ Follow these steps to view the audit history for Azure AD roles.
119119
- See the reason for an audit event in the **Status reason** column.
120120
- See the approver in the **Initiated by (actor)** column for the "add member to role request approved" event.
121121

122-
[![Azure AD roles new version](media/pim-how-to-use-audit-log/filter-audit-logs.png "Filter the audit log for the PIM service")](media/pim-how-to-use-audit-log/filter-audit-logs.png)
122+
[![Screenshot that shows the "audit logs" page with the "Initiated by (actor) menu open and "PIM" selected.](media/pim-how-to-use-audit-log/filter-audit-logs.png "Filter the audit log for the PIM service")](media/pim-how-to-use-audit-log/filter-audit-logs.png)
123123

124124
1. Select an audit log event to see the ticket number on the **Activity** tab of the **Details** pane.
125125

126-
[![Azure AD roles new version](media/pim-how-to-use-audit-log/audit-event-ticket-number.png "Check the ticket number for the audit event")](media/pim-how-to-use-audit-log/audit-event-ticket-number.png)
126+
[![Screenshot that shows the "Audit logs" page with the ticket number highlighted in the "Details" pane.](media/pim-how-to-use-audit-log/audit-event-ticket-number.png "Check the ticket number for the audit event")](media/pim-how-to-use-audit-log/audit-event-ticket-number.png)
127127

128128
1. You can view the requester (person activating the role) on the **Targets** tab of the **Details** pane for an audit event. There are two target types for Azure AD roles:
129129

articles/active-directory/privileged-identity-management/pim-security-wizard.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Also, keep role assignments permanent if a user has a Microsoft account (in othe
4141

4242
1. Select **Reduce global administrators**.
4343

44-
![Reduce global administrators - Role pane showing all members](./media/pim-security-wizard/new-preview-page.png)
44+
![Screenshot that shows the "Discovery and insights (Preview)" with the "Reduce global administrators" action selected.](./media/pim-security-wizard/new-preview-page.png)
4545

4646
1. Review the list of Global Administrator role assignments.
4747

articles/active-directory/saas-apps/workday-inbound-tutorial.md

+15-15
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ In this step, you will create an unconstrained or constrained integration system
123123
1. Enter create security group in the search box, and then click **Create Security Group**.
124124

125125
> [!div class="mx-imgBorder"]
126-
> ![CreateSecurity Group](./media/workday-inbound-tutorial/wd_isu_03.png "CreateSecurity Group")
126+
> ![Screenshot that shows "create security group" entered in the search box, and "Create Security Group - Task" displayed in the search results.](./media/workday-inbound-tutorial/wd_isu_03.png)
127127
2. Complete the **Create Security Group** task.
128128

129129
* There are two types of security groups in Workday:
@@ -148,7 +148,7 @@ In this step, you'll grant "domain security" policy permissions for the worker d
148148

149149
1. Enter **Domain Security Configuration** in the search box, and then click on the link **Domain Security Configuration Report**.
150150
>[!div class="mx-imgBorder"]
151-
>![Domain Security Policies](./media/workday-inbound-tutorial/wd_isu_06.png "Domain Security Policies")
151+
>![Screenshot that shows "domain security configuration" in the search box, with "Domain Security Configuration - Report" displayed in the results.](./media/workday-inbound-tutorial/wd_isu_06.png "Domain Security Policies")
152152
2. In the **Domain** text box, search for the following domains and add them to the filter one by one.
153153
* *External Account Provisioning*
154154
* *Worker Data: Workers*
@@ -160,10 +160,10 @@ In this step, you'll grant "domain security" policy permissions for the worker d
160160
* *Workday Accounts*
161161

162162
>[!div class="mx-imgBorder"]
163-
>![Domain Security Policies](./media/workday-inbound-tutorial/wd_isu_07.png "Domain Security Policies")
163+
>![Screenshot that shows the Domain Security Configuration report with the "External Account" in the "Domain" text box.](./media/workday-inbound-tutorial/wd_isu_07.png "Domain Security Policies")
164164
165165
>[!div class="mx-imgBorder"]
166-
>![Domain Security Policies](./media/workday-inbound-tutorial/wd_isu_08.png "Domain Security Policies")
166+
>![Screenshot that shows the Domain Security Configuration report with a list of domains selected.](./media/workday-inbound-tutorial/wd_isu_08.png "Domain Security Policies")
167167
168168
Click **OK**.
169169

@@ -173,7 +173,7 @@ In this step, you'll grant "domain security" policy permissions for the worker d
173173
174174
4. On the **Edit Domain Security Policy Permissions** page, scroll down to the section **Integration Permissions**. Click on the "+" sign to add the integration system group to the list of security groups with **Get** and **Put** integration permissions.
175175
>[!div class="mx-imgBorder"]
176-
>![Edit Permission](./media/workday-inbound-tutorial/wd_isu_10.png "Edit Permission")
176+
>![Screenshot that shows the "Integration Permissons" section highlighted.](./media/workday-inbound-tutorial/wd_isu_10.png "Edit Permission")
177177
178178
5. Click on the "+" sign to add the integration system group to the list of security groups with **Get** and **Put** integration permissions.
179179

