Skip to content

Commit 00c77f5

Browse files
authored
Merge pull request #220585 from MicrosoftDocs/main
12/06 AM Publish
2 parents ff82c89 + fa2f5c7 commit 00c77f5

File tree

41 files changed

+451
-186
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+451
-186
lines changed

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/17/2022
9+
ms.date: 12/06/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -27,7 +27,7 @@ The Authentication methods policy is the recommended way to manage authenticatio
2727

2828
Methods enabled in the Authentication methods policy can typically be used anywhere in Azure AD - for both authentication and password reset scenarios. The exception is that some methods are inherently limited to use in authentication, such as FIDO2 and Windows Hello for Business, and others are limited to use in password reset, such as security questions. For more control over which methods are usable in a given authentication scenario, consider using the **Authentication Strengths** feature.
2929

30-
Most methods also have configuration parameters to more precisely control how that method can be used. For example, if you enable **Phone call**, you can also specify whether an office phone can be used in addition to a mobile phone.
30+
Most methods also have configuration parameters to more precisely control how that method can be used. For example, if you enable **Voice calls**, you can also specify whether an office phone can be used in addition to a mobile phone.
3131

3232
Or let's say you want to enable passwordless authentication with Microsoft Authenticator. You can set extra parameters like showing the user sign-in location or the name of the app being signed into. These options provide more context for users when they sign-in and help prevent accidental MFA approvals.
3333

@@ -51,7 +51,7 @@ To manage the legacy MFA policy, click **Security** > **Multifactor Authenticati
5151

5252
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/service-settings.png" alt-text="Screenshot of MFA service settings.":::
5353

54-
To manage authentication methods for self-service password reset (SSPR), click **Password reset** > **Authentication methods**. The **Mobile phone** option in this policy allows either voice call or SMS to be sent to a mobile phone. The **Office phone** option allows only voice call.
54+
To manage authentication methods for self-service password reset (SSPR), click **Password reset** > **Authentication methods**. The **Mobile phone** option in this policy allows either voice calls or SMS to be sent to a mobile phone. The **Office phone** option allows only voice calls.
5555

5656
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/password-reset.png" alt-text="Screenshot of password reset settings.":::
5757

@@ -71,9 +71,9 @@ If the user can't register Microsoft Authenticator based on either of those poli
7171
- **Mobile app notification**
7272
- **Mobile app code**
7373

74-
For users who are enabled for **Mobile phone** for SSPR, the independent control between policies can impact sign-in behavior. Where the other policies have separate options for SMS and voice call, the **Mobile phone** for SSPR enables both options. As a result, anyone who uses **Mobile phone** for SSPR can also use voice call for password reset, even if the other policies don't allow phone calls.
74+
For users who are enabled for **Mobile phone** for SSPR, the independent control between policies can impact sign-in behavior. Where the other policies have separate options for SMS and voice calls, the **Mobile phone** for SSPR enables both options. As a result, anyone who uses **Mobile phone** for SSPR can also use voice calls for password reset, even if the other policies don't allow voice calls.
7575

76-
Similarly, let's suppose you enable **Phone call** for a group. After you enable it, you find that even users who aren't group members can sign-in with a voice call. In this case, it's likely those users are enabled for **Mobile phone** in the legacy SSPR policy or **Call to phone** in the legacy MFA policy.
76+
Similarly, let's suppose you enable **Voice calls** for a group. After you enable it, you find that even users who aren't group members can sign-in with a voice call. In this case, it's likely those users are enabled for **Mobile phone** in the legacy SSPR policy or **Call to phone** in the legacy MFA policy.
7777

7878
## Migration between policies
7979

@@ -100,7 +100,7 @@ Tenants are set to either Pre-migration or Migration in Progress by default, dep
100100

101101
## Known issues
102102

103-
* Currently, all users must be enabled for at least one MFA method that isn't passwordless and the user can register in interrupt mode. Possible methods include Microsoft Authenticator, SMS, voice call, and software OATH/mobile app code. The method(s) can be enabled in any policy. If a user is not eligible for at least one of those methods, the user will see an error during registration and when visiting My Security Info. We're working to improve this experience to enable fully passwordless configurations.
103+
* Currently, all users must be enabled for at least one MFA method that isn't passwordless and the user can register in interrupt mode. Possible methods include Microsoft Authenticator, SMS, voice calls, and software OATH/mobile app code. The method(s) can be enabled in any policy. If a user is not eligible for at least one of those methods, the user will see an error during registration and when visiting My Security Info. We're working to improve this experience to enable fully passwordless configurations.
104104

