Skip to content

Commit 7b217b1

Browse files
authored
Merge pull request #262846 from bandersmsft/aad-entra-fixes
MCM - Fixed Entra rebrand stragglers
2 parents 2e87751 + f39c17f commit 7b217b1

9 files changed

Lines changed: 58 additions & 58 deletions

File tree

articles/cost-management-billing/cost-management-billing-faq.yml

Lines changed: 43 additions & 43 deletions
Large diffs are not rendered by default.

articles/cost-management-billing/manage/ea-portal-administration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -435,7 +435,7 @@ Azure Enterprise users can convert from a Microsoft Account (MSA or Live ID) to
435435
To begin:
436436

437437
1. Add the work or school account to the Azure EA Portal in the role(s) needed.
438-
1. If you get errors, the account may not be valid in the active directory. Azure uses User Principal Name (UPN), which isn't always identical to the email address.
438+
1. If you get errors, the account may not be valid in Microsoft Entra ID. Azure uses User Principal Name (UPN), which isn't always identical to the email address.
439439
1. Authenticate to the Azure EA portal using the work or school account.
440440

441441
### To convert subscriptions from Microsoft accounts to work or school accounts:

articles/cost-management-billing/manage/ea-portal-troubleshoot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ You use the Azure EA portal to grant access to users with different authenticati
3030
### Authentication level types
3131

3232
- Microsoft Account Only - For organizations that want to use, create, and manage users through Microsoft accounts.
33-
- Work or School Account - For organizations that have set up Active Directory with Federation to the Cloud and all accounts are on a single tenant.
34-
- Work or School Account Cross Tenant - For organizations that have set up Active Directory with Federation to the Cloud and will have accounts in multiple tenants.
33+
- Work or School Account - For organizations that have set up Microsoft Entra ID with federation to the cloud and all accounts are on a single tenant.
34+
- Work or School Account Cross Tenant - For organizations that have set up Microsoft Entra ID with federation to the cloud and will have accounts in multiple tenants.
3535
- Mixed Account - Allows you to add users with Microsoft Account and/or with a Work or School Account.
3636

3737
The first work or school account added to the enrollment determines the _default_ domain. To add a work or school account with another tenant, you must change the authentication level under the enrollment to cross-tenant authentication.
@@ -49,23 +49,23 @@ To update the Authentication Level:
4949

5050
Microsoft accounts must have an associated ID created at [https://signup.live.com](https://signup.live.com/).
5151

52-
Work or school accounts are available to organizations that have set up Active Directory with federation and where all accounts are on a single tenant. Users can be added with work or school federated user authentication if the company's internal Active Directory is federated.
52+
Work or school accounts are available to organizations that have set up Microsoft Entra ID with federation and where all accounts are on a single tenant. Users can be added with work or school federated user authentication if the company's internal Microsoft Entra ID is federated.
5353

54-
If your organization doesn't use Active Directory federation, you can't use your work or school email address. Instead, register or create a new email address and register it as a Microsoft account.
54+
If your organization doesn't use Microsoft Entra ID federation, you can't use your work or school email address. Instead, register or create a new email address and register it as a Microsoft account.
5555

5656
## Unable to access the Azure EA portal
5757

5858
If you get an error message when you try to sign in to the Azure EA portal, use the following the troubleshooting steps:
5959