@@ -204,12 +204,12 @@ In this step, you'll grant "business process security" policy permissions for th
204204
1. Enter **Business Process Policy** in the search box, and then click on the link **Edit Business Process Security Policy** task.
205205

206206
>[!div class="mx-imgBorder"]
207-
>![Business Process Security Policies](./media/workday-inbound-tutorial/wd_isu_12.png "Business Process Security Policies")
207+
>![Screenshot that shows "Business Process Policy" in the search box and "Edit Business Process Security Policy - Task" selected.](./media/workday-inbound-tutorial/wd_isu_12.png "Business Process Security Policies")
208208
209209
2. In the **Business Process Type** textbox, search for *Contact* and select **Work Contact Change** business process and click **OK**.
210210

211211
>[!div class="mx-imgBorder"]
212-
>![Business Process Security Policies](./media/workday-inbound-tutorial/wd_isu_13.png "Business Process Security Policies")
212+
>![Screenshot that shows the "Edit Business Process Security Policy" page and "Work Contact Change" selected in the "Business Process Type" menu.](./media/workday-inbound-tutorial/wd_isu_13.png "Business Process Security Policies")
213213
214214
3. On the **Edit Business Process Security Policy** page, scroll to the **Change Work Contact Information (Web Service)** section.
215215

@@ -409,7 +409,7 @@ In this step, we establish connectivity with Workday and Active Directory in the
409409
* Click the **Test Connection** button. If the connection test succeeds, click the **Save** button at the top. If it fails, double-check that the Workday credentials and the AD credentials configured on the agent setup are valid.
410410

411411
>[!div class="mx-imgBorder"]
412-
>![Azure portal](./media/workday-inbound-tutorial/wd_1.png)
412+
>![Screenshot that shows the "Provisioning" page with credentials entered.](./media/workday-inbound-tutorial/wd_1.png)
413413
414414
* Once the credentials are saved successfully, the **Mappings** section will display the default mapping **Synchronize Workday Workers to On Premises Active Directory**
415415

@@ -478,7 +478,7 @@ In this section, you will configure how user data flows from Workday to Active D
478478

479479
1. To save your mappings, click **Save** at the top of the Attribute-Mapping section.
480480
>[!div class="mx-imgBorder"]
481-
>![Azure portal](./media/workday-inbound-tutorial/wd_2.png)
481+
>![Screenshot that shows the "Attribute Mapping" page with the "Save" action selected.](./media/workday-inbound-tutorial/wd_2.png)
482482
483483
#### Below are some example attribute mappings between Workday and Active Directory, with some common expressions
484484

@@ -943,11 +943,11 @@ When you click on any of the audit log records, the **Activity Details** page op
943943

944944
Look for a HTTP POST record corresponding to the timestamp of the export operation with *Event ID = 2*. This record will contain the attribute values sent by the provisioning service to the provisioning agent.
945945

946-
[![SCIM Add](media/workday-inbound-tutorial/wd_event_viewer_05.png)](media/workday-inbound-tutorial/wd_event_viewer_05.png#lightbox)
946+
:::image type="content" source="media/workday-inbound-tutorial/wd_event_viewer_05.png" alt-text="Screenshot that shows the 'HTTP POST' record in the 'Provisioning Agent' log." lightbox="media/workday-inbound-tutorial/wd_event_viewer_05.png":::
947947

948948
Immediately following the above event, there should be another event that captures the response of the create AD account operation. This event returns the new objectGuid created in AD and it is set as the TargetAnchor attribute in the provisioning service.
949949

950-
[![SCIM Add](media/workday-inbound-tutorial/wd_event_viewer_06.png)](media/workday-inbound-tutorial/wd_event_viewer_06.png#lightbox)
950+
:::image type="content" source="media/workday-inbound-tutorial/wd_event_viewer_06.png" alt-text="Screenshot that shows the 'Provisioning Agent' log with the objectGuid created in AD highlighted." lightbox="media/workday-inbound-tutorial/wd_event_viewer_06.png":::
951951

952952
### Understanding logs for manager update operations
953953

@@ -1041,14 +1041,14 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s
10411041

10421042
5. Select **External**, and select the Human_Resources WSDL file you downloaded in step 2.
10431043

1044-
![Workday Studio](./media/workday-inbound-tutorial/wdstudio1.png)
1044+
![Screenshot that shows the "Human_Resources" file open in Workday Studio.](./media/workday-inbound-tutorial/wdstudio1.png)
10451045

10461046
6. Set the **Location** field to `https://IMPL-CC.workday.com/ccx/service/TENANT/Human_Resources`, but replacing "IMPL-CC" with your actual instance type, and "TENANT" with your real tenant name.
10471047

10481048
7. Set **Operation** to **Get_Workers**
10491049

10501050
8. Click the small **configure** link below the Request/Response panes to set your Workday credentials. Check **Authentication**, and then enter the user name and password for your Workday integration system account. Be sure to format the user name as name\@tenant, and leave the **WS-Security UsernameToken** option selected.
1051-
![Workday Studio](./media/workday-inbound-tutorial/wdstudio2.png)
1051+
![Screenshot that shows the "Security" tab with the "Username" and "Password" entered, and "WS-Security Username Token" selected.](./media/workday-inbound-tutorial/wdstudio2.png)
10521052