105105
## Next steps
106106

articles/active-directory/authentication/how-to-authentication-methods-manage.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ For each method, note whether or not it's enabled for the tenant. The following
4545

4646
| Multifactor authentication policy | Authentication method policy |
4747
|-----------------------------------|------------------------------|
48-
| Call to phone | Phone calls |
48+
| Call to phone | Voice calls |
4949
| Text message to phone | SMS<br>Microsoft Authenticator |
5050
| Notification through mobile app | Microsoft Authenticator |
5151
| Verification code from mobile app or hardware token | Third party software OATH tokens<br>Hardware OATH tokens (not yet available)<br>Microsoft Authenticator |
@@ -63,8 +63,8 @@ Record which users are in scope for SSPR (either all users, one specific group,
6363
| Mobile app notification | Microsoft Authenticator |
6464
| Mobile app code | Microsoft Authenticator<br>Software OATH tokens |
6565
| Email | Email OTP |
66-
| Mobile phone | Phone calls<br>SMS |
67-
| Office phone | Phone calls |
66+
| Mobile phone | Voice calls<br>SMS |
67+
| Office phone | Voice calls |
6868
| Security questions | Not yet available; copy questions for later use |
6969

7070
### Authentication methods policy
@@ -99,7 +99,7 @@ Where the policies match, you can easily match your current state. Where there's
9999

100100
In the Authentication methods policy, you'll then need to choose whether to enable **Microsoft Authenticator** for both SSPR and MFA or disable it (we recommend enabling Microsoft Authenticator).
101101

102-
As you update each method in the Authentication methods policy, some methods have configurable parameters that allow you to control how that method can be used. For example, if you enable **Phone calls** as authentication method, you can choose to allow both office phone and mobile phones, or mobile only. Step through the process to configure each authentication method from your audit.
102+
As you update each method in the Authentication methods policy, some methods have configurable parameters that allow you to control how that method can be used. For example, if you enable **Voice calls** as authentication method, you can choose to allow both office phone and mobile phones, or mobile only. Step through the process to configure each authentication method from your audit.
103103

104104
You aren't required to match your existing policy! It's a great opportunity to review your enabled methods and choose a new policy that maximizes security and usability for your tenant. Just note that disabling methods for users who are already using them may require those users to register new authentication methods and prevent them from using previously registered methods.
105105

@@ -121,11 +121,11 @@ If **Verification code from mobile app or hardware token** is enabled in the leg
121121

122122
:::image type="content" border="true" source="./media/how-to-authentication-methods-manage/one-time-password.png" alt-text="Screenshot of Microsoft Authenticator OTP.":::
123123

124-
### SMS and phone calls
124+
### SMS and voice calls
125125

126126
The legacy MFA policy has separate controls for **SMS** and **Phone calls**. But there's also a **Mobile phone** control that enables mobile phones for both SMS and voice calls. And another control for **Office phone** enables an office phone only for voice call.
127127

128-
The Authentication methods policy has controls for **SMS** and **Phone calls**, matching the legacy MFA policy. If your tenant is using SSPR and **Mobile phone** is enabled, you'll want to enable both **SMS** and **Phone calls** in the Authentication methods policy. If your tenant is using SSPR and **Office phone** is enabled, you'll want to enable **Phone calls** in the Authentication methods policy, and ensure that the **Office phone** option is enabled.
128+
The Authentication methods policy has controls for **SMS** and **Voice calls**, matching the legacy MFA policy. If your tenant is using SSPR and **Mobile phone** is enabled, you'll want to enable both **SMS** and **Voice calls** in the Authentication methods policy. If your tenant is using SSPR and **Office phone** is enabled, you'll want to enable **Voice calls** in the Authentication methods policy, and ensure that the **Office phone** option is enabled.
129129

130130
### OATH tokens
131131

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Conditional Access for workload identities
1919

20-
Conditional Access policies have histroically applied only to users when they access apps and services like SharePoint online or the Azure portal. We are now extending support for Conditional Access policies to be applied to service principals owned by the organization. We call this capability Conditional Access for workload identities.
20+
Conditional Access policies have historically applied only to users when they access apps and services like SharePoint online or the Azure portal. We are now extending support for Conditional Access policies to be applied to service principals owned by the organization. We call this capability Conditional Access for workload identities.
2121

