Skip to content

Commit 00ad995

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fresh3
2 parents af437ae + 88e7d82 commit 00ad995

File tree

540 files changed

+7256
-3716
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

540 files changed

+7256
-3716
lines changed

.gitignore

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,5 +23,5 @@ AzureMigration.ps1
2323
!/.vscode/extensions.json
2424
.gitignore
2525
**/.vscode/settings.json
26-
27-
desktop.ini
26+
*.pdn
27+
articles/azure-cache-for-redis/media/cache-managed-identity/Screenshot 2022-01-20 092913.pdn

.openpublishing.redirection.data-factory.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,5 +25,16 @@
2525
"redirect_url": "/azure/data-factory/transform-data-using-custom-activity",
2626
"redirect_document_id": false
2727
}
28+
,
29+
{
30+
"source_path_from_root": "/articles/data-factory/blog.md",
31+
"redirect_url": "https://techcommunity.microsoft.com/t5/Azure-Data-Factory/bg-p/AzureDataFactoryBlog",
32+
"redirect_document_id": false
33+
},
34+
{
35+
"source_path_from_root": "/articles/data-factory/pricing.md",
36+
"redirect_url": "https://azure.microsoft.com/pricing/details/data-factory/",
37+
"redirect_document_id": false
38+
}
2839
]
2940
}

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22858,6 +22858,11 @@
2285822858
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
2285922859
"redirect_document_id": ""
2286022860
},
22861+
{
22862+
"source_path_from_root": "/articles/search/cognitive-search-resources-documentation.md",
22863+
"redirect_url": "/azure/search/cognitive-search-concept-intro",
22864+
"redirect_document_id": false
22865+
},
2286122866
{
2286222867
"source_path_from_root": "/articles/search/search-blob-ai-integration.md",
2286322868
"redirect_url": "/azure/search/cognitive-search-concept-intro",
@@ -45207,6 +45212,11 @@
4520745212
"source_path_from_root": "/articles/azure/sentinel/connect-windows-virtual-desktop.md",
4520845213
"redirect_url": "/azure/sentinel/connect-azure-virtual-desktop",
4520945214
"redirect_document_id": true
45215+
},
45216+
{
45217+
"source_path_from_root": "/articles/azure/cognitive-services/translator/custom-translator/v2-preview/project-overview.md",
45218+
"redirect_url": "/azure/cognitive-services/translator/custom-translator/v2-preview/beginners-guide",
45219+
"redirect_document_id": true
4521045220
}
4521145221
]
4521245222
}

articles/active-directory-b2c/billing.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -110,9 +110,7 @@ To change your pricing tier, follow these steps:
110110
1. Select the pricing tier that includes the features you want to enable.
111111

112112
![Screenshot that shows how to select the pricing tier.](media/billing/select-tier.png)
113-
114-
> [!NOTE]
115-
> Currently, Azure AD Premium P1 for Azure AD B2C is the default pricing tier, and it's equivalent to Azure AD Free tier, but it costs money. Therefore, in terms of features, Azure AD Premium P1 license when applied to Azure AD tenant, isn't equivalent to Azure AD B2C Premium P1 license in a Azure AD B2C tenant, and the same is true for Premium P2 license. Hence, you expect that some features available in Azure AD tenant may be missing in Azure AD B2C even when the tenants have Azure AD Premium P2 and Azure AD B2C Premium P2 licenses respectively. For instance, Azure AD Premium P2 offers identity protection in Azure AD B2C tenants, but does not offer other Azure AD Premium P2 features that apply to Azure AD tenants. Learn more about [Azure AD B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
113+
116114

117115
## Switch to MAU billing (pre-November 2019 Azure AD B2C tenants)
118116

articles/active-directory-b2c/localization.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 03/08/2021
10+
ms.date: 01/21/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -142,8 +142,8 @@ The **LocalizedString** element contains the following attributes:
142142

