Skip to content

Commit 0719b8a

Browse files
authored
Merge pull request #228526 from MicrosoftDocs/main
2/24 PM Publish
2 parents 9f9caea + 2c0a5e0 commit 0719b8a

File tree

381 files changed

+5445
-3416
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

381 files changed

+5445
-3416
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13399,6 +13399,11 @@
1339913399
"redirect_url": "/previous-versions/azure/search/search-how-to-index-power-query-data-sources",
1340013400
"redirect_document_id": false
1340113401
},
13402+
{
13403+
"source_path_from_root": "/articles/search/search-performance-optimization.md",
13404+
"redirect_url": "/azure/search/search-reliability",
13405+
"redirect_document_id": true
13406+
},
1340213407
{
1340313408
"source_path_from_root": "/articles/search/cognitive-search-quickstart-ocr.md",
1340413409
"redirect_url": "/azure/search/cognitive-search-quickstart-blob",

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -75,16 +75,16 @@ A job can go into quarantine regardless of failure counts for issues such as adm
7575

7676
The logic documented here may be different for certain connectors to ensure best customer experience, but we generally have the below retry cycles after a failure:
7777

78-
After the first failure, the first retry happens within the next 2 hours (usually in the next sync cycle).
79-
- The second retry happens 6 hours after the first failure.
80-
- The third retry happens 12 hours after the first failure.
81-
- The fourth retry happens 24 hours after the first failure.
82-
- The fifth retry happens 48 hours after the first failure.
83-
- The sixth retry happens 72 hours after the first failure.
84-
- The seventh retry happens 96 hours after the first failure.
85-
- The eighth retry happens 120 hours after the first failure.
86-
87-
This cycle is repeated every 24 hours until the 30th day when retries are stopped and the job is disabled.
78+
After the failure, the first retry will happen in 6 hours.
79+
- The second retry happens 12 hours after the first failure.
80+
- The third retry happens 24 hours after the first failure.
81+
- The fourth retry happens 48 hours after the first failure.
82+
- The fifth retry happens 96 hours after the first failure.
83+
- The sixth retry happens 192 hours after the first failure.
84+
- The seventh retry happens 384 hours after the first failure.
85+
- The eighth retry happens 768 hours after the first failure.
86+
87+
The retries are stopped after the 8th retry and the escrow entry is removed. The job will continue unless it hits the escrow thresholds from the section above
8888

8989

9090
## How do I get my application out of quarantine?

articles/active-directory/conditional-access/resilience-defaults.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ If the required controls of a policy weren't previously satisfied, the policy is
5454
- Country location (resolving new IP or GPS coordinates)
5555
- Authentication strengths
5656

57-
When active, the Backup Authentication Service doesn't evaluate authentication methods required by [authentication strengths](../authentication/concept-authentication-strengths.md). If you used a non-phishing-resistant authentication method before an outage, during an outage you aren't be prompted for multifactor authentication even if accessing a resource protected by a Conditional Access policy with a phishing-resistant authentication strength.
57+
When active, the Backup Authentication Service doesn't evaluate authentication methods required by [authentication strengths](../authentication/concept-authentication-strengths.md). If you used a non-phishing-resistant authentication method before an outage, during an outage you aren't prompted for multifactor authentication even if accessing a resource protected by a Conditional Access policy with a phishing-resistant authentication strength.
5858

5959
## Resilience defaults enabled
6060

articles/active-directory/develop/msal-net-aad-b2c-considerations.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 05/07/2020
12+
ms.date: 02/21/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: saeeda, jeferrie
1515
ms.custom: "devx-track-csharp, aaddev"
@@ -29,9 +29,9 @@ This article applies to MSAL.NET 3.x. For MSAL.NET 2.x, see [Azure AD B2C specif
2929

3030
The authority format for Azure AD B2C is: `https://{azureADB2CHostname}/tfp/{tenant}/{policyName}`
3131

32-
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, *contosob2c.b2clogin.com*.
33-
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, *contosob2c.onmicrosoft.com* or a GUID, respectively.
34-
- `policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like *b2c_1_susi*.
32+
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, _contosob2c.b2clogin.com_.
33+
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, _contosob2c.onmicrosoft.com_ or a GUID, respectively.
34+
- `policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like _b2c_1_susi_.
3535

3636
For more information about Azure AD B2C authorities, see [Set redirect URLs to b2clogin.com](../../active-directory-b2c/b2clogin.md).
3737