2222
A [workload identity](../develop/workload-identities-overview.md) is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as they:
2323

articles/active-directory/governance/index.yml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,16 @@
11
### YamlMime:Landing
22

3-
title: Microsoft Entra Identity Governance Identity Governance documentation
3+
title: Microsoft Entra Identity Governance documentation
44
summary: Microsoft Entra Identity Governance helps you to protect, monitor, and audit access to critical assets while ensuring employee productivity.
55

66
metadata:
77
author: owinfreyatl
88
description: "Learn how to protect, monitor, and audit access to critical assets while ensuring employee productivity."
99
manager: amycolannino
1010
ms.author: owinfreyatl
11-
ms.collection: na
12-
ms.date: 09/14/2019
11+
ms.date: 12/06/2022
1312
ms.service: active-directory
14-
ms.subservice: na
13+
ms.subservice: compliance
1514
ms.topic: landing-page
1615
services: active-directory
1716

@@ -96,4 +95,4 @@ landingContent:
9695
- linkListType: how-to-guide
9796
links:
9897
- text: Require users to agree to a terms of use when using an app
99-
url: ../conditional-access/terms-of-use.md
98+
url: ../conditional-access/terms-of-use.md

articles/active-directory/identity-protection/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,18 @@
4848
href: troubleshooting-identity-protection-faq.yml
4949
- name: Reference
5050
items:
51-
- name: Graph APIs
51+
- name: Microsoft Graph APIs
5252
items:
5353
- name: riskDetection API
5454
href: /graph/api/resources/riskdetection
5555
- name: riskyUsers API
5656
href: /graph/api/resources/riskyuser
5757
- name: signIn API
5858
href: /graph/api/resources/signin
59+
- name: servicePrincipalRiskDetection API
60+
href: /graph/api/resources/serviceprincipalriskdetection
61+
- name: riskyServicePrincipal API
62+
href: /graph/api/resources/riskyserviceprincipal
5963
- name: Glossary
6064
href: reference-identity-protection-glossary.md
6165
- name: Resources

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,9 +68,9 @@ Organizations can find workload identities that have been flagged for risk in on
6868

6969
:::image type="content" source="media/concept-workload-identity-risk/workload-identity-detections-in-risk-detections-report.png" alt-text="Screenshot showing risks detected against workload identities in the report." lightbox="media/concept-workload-identity-risk/workload-identity-detections-in-risk-detections-report.png":::
7070

71-
### Graph APIs
71+
### Microsoft Graph APIs
7272

73-
You can also query risky workload identities [using the Microsoft Graph API](/graph/use-the-api). There are two new collections in the [Identity Protection APIs](/graph/api/resources/identityprotection-root?view=graph-rest-beta&preserve-view=true)
73+
You can also query risky workload identities [using the Microsoft Graph API](/graph/use-the-api). There are two new collections in the [Identity Protection APIs](/graph/api/resources/identityprotection-root).
7474

7575
- riskyServicePrincipals
7676
- servicePrincipalRiskDetections

articles/aks/azure-files-csi.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use Container Storage Interface (CSI) driver for Azure Files on Azure Kub
33
description: Learn how to use the Container Storage Interface (CSI) driver for Azure Files in an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
ms.topic: article
6-
ms.date: 12/02/2022
6+
ms.date: 12/06/2022
77
author: palma21
88

99
---
@@ -360,8 +360,6 @@ provisioner: file.csi.azure.com
360360
allowVolumeExpansion: true
361361
parameters:
362362
protocol: nfs
363-
mountOptions:
364-
- nconnect=8
365363
```
366364
367365
After editing and saving the file, create the storage class with the [kubectl apply][kubectl-apply] command:
@@ -495,4 +493,4 @@ The output of the commands resembles the following example:
495493
[share-snapshots-overview]: ../storage/files/storage-snapshots-files.md
496494
[zrs-account-type]: ../storage/common/storage-redundancy.md#zone-redundant-storage
497495
[access-tiers-overview]: ../storage/blobs/access-tiers-overview.md
498-
[tag-resources]: ../azure-resource-manager/management/tag-resources.md
496+
[tag-resources]: ../azure-resource-manager/management/tag-resources.md
3.61 KB
Loading

0 commit comments

Comments
 (0)