6060
- Ensure that you're using the correct Azure EA portal URL, which is https://ea.azure.com.
6161
- Determine if your access to the Azure EA portal was added as a work or school account or as a Microsoft account.
62-
- If you're using your work account, enter your work email and work password. Your work password is provided by your organization. You can check with your IT department about how to reset the password if you've issues with it.
62+
- If you're using your work account, enter your work email and work password. Your work password is provided by your organization. You can check with your IT department about how to reset the password if you have issues with it.
6363
- If you're using a Microsoft account, enter your Microsoft account email address and password. If you've forgotten your Microsoft account password, you can reset it at [https://account.live.com/password/reset](https://account.live.com/password/reset).
6464
- Use an in-private or incognito browser session to sign in so that no cookies or cached information from previous or existing sessions are kept. Clear your browser's cache and use an in-private or incognito window to open https://ea.azure.com.
6565
- If you get an _Invalid User_ error when using a Microsoft account, it might be because you have multiple Microsoft accounts. The one that you're trying to sign in with isn't the primary email address.
6666
Or, if you get an _Invalid User_ error, it might be because the wrong account type was used when the user was added to the enrollment. For example, a work or school account instead of a Microsoft account. In this example, you have another EA admin add the correct account or you need to contact [support](https://support.microsoft.com/supportforbusiness/productselection?sapId=cf791efa-485b-95a3-6fad-3daf9cd4027c).
6767
- If you need to check the primary alias, go to [https://account.live.com](https://account.live.com). Then, select **Your Info** and then select **Manage how to sign in to Microsoft**. Follow the prompts to verify an alternate email address and obtain a code to access sensitive information. Enter the security code. Select **Set it up later** if you don't want to set up two-factor authentication.
68-
- You'll see the **Manage how to sign in to Microsoft** page where you can view your account aliases. Check that the primary alias is the one that you're using to sign in to the Azure EA portal. If it isn't, you can make it your primary alias. Or, you can use the primary alias for Azure EA portal instead.
68+
- You see the **Manage how to sign in to Microsoft** page where you can view your account aliases. Check that the primary alias is the one that you're using to sign in to the Azure EA portal. If it isn't, you can make it your primary alias. Or, you can use the primary alias for Azure EA portal instead.
6969

7070
## Next steps
7171

articles/cost-management-billing/manage/manage-azure-subscription-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ This article helps you configure Azure subscription policies for subscription op
2323

2424
Use the following policy settings to control the movement of Azure subscriptions from and into directories.
2525

26-
### Subscriptions leaving AAD directory
26+
### Subscriptions leaving a Microsoft Entra ID directory
2727

2828
The policy allows or stops users from moving subscriptions out of the current directory. [Subscription owners](../../role-based-access-control/built-in-roles.md#owner) can [change the directory of an Azure subscription](../../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md) to another one where they're a member. It poses governance challenges, so global administrators can allow or disallow directory users from changing the directory.
2929

30-
### Subscriptions entering AAD directory
30+
### Subscriptions entering a Microsoft Entra ID directory
3131

3232
The policy allows or stops users from other directories, who have access in the current directory, to move subscriptions into the current directory. [Subscription owners](../../role-based-access-control/built-in-roles.md#owner) can [change the directory of an Azure subscription](../../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md) to another one where they're a member. It poses governance challenges, so global administrators can allow or disallow directory users from changing the directory.
3333

articles/cost-management-billing/microsoft-customer-agreement/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ landingContent:
8989
linkLists:
9090
- linkListType: concept
9191
links:
92-
- text: What is Active Directory?
92+
- text: What is Microsoft Entra ID?
9393
url: ../../active-directory/fundamentals/active-directory-whatis.md
9494
- text: Manage tenants
9595
url: manage-tenants.md

articles/cost-management-billing/reservations/prepare-buy-reservation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ You have four options to scope a reservation, depending on your needs:
4242
- **Single resource group scope** - Applies the reservation discount to the matching resources in the selected resource group only.
4343
- **Single subscription scope** - Applies the reservation discount to the matching resources in the selected subscription.
4444
- **Shared scope** - Applies the reservation discount to matching resources in eligible subscriptions that are in the billing context. If a subscription is moved to different billing context, the benefit no longer applies to the subscription. It continues to apply to other subscriptions in the billing context.
45-
- For Enterprise Agreement customers, the billing context is the enrollment. The reservation shared scope would include multiple Active Directory tenants in an enrollment.
45+
- For Enterprise Agreement customers, the billing context is the enrollment. The reservation shared scope would include multiple Microsoft Entra tenants in an enrollment.
4646
- For Microsoft Customer Agreement customers, the billing scope is the billing profile.
4747
- For individual subscriptions with pay-as-you-go rates, the billing scope is all eligible subscriptions created by the account administrator.
4848
- **Management group** - Applies the reservation discount to the matching resource in the list of subscriptions that are a part of both the management group and billing scope. The management group scope applies to all subscriptions throughout the entire management group hierarchy. To buy a reservation for a management group, you must have at least read permission on the management group and be a reservation owner or reservation purchaser on the billing subscription.

articles/cost-management-billing/reservations/prepay-sql-data-warehouse-charges.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For pricing information, see the [Azure Synapse Analytics reserved capacity offe
2525
You can buy Azure Synapse Analytics reserved capacity in the [Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_Reservations/ReservationsBrowseBlade). Pay for the reservation [up front or with monthly payments](./prepare-buy-reservation.md). To buy reserved capacity:
2626