@@ -77,7 +77,7 @@ catch (MsalUiRequiredException ex)
7777
.WithAccount(account)
7878
.WithParentActivityOrWindow(ParentActivityOrWindow)
7979
.ExecuteAsync();
80-
}
80+
}
8181
```
8282

8383
In the preceding code snippet:
@@ -116,12 +116,12 @@ private async void EditProfileButton_Click(object sender, RoutedEventArgs e)
116116

117117
For more information on the ROPC flow, see [Sign in with resource owner password credentials grant](v2-oauth-ropc.md).
118118

119-
The ROPC flow is **not recommended** because asking a user for their password in your application is not secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
119+
The ROPC flow is **not recommended** because asking a user for their password in your application isn't secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
120120

121121
By using username/password in an ROPC flow, you sacrifice several things:
122122

123123
- Core tenets of modern identity: The password can be fished or replayed because the shared secret can be intercepted. By definition, ROPC is incompatible with passwordless flows.
124-
- Users who need to do MFA won't be able to sign in (as there is no interaction).
124+
- Users who use multi-factor authentication (MFA) won't be able to sign in as there's no interaction.
125125
- Users won't be able to use single sign-on (SSO).
126126

127127
### Configure the ROPC flow in Azure AD B2C
@@ -137,21 +137,19 @@ AcquireTokenByUsernamePassword(
137137
SecureString password)
138138
```
139139

140-
This `AcquireTokenByUsernamePassword` method takes the following parameters:
140+
The `AcquireTokenByUsernamePassword` method takes the following parameters:
141141

142-
- The *scopes* for which to obtain an access token.
143-
- A *username*.
144-
- A SecureString *password* for the user.
142+
- The _scopes_ for which to obtain an access token.
143+
- A _username_.
144+
- A SecureString _password_ for the user.
145145

146146
### Limitations of the ROPC flow
147147

148148
The ROPC flow **only works for local accounts**, where your users have registered with Azure AD B2C using an email address or username. This flow doesn't work when federating to an external identity provider supported by Azure AD B2C (Facebook, Google, etc.).
149149

150150
## Google auth and embedded webview
151151

152-
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` is not a trusted authority with Google, so users will not be able to authenticate.
153-
154-
We'll provide an update to this [issue](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/688) if things change.
152+
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` isn't a trusted authority with Google, so users won't be able to authenticate.
155153

156154
## Token caching in MSAL.NET
157155

@@ -186,6 +184,6 @@ For more information about specifying which claims are returned by your user flo
186184

187185
More details about acquiring tokens interactively with MSAL.NET for Azure AD B2C applications are provided in the following sample.
188186

189-
| Sample | Platform | Description|
190-
|------ | -------- | -----------|
191-
|[active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned.|
187+
| Sample | Platform | Description |
188+
| ----------------------------------------------------------------------------------------------------------- | --------------------------------- | --------------------------------------------------------------------------------------------------------------------------------- |
189+
| [active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned. |

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The following Linux distributions are currently supported for deployments in a s
4343
| CentOS | CentOS 7, CentOS 8 |
4444
| Debian | Debian 9, Debian 10, Debian 11 |
4545
| openSUSE | openSUSE Leap 42.3, openSUSE Leap 15.1+ |
46-
| RedHat Enterprise Linux (RHEL) | RHEL 7.4 to RHEL 7.10, RHEL 8.3+ |
46+
| RedHat Enterprise Linux (RHEL) | RHEL 7.4 to RHEL 7.9, RHEL 8.3+ |
4747
| SUSE Linux Enterprise Server (SLES) | SLES 12, SLES 15.1+ |
4848
| Ubuntu Server | Ubuntu Server 16.04 to Ubuntu Server 22.04 |
4949

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -424,10 +424,8 @@ The following service plans cannot be assigned together:
424424
| Service Plan Name | GUID |
425425
| --- | --- |
426426
| EXCHANGE_B_STANDARD | 90927877-dcff-4af6-b346-2332c0b15bb7 |
427-
| EXCHANGE_L_STANDARD | d42bdbd6-c335-4231-ab3d-c8f348d5aff5 |
428427
| EXCHANGE_S_ARCHIVE | da040e0a-b393-4bea-bb76-928b3fa1cf5a |
429428
| EXCHANGE_S_DESKLESS | 4a82b400-a79f-41a4-b4e2-e94f5787b113 |
430-
| EXCHANGE_S_ENTERPRISE | efb87545-963c-4e0d-99df-69c6916d9eb0 |
431429
| EXCHANGE_S_ESSENTIALS | 1126bef5-da20-4f07-b45e-ad25d2581aa8 |
432430
| EXCHANGE_S_STANDARD | 9aaf7827-d63c-4b61-89c3-182f06f82e5c |
433431
| EXCHANGE_S_STANDARD_MIDMARKET | fc52cc4b-ed7d-472d-bbe7-b081c23ecc56 |

articles/active-directory/fundamentals/data-protection-considerations.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,6 @@ For more information about Secret encryption at rest, see the following table.
8383

8484
* [Microsoft Service Trust Documents](https://servicetrust.microsoft.com/Documents/TrustDocuments)
8585
* [Microsoft Azure Trust Center](https://azure.microsoft.com/overview/trusted-cloud/)
86-
* [Where is my data? - Office 365 documentation](http://o365datacentermap.azurewebsites.net/)
8786
* [Recover from deletions in Azure Active Directory](recover-from-deletions.md)
8887

8988
## Next steps
16.3 KB
Loading
-1.67 KB
Loading

0 commit comments

Comments
 (0)