143143
| Attribute | Required | Description |
144144
| --------- | -------- | ----------- |
145-
| ElementType | Yes | Possible values: [ClaimsProvider](#claimsprovider), [ClaimType](#claimtype), [ErrorMessage](#errormessage), [GetLocalizedStringsTransformationClaimType](#getlocalizedstringstransformationclaimtype), [FormatLocalizedStringTransformationClaimType](#formatlocalizedstringtransformationclaimtype), [Predicate](#predicate), [InputValidation](#inputvalidation), or [UxElement](#uxelement). |
146-
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `InputValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
145+
| ElementType | Yes | Possible values: [ClaimsProvider](#claimsprovider), [ClaimType](#claimtype), [ErrorMessage](#errormessage), [GetLocalizedStringsTransformationClaimType](#getlocalizedstringstransformationclaimtype), [FormatLocalizedStringTransformationClaimType](#formatlocalizedstringtransformationclaimtype), [Predicate](#predicate), [PredicateValidation](#predicatevalidation), or [UxElement](#uxelement). |
146+
| ElementId | Yes | If **ElementType** is set to `ClaimType`, `Predicate`, or `PredicateValidation`, this element contains a reference to a claim type already defined in the ClaimsSchema section. |
147147
| StringId | Yes | If **ElementType** is set to `ClaimType`, this element contains a reference to an attribute of a claim type. Possible values: `DisplayName`, `AdminHelpText`, or `PatternHelpText`. The `DisplayName` value is used to set the claim display name. The `AdminHelpText` value is used to set the help text name of the claim user. The `PatternHelpText` value is used to set the claim pattern help text. If **ElementType** is set to `UxElement`, this element contains a reference to an attribute of a user interface element. If **ElementType** is set to `ErrorMessage`, this element specifies the identifier of an error message. See [Localization string IDs](localization-string-ids.md) for a complete list of the `UxElement` identifiers.|
148148

149149
## ElementType
@@ -157,7 +157,7 @@ The ElementType reference to a claim type, a claim transformation, or a user int
157157
|Error message|`ErrorMessage`||The ID of the error message |
158158
|Copies localized strings into claims|`GetLocalizedStringsTra nsformationClaimType`||The name of the output claim|
159159
|Predicate user message|`Predicate`|The name of the predicate| The attribute of the predicate to be localized. Possible values: `HelpText`.|
160-
|Predicate group user message|`InputValidation`|The ID of the PredicateValidation element.|The ID of the PredicateGroup element. The predicate group must be a child of the predicate validation element as defined in the ElementId.|
160+
|Predicate group user message|`PredicateValidation`|The ID of the PredicateValidation element.|The ID of the PredicateGroup element. The predicate group must be a child of the predicate validation element as defined in the ElementId.|
161161
|User interface elements |`UxElement` | | The ID of the user interface element to be localized.|
162162
|[Display Control](display-controls.md) |`DisplayControl` |The ID of the display control. | The ID of the user interface element to be localized.|
163163

@@ -312,9 +312,9 @@ The following example shows how to localize predicates help text.
312312
<LocalizedString ElementType="Predicate" ElementId="Uppercase" StringId="HelpText">an uppercase letter</LocalizedString>
313313
```
314314

315-
### InputValidation
315+
### PredicateValidation
316316

317-
The InputValidation value is used to localize one of the [PredicateValidation](predicates.md) group error messages.
317+
The PredicateValidation value is used to localize one of the [PredicateValidation](predicates.md) group error messages.
318318

319319
```xml
320320
<PredicateValidations>
@@ -342,7 +342,7 @@ The InputValidation value is used to localize one of the [PredicateValidation](p
342342
The following example shows how to localize a predicate validation group help text.
343343

344344
```xml
345-
<LocalizedString ElementType="InputValidation" ElementId="CustomPassword" StringId="CharacterClasses">The password must have at least 3 of the following:</LocalizedString>
345+
<LocalizedString ElementType="PredicateValidation" ElementId="CustomPassword" StringId="CharacterClasses">The password must have at least 3 of the following:</LocalizedString>
346346
```
347347

348348
### UxElement

articles/active-directory/app-proxy/application-proxy-secure-api-access.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -170,13 +170,13 @@ To configure the native app to connect to Azure Active Directory and call the AP
170170

171171
- Paste the **Directory (tenant) ID** in the `<add key="ida:Tenant" value="" />` field. You can find and copy this value (a GUID) from the **Overview** page of either of your apps.
172172

173-
- Paste the AppProxyNativeAppSample **Application (client) ID** in the `<add key="ida:ClientId" value="" />` field. You can find and copy this value (a GUID) from the AppProxyNativeAppSample **Overview** page.
173+
- Paste the AppProxyNativeAppSample **Application (client) ID** in the `<add key="ida:ClientId" value="" />` field. You can find and copy this value (a GUID) from the AppProxyNativeAppSample's **Overview** page, in the left navigation under **Manage**.
174174

175-
- Paste the AppProxyNativeAppSample **Redirect URI** in the `<add key="ida:RedirectUri" value="" />` field. You can find and copy this value (a URI) from the AppProxyNativeAppSample **Authentication** page.
175+
- Paste the AppProxyNativeAppSample **Redirect URI** in the `<add key="ida:RedirectUri" value="" />` field. You can find and copy this value (a URI) from the AppProxyNativeAppSample's **Authentication** page, in the left navigation under **Manage**.
176176