2727
- You must have the owner role for at least one enterprise, Pay-As-You-Go, or Microsoft Customer Agreement subscription.
28-
- For Enterprise subscriptions, the **Add Reserved Instances** option must be enabled in the [EA portal](https://ea.azure.com/). If the setting is disabled, you must be an EA Admin to enable it. Direct Enterprise customers can update the **Reserved Instances** setting ine the [Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_GTM/ModernBillingMenuBlade/AllBillingScopes). Navigate to the Policies menu to change settings.
28+
- For Enterprise subscriptions, the **Add Reserved Instances** option must be enabled in the [EA portal](https://ea.azure.com/). If the setting is disabled, you must be an EA Admin to enable it. Direct Enterprise customers can update the **Reserved Instances** setting in the [Azure portal](https://portal.azure.com/#blade/Microsoft_Azure_GTM/ModernBillingMenuBlade/AllBillingScopes). Navigate to the Policies menu to change settings.
2929

3030
- For the Cloud Solution Provider (CSP) program, only the admin agents or sales agents can purchase Azure Synapse Analytics reserved capacity.
3131

@@ -48,7 +48,7 @@ For example, assume your total consumption of Azure Synapse Analytics is DW3000c
4848
- **Single resource group scope** — Applies the reservation discount to the matching resources in the selected resource group only.
4949
- **Single subscription scope** — Applies the reservation discount to the matching resources in the selected subscription.
5050
- **Shared scope** — Applies the reservation discount to matching resources in eligible subscriptions that are in the billing context. For Enterprise Agreement customers, the billing context is the enrollment. For individual subscriptions with pay-as-you-go rates, the billing scope is all eligible subscriptions created by the account administrator.
51-
- For enterprise customers, the billing context is the EA enrollment. The reservation shared scope would include multiple Active Directory Microsoft Entra tenants in an enrollment.
51+
- For enterprise customers, the billing context is the EA enrollment. The reservation shared scope would include multiple Microsoft Entra tenants in an enrollment.
5252
- For Microsoft Customer Agreement customers, the billing scope is the billing profile.
5353
- For Pay-As-You-Go customers, the shared scope is all Pay-As-You-Go subscriptions created by the account administrator.
5454
- **Management group** — Applies the reservation discount to the matching resource in the list of subscriptions that are a part of both the management group and billing scope.

articles/cost-management-billing/savings-plan/scope-savings-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You have the following options to scope a savings plan, depending on your needs:
2222
- **Single resource group scope** - Applies the savings plan benefit to the eligible resources in the selected resource group only.
2323
- **Single subscription scope** - Applies the savings plan benefit to the eligible resources in the selected subscription.
2424
- **Shared scope** - Applies the savings plan benefit to eligible resources within subscriptions that are in the billing context. If a subscription was moved to different billing context, the benefit will no longer be applied to this subscription and will continue to apply to other subscriptions in the billing context.
25-
- For Enterprise Agreement customers, the billing context is the enrollment. The savings plan shared scope would include multiple Active Directory tenants in an enrollment.
25+
- For Enterprise Agreement customers, the billing context is the enrollment. The savings plan shared scope would include multiple Microsoft Entra tenants in an enrollment.
2626
- For Microsoft Customer Agreement customers, the billing scope is the billing profile.
2727
- **Management group** - Applies the savings plan benefit to eligible resources in the list of subscriptions that are a part of both the management group and billing scope. To buy a savings plan for a management group, you must have at least read permission on the management group and be a savings plan owner on the billing subscription.
2828

articles/cost-management-billing/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@
159159
href: manage/programmatically-create-subscription-enterprise-agreement.md
160160
- name: Create MCA subscriptions programmatically
161161
href: manage/programmatically-create-subscription-microsoft-customer-agreement.md
162-
- name: Create MCA subscriptions programmatically across AD tenants
162+
- name: Create MCA subscriptions programmatically across tenants
163163
href: manage/programmatically-create-subscription-microsoft-customer-agreement-across-tenants.md
164164
- name: Create MPA subscriptions programmatically
165165
href: manage/programmatically-create-subscription-microsoft-partner-agreement.md

0 commit comments

Comments
 (0)