10531053
9. Select **OK**.
10541054

@@ -1087,7 +1087,7 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s
10871087

10881088
13. In the command bar of Workday Studio, select **File > Open File...** and open the XML file you saved. This action will open the file in the Workday Studio XML editor.
10891089

1090-
![Workday Studio](./media/workday-inbound-tutorial/wdstudio3.png)
1090+
![Screenshot of an X M L file open in the "Workday Studio X M L editor".](./media/workday-inbound-tutorial/wdstudio3.png)
10911091

10921092
14. In the file tree, navigate through **/env: Envelope > env: Body > wd:Get_Workers_Response > wd:Response_Data > wd: Worker** to find your user's data.
10931093

@@ -1113,7 +1113,7 @@ To do this change, you must use [Workday Studio](https://community.workday.com/s
11131113

11141114
5. Select **Edit attribute list for Workday**.
11151115

1116-
![Workday Studio](./media/workday-inbound-tutorial/wdstudio_aad1.png)
1116+
![Screenshot that shows the "Workday to Azure A D User Provisioning - Provisioning" page with the "Edit attribute list for Workday" action highlighted.](./media/workday-inbound-tutorial/wdstudio_aad1.png)
11171117

11181118
6. Scroll to the bottom of the attribute list to where the input fields are.
11191119

articles/azure-functions/functions-create-private-site-access.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The first step in this tutorial is to create a new virtual machine inside a virt
6868
1. Choose the _Networking_ tab and select **Create new** to configure a new virtual network.
6969

7070
>[!div class="mx-imgBorder"]
71-
>![Create a new virtual network for the new VM](./media/functions-create-private-site-access/create-vm-networking.png)
71+
>![Screenshot that shows the "Networking" tab with the "Create new" action highlighted in the "Virtual network" section.](./media/functions-create-private-site-access/create-vm-networking.png)
7272
7373
1. In _Create virtual network_, use the settings in the table below the image:
7474

articles/azure-functions/functions-debug-event-grid-trigger-local.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ ngrok http -host-header=localhost 7071
4848
```
4949
As the utility is set up, the command window should look similar to the following screenshot:
5050

51-
![Start ngrok](./media/functions-debug-event-grid-trigger-local/functions-debug-event-grid-trigger-local-ngrok.png)
51+
![Screenshot that shows the Command Prompt after starting the "ngrok" utility.](./media/functions-debug-event-grid-trigger-local/functions-debug-event-grid-trigger-local-ngrok.png)
5252

5353
Copy the **HTTPS** URL generated when *ngrok* is run. This value is used when configuring the event grid event endpoint.
5454

articles/azure-functions/functions-deployment-slots.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ You can swap slots via the [CLI](/cli/azure/functionapp/deployment/slot?view=azu
109109
1. Navigate to the function app.
110110
1. Select **Deployment slots**, and then select **Swap**.
111111

112-
:::image type="content" source="./media/functions-deployment-slots/functions-swap-deployment-slot.png" alt-text="Swap the deployment slot." border="true":::
112+
:::image type="content" source="./media/functions-deployment-slots/functions-swap-deployment-slot.png" alt-text="Screenshot that shows the 'Deployment slot' page with the 'Add Slot' action selected." border="true":::
113113

114114
1. Verify the configuration settings for your swap and select **Swap**
115115

@@ -131,7 +131,7 @@ You can remove a slot via the [CLI](/cli/azure/functionapp/deployment/slot?view=
131131

132132
1. Select **Delete**.
133133

134-
:::image type="content" source="./media/functions-deployment-slots/functions-delete-deployment-slot.png" alt-text="Delete the deployment slot in the Azure portal." border="true":::
134+
:::image type="content" source="./media/functions-deployment-slots/functions-delete-deployment-slot.png" alt-text="Screenshot that shows the 'Overview' page with the 'Delete' action selected." border="true":::
135135

136136
1. Type the name of the deployment slot you want to delete, and then select **Delete**.
137137

articles/azure-functions/functions-manually-run-non-http.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You use this request location in Postman along with the function's master key in
4343

4444
1. After copying the *_master* key, select **Code + Test**, and then select **Logs**. You'll see messages from the function logged here when you manually run the function from Postman.
4545

46-
:::image type="content" source="./media/functions-manually-run-non-http/azure-portal-function-log.png" alt-text="View the logs to see the master key test results." border="true":::
46+
:::image type="content" source="./media/functions-manually-run-non-http/azure-portal-function-log.png" alt-text="Screenshot that shows the 'Code + Test' page with a message from the logs displayed." border="true":::
4747

4848
> [!CAUTION]
4949
> Due to the elevated permissions in your function app granted by the master key, you should not share this key with third parties or distribute it in an application. The key should only be sent to an HTTPS endpoint.

0 commit comments

Comments
 (0)