177-
- Paste the SecretAPI **Application ID URI** in the `<add key="todo:TodoListResourceId" value="" />` field. You can find and copy this value (a URI) from the SecretAPI **Expose an API** page.
177+
- Paste the SecretAPI **Application ID URI** in the `<add key="todo:TodoListResourceId" value="" />` field. You can find and copy this value (a URI) from the SecretAPI's **Expose an API** page, in the left navigation under **Manage**.
178178

179-
- Paste the SecretAPI **Home Page URL** in the `<add key="todo:TodoListBaseAddress" value="" />` field. You can find and copy this value (a URL) from the SecretAPI **Branding** page.
179+
- Paste the SecretAPI **Home Page URL** in the `<add key="todo:TodoListBaseAddress" value="" />` field. You can find and copy this value (a URL) from the SecretAPI's **Branding** page, in the left navigation under **Manage**.
180180

181181
After you configure the parameters, build and run the native app. When you select the **Sign In** button, the app lets you sign in, and then displays a success screen to confirm that it successfully connected to the SecretAPI.
182182

articles/active-directory/authentication/concept-mfa-howitworks.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/05/2021
9+
ms.date: 01/07/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -17,43 +17,45 @@ ms.collection: M365-identity-device-management
1717
---
1818
# How it works: Azure AD Multi-Factor Authentication
1919

20-
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
20+
Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan.
2121

22-
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
22+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, an attacker could be using it to gain access. When you require a second form of authentication, security is increased because this additional factor isn't something that's easy for an attacker to obtain or duplicate.
2323

24-
![Conceptual image of the different forms of multi-factor authentication](./media/concept-mfa-howitworks/methods.png)
24+
![Conceptual image of the various forms of multi-factor authentication.](./media/concept-mfa-howitworks/methods.png)
2525

2626
Azure AD Multi-Factor Authentication works by requiring two or more of the following authentication methods:
2727

2828
* Something you know, typically a password.
29-
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
29+
* Something you have, such as a trusted device that's not easily duplicated, like a phone or hardware key.
3030
* Something you are - biometrics like a fingerprint or face scan.
3131

3232
Azure AD Multi-Factor Authentication can also further secure password reset. When users register themselves for Azure AD Multi-Factor Authentication, they can also register for self-service password reset in one step. Administrators can choose forms of secondary authentication and configure challenges for MFA based on configuration decisions.
3333

34-
Apps and services don't need changes to use Azure AD Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.
34+
You don't need to change apps and services to use Azure AD Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in, which automatically requests and processes the MFA challenge when needed.
3535

36-
![Authentication methods in use at the sign-in screen](media/concept-authentication-methods/overview-login.png)
36+
![MFA sign-in screen.](media/concept-mfa-howitworks/sign-in-screen.png)
3737

3838
## Available verification methods
3939

40-
When a user signs in to an application or service and receives an MFA prompt, they can choose from one of their registered forms of additional verification. Users can access [My Profile](https://myprofile.microsoft.com) to edit or add verification methods.
40+
When users sign in to an application or service and receive an MFA prompt, they can choose from one of their registered forms of additional verification. Users can access [My Profile](https://myprofile.microsoft.com) to edit or add verification methods.
4141

4242
The following additional forms of verification can be used with Azure AD Multi-Factor Authentication:
4343

4444
* Microsoft Authenticator app
45-
* OATH Hardware token (preview)
46-
* OATH Software token
45+
* Windows Hello for Business
46+
* FIDO2 security key
47+
* OATH hardware token (preview)
48+
* OATH software token
4749
* SMS
4850
* Voice call
4951

5052
## How to enable and use Azure AD Multi-Factor Authentication
5153

52-
All Azure AD tenants can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to quickly enable Microsoft Authenticator for all users. Users and groups can be enabled for Azure AD Multi-Factor Authentication to prompt for additional verification during the sign-in event.
54+
You can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) in Azure AD tenants to quickly enable Microsoft Authenticator for all users. You can enable Azure AD Multi-Factor Authentication to prompt users and groups for additional verification during sign-in.
5355

54-
For more granular controls, [Conditional Access](../conditional-access/overview.md) policies can be used to define events or applications that require MFA. These policies can allow regular sign-in events when the user is on the corporate network or a registered device, but prompt for additional verification factors when remote or on a personal device.
56+
For more granular controls, you can use [Conditional Access](../conditional-access/overview.md) policies to define events or applications that require MFA. These policies can allow regular sign-in when the user is on the corporate network or a registered device but prompt for additional verification factors when the user is remote or on a personal device.
5557

56-
![Overview diagram of how Conditional Access works to secure the sign-in process](media/tutorial-enable-azure-mfa/conditional-access-overview.png)
58+
![Diagram that shows how Conditional Access works to secure the sign-in process.](media/tutorial-enable-azure-mfa/conditional-access-overview.png)
5759

5860
## Next steps
5961

0 commit comments

Comments
 (0)