Skip to content

Commit 01e7e57

Browse files
committed
Merge branch 'connector-health' of https://github.com/batamig/azure-docs-pr; branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into connector-health
2 parents c1c437c + 8bdf7c8 commit 01e7e57

File tree

119 files changed

+674
-419
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+674
-419
lines changed

articles/active-directory-b2c/identity-provider-microsoft-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/16/2021
12+
ms.date: 01/13/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C

articles/active-directory-b2c/manage-user-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/09/2021
11+
ms.date: 01/13/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---

articles/active-directory-b2c/quickstart-native-app-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
1111
ms.custom: mvc, mode-other
12-
ms.date: 08/16/2021
12+
ms.date: 01/13/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/quickstart-single-page-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
11-
ms.date: 04/04/2020
11+
ms.date: 01/13/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: mode-other

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ To complete this tutorial, you need the following resources and privileges:
4444
* If needed, [create and configure an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
4545
* The *LDP.exe* tool installed on your computer.
4646
* If needed, [install the Remote Server Administration Tools (RSAT)][rsat] for *Active Directory Domain Services and LDAP*.
47+
* You need global administrator privileges in your Azure AD tenant to enable secure LDAP.
4748

4849
## Sign in to the Azure portal
4950

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Organizations may choose to use one or more of the following methods to enable t
7272

7373
To enable the use of security keys using Intune, complete the following steps:
7474

75-
1. Sign in to the [Azure portal](https://portal.azure.com).
75+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
7676
1. Browse to **Microsoft Intune** > **Device enrollment** > **Windows enrollment** > **Windows Hello for Business** > **Properties**.
7777
1. Under **Settings**, set **Use security keys for sign-in** to **Enabled**.
7878

@@ -82,13 +82,13 @@ Configuration of security keys for sign-in isn't dependent on configuring Window
8282

8383
To target specific device groups to enable the credential provider, use the following custom settings via Intune:
8484

85-
1. Sign in to the [Azure portal](https://portal.azure.com).
86-
1. Browse to **Microsoft Intune** > **Device configuration** > **Profiles** > **Create profile**.
85+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
86+
1. Browse to **Device** > **Windows** > **Configuration Profiles** > **Create profile**.
8787
1. Configure the new profile with the following settings:
8888
- Name: Security Keys for Windows Sign-In
8989
- Description: Enables FIDO Security Keys to be used during Windows Sign In
9090
- Platform: Windows 10 and later
91-
- Profile type: Custom
91+
- Profile type: Template > Custom
9292
- Custom OMA-URI Settings:
9393
- Name: Turn on FIDO Security Keys for Windows Sign-In
9494
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
@@ -158,4 +158,4 @@ If you'd like to share feedback or encounter issues about this feature, share vi
158158

159159
[Learn more about device registration](../devices/overview.md)
160160

161-
[Learn more about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
161+
[Learn more about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ All users start out *Disabled*. When you enroll users in per-user Azure AD Multi
5353

5454
To view and manage user states, complete the following steps to access the Azure portal page:
5555

56-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
56+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator.
5757
1. Search for and select *Azure Active Directory*, then select **Users** > **All users**.
58-
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
58+
1. Select **Per-user MFA**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
5959
[![Select Multi-Factor Authentication from the Users window in Azure AD.](media/howto-mfa-userstates/selectmfa-cropped.png)](media/howto-mfa-userstates/selectmfa.png#lightbox)
6060
1. A new page opens that displays the user state, as shown in the following example.
6161
![Screenshot that shows example user state information for Azure AD Multi-Factor Authentication](./media/howto-mfa-userstates/userstate1.png)
@@ -120,4 +120,4 @@ To configure Azure AD Multi-Factor Authentication settings, see [Configure Azur
120120

121121
To manage user settings for Azure AD Multi-Factor Authentication, see [Manage user settings with Azure AD Multi-Factor Authentication](howto-mfa-userdevicesettings.md).
122122

123-
To understand why a user was prompted or not prompted to perform MFA, see [Azure AD Multi-Factor Authentication reports](howto-mfa-reporting.md).
123+
To understand why a user was prompted or not prompted to perform MFA, see [Azure AD Multi-Factor Authentication reports](howto-mfa-reporting.md).

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To make sure you understand the functionality and effects before you enable the
3131
To enable combined registration, complete these steps:
3232

3333
1. Sign in to the Azure portal as a user administrator or global administrator.
34-
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
34+
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature settings**.
3535
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
3636

3737
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)

articles/active-directory/authentication/tutorial-configure-custom-password-protection.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ To give you flexibility in what passwords are allowed, you can also define a cus
4949
* Locations, such as company headquarters
5050
* Company-specific internal terms
5151
* Abbreviations that have specific company meaning
52+
* Months and weekdays with your company's local languages
5253

5354
When a user attempts to reset a password to something that's on the global or custom banned password list, they see one of the following error messages:
5455

@@ -123,4 +124,4 @@ In this tutorial, you enabled and configured custom password protection lists fo
123124
> * Test password changes with a banned password
124125
125126
> [!div class="nextstepaction"]
126-
> [Enable risk-based Azure AD Multi-Factor Authentication](./tutorial-enable-azure-mfa.md)
127+
> [Enable risk-based Azure AD Multi-Factor Authentication](./tutorial-enable-azure-mfa.md)

articles/active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Azure Active Directory Connect cloud sync self-service password reset writeback
2626
- [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and [Hybrid Identity Administrator](../roles/permissions-reference.md#hybrid-identity-administrator) roles
2727
- [Global Administrator](../roles/permissions-reference.md#global-administrator) role
2828
- Azure AD configured for self-service password reset. If needed, complete this tutorial to enable Azure AD SSPR.
29-
- An on-premises AD DS environment configured with Azure AD Connect cloud sync version 1.1.587 or later. If needed, configure Azure AD Connect cloud sync using [this tutorial](tutorial-enable-sspr.md).
29+
- An on-premises AD DS environment configured with Azure AD Connect cloud sync version 1.1.587 or later. Learn how to [identify the agent's current version](../cloud-sync/how-to-automatic-upgrade.md). If needed, configure Azure AD Connect cloud sync using [this tutorial](tutorial-enable-sspr.md).
3030
- Enabling password writeback in Azure AD Connect cloud sync requires executing signed PowerShell scripts.
3131
- Ensure that the PowerShell execution policy will allow running of scripts.
3232
- The recommended execution policy during installation is "RemoteSigned".
@@ -45,7 +45,7 @@ Permissions for cloud sync are configured by default. If permissions need to be
4545

4646
### Enable password writeback in Azure AD Connect cloud sync
4747

48-
For public preview, you need to enable password writeback in Azure AD Connect cloud sync by using the Set-AADCloudSyncPasswordWritebackConfiguration cmdlet and tenant’s global administrator credentials:
48+
For public preview, you need to enable password writeback in Azure AD Connect cloud sync by using the Set-AADCloudSyncPasswordWritebackConfiguration cmdlet on the servers with the provisioning agents. You will need global administrator credentials:
4949

5050
```powershell
5151
Import-Module 'C:\\Program Files\\Microsoft Azure AD Connect Provisioning Agent\\Microsoft.CloudSync.Powershell.dll'

0 commit comments

Comments
 (0)