Skip to content

Commit 002555d

Browse files
committed
Merge branch 'master' of https://github.com/microsoftdocs/azure-docs-pr into asb-migration
2 parents e05eaf4 + 7f34e7d commit 002555d

File tree

46 files changed

+1156
-478
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+1156
-478
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60465,6 +60465,16 @@
6046560465
"redirect_url": "/azure/cognitive-services/LinguisticAnalysisAPI/Home",
6046660466
"redirect_document_id": false
6046760467
},
60468+
{
60469+
"source_path_from_root": "/articles/cognitive-services/LUIS/get-started-portal-build-app.md",
60470+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-create-app",
60471+
"redirect_document_id": true
60472+
},
60473+
{
60474+
"source_path_from_root": "/articles/cognitive-services/LUIS/get-started-portal-deploy-app.md",
60475+
"redirect_url": "/azure/cognitive-services/LUIS/luis-get-started-create-app",
60476+
"redirect_document_id": false
60477+
},
6046860478
{
6046960479
"source_path_from_root": "/articles/cognitive-services/LUIS/luis-get-started-javascript-add-utterance.md",
6047060480
"redirect_url": "/azure/cognitive-services/LUIS/",

articles/active-directory/conditional-access/location-condition.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Named locations defined by IPv4/IPv6 address ranges are subject to the following
4444
- Configure up to 195 named locations
4545
- Configure up to 2000 IP ranges per named location
4646
- Both IPv4 and IPv6 ranges are supported
47-
- Private IP ranges connot be configured
47+
- Private IP ranges cannot be configured
4848
- The number of IP addresses contained in a range is limited. Only CIDR masks greater than /8 are allowed when defining an IP range.
4949

5050
### Trusted locations
@@ -53,7 +53,7 @@ Administrators can designate named locations defined by IP address ranges to be
5353

5454
![Trusted locations in the Azure portal](./media/location-condition/new-trusted-location.png)
5555

56-
Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a users' sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies. For example, you may require restrict multi-factor authentication registration to trusted named locations only.
56+
Sign-ins from trusted named locations improve the accuracy of Azure AD Identity Protection's risk calculation, lowering a user's sign-in risk when they authenticate from a location marked as trusted. Additionally, trusted named locations can be targeted in Conditional Access policies. For example, you may require restrict multi-factor authentication registration to trusted named locations only.
5757

5858
### Countries and regions
5959

@@ -72,13 +72,13 @@ Some IP addresses are not mapped to a specific country or region, including all
7272

7373
You can also configure IP address ranges representing your organization's local intranet in the [multi-factor authentication service settings](https://account.activedirectory.windowsazure.com/usermanagement/mfasettings.aspx). This feature enables you to configure up to 50 IP address ranges. The IP address ranges are in CIDR format. For more information, see [Trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips).
7474

75-
If you have Trusted IPs configured, they show up as **MFA Trusted IPS** in the list of locations for the location condition.
75+
If you have Trusted IPs configured, they show up as **MFA Trusted IPs** in the list of locations for the location condition.
7676

7777
### Skipping multi-factor authentication
7878

7979
On the multi-factor authentication service settings page, you can identify corporate intranet users by selecting **Skip multi-factor authentication for requests from federated users on my intranet**. This setting indicates that the inside corporate network claim, which is issued by AD FS, should be trusted and used to identify the user as being on the corporate network. For more information, see [Enable the Trusted IPs feature by using Conditional Access](../authentication/howto-mfa-mfasettings.md#enable-the-trusted-ips-feature-by-using-conditional-access).
8080

81-
After checking this option, including the named location **MFA Trusted IPS** will apply to any policies with this option selected.
81+
After checking this option, including the named location **MFA Trusted IPs** will apply to any policies with this option selected.
8282

8383
For mobile and desktop applications, which have long lived session lifetimes, Conditional Access is periodically reevaluated. The default is once an hour. When the inside corporate network claim is only issued at the time of the initial authentication, Azure AD may not have a list of trusted IP ranges. In this case, it is more difficult to determine if the user is still on the corporate network:
8484

@@ -104,7 +104,7 @@ By default, selecting **Any location** causes a policy to be applied to all IP a
104104
This option applies to:
105105

106106
- All locations that have been marked as trusted location
107-
- **MFA Trusted IPS** (if configured)
107+
- **MFA Trusted IPs** (if configured)
108108

109109
### Selected locations
110110

@@ -126,7 +126,7 @@ Most of the IPv6 traffic that gets proxied to Azure AD comes from Microsoft Exch
126126
These are the most common reasons you may need to configure IPv6 ranges in your named locations. In addition, if you are using Azure VNets, you will have traffic coming from an IPv6 address. If you have VNet traffic blocked by a Conditional Access policy, check your Azure AD sign-in log. Once you’ve identified the traffic, you can get the IPv6 address being used and exclude it from your policy.
127127

128128
> [!NOTE]
129-
> If you want to specify an IP CIDR range for a single address, apply the /128 bit mask. If you say the IPv6 address 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a and wanted to exclude that single address as a range, you would use 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a/128.
129+
> If you want to specify an IP CIDR range for a single address, apply the /128 bit mask. If you see the IPv6 address 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a and wanted to exclude that single address as a range, you would use 2607:fb90:b27a:6f69:f8d5:dea0:fb39:74a/128.
130130
131131
### Identifying IPv6 traffic in the Azure AD Sign-in activity reports
132132

@@ -143,7 +143,7 @@ Conditional Access policies are evaluated when:
143143
- A user initially signs in to a web app, mobile or desktop application.
144144
- A mobile or desktop application that uses modern authentication, uses a refresh token to acquire a new access token. By default this check is once an hour.
145145

146-
This check means for mobile and desktop applications using modern authentication, a change in location would be detected within an hour of changing the network location. For mobile and desktop applications that don’t use modern authentication, the policy is applied on each token request. The frequency of the request can vary based on the application. Similarly, for web applications, the policy is applied at initial sign-in and is good for the lifetime of the session at the web application. Due to differences in session lifetimes across applications, the time between policy evaluation will also vary. Each time the application requests a new sign-in token, the policy is applied.
146+
This check means for mobile and desktop applications using modern authentication, a change in location would be detected within an hour of changing the network location. For mobile and desktop applications that don’t use modern authentication, the policy is applied on each token request. The frequency of the request can vary based on the application. Similarly, for web applications, the policy is applied at initial sign-in and is good for the lifetime of the session at the web application. Due to differences in session lifetimes across applications, the time between policy evaluation will also vary. Each time the application requests a new sign-in token, the policy is applied.
147147

148148
By default, Azure AD issues a token on an hourly basis. After moving off the corporate network, within an hour the policy is enforced for applications using modern authentication.
149149

0 commit comments

Comments
 (0)