Skip to content

Commit 07ccd74

Browse files
Merge branch 'main' into US55911
2 parents 494f89a + 3861a38 commit 07ccd74

File tree

2,156 files changed

+19553
-36505
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,156 files changed

+19553
-36505
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -410,12 +410,6 @@
410410
"branch": "main",
411411
"branch_mapping": {}
412412
},
413-
{
414-
"path_to_root": "azureml-examples-vj",
415-
"url": "https://github.com/azure/azureml-examples",
416-
"branch": "vijetajo-patch-2",
417-
"branch_mapping": {}
418-
},
419413
{
420414
"path_to_root": "azureml-examples-batch-pup",
421415
"url": "https://github.com/azure/azureml-examples",

.openpublishing.redirection.json

Lines changed: 860 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/24/2023
12+
ms.date: 06/24/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -175,15 +175,19 @@ Now that your policy can create SAML responses, you must configure the policy to
175175

176176
1. Open the *SignUpOrSigninSAML.xml* file in your preferred editor.
177177

178-
1. Change the `PolicyId` and `PublicPolicyUri` values of the policy to `B2C_1A_signup_signin_saml` and `http://<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin_saml`.
178+
1. Change the value of:
179+
180+
1. `PolicyId` to `B2C_1A_signup_signin_saml`
181+
182+
1. `PublicPolicyUri` to `http://<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin_saml`. Replace `<tenant-name>` placeholder with the subdomain of your Azure AD B2C tenant's domain name. For example, if your tenant primary domain is `contoso.onmicrosoft.com`, use `contoso`. If you don't have your tenant name, learn [how to read your tenant details](tenant-management-read-tenant-name.md#get-your-tenant-name).
179183

180184
```xml
181185
<TrustFrameworkPolicy
182186
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
183187
xmlns:xsd="http://www.w3.org/2001/XMLSchema"
184188
xmlns="http://schemas.microsoft.com/online/cpim/schemas/2013/06"
185189
PolicySchemaVersion="0.3.0.0"
186-
TenantId="tenant-name.onmicrosoft.com"
190+
TenantId="<tenant-name>.onmicrosoft.com"
187191
PolicyId="B2C_1A_signup_signin_saml"
188192
PublicPolicyUri="http://<tenant-name>.onmicrosoft.com/B2C_1A_signup_signin_saml">
189193
```
@@ -206,7 +210,7 @@ If you started from a different folder in the starter pack or you customized the
206210

207211
The relying party element determines which protocol your application uses. The default is `OpenId`. The `Protocol` element must be changed to `SAML`. The output claims will create the claims mapping to the SAML assertion.
208212

209-
Replace the entire `<TechnicalProfile>` element in the `<RelyingParty>` element with the following technical profile XML. Update `tenant-name` with the name of your Azure AD B2C tenant.
213+
Replace the entire `<TechnicalProfile>` element in the `<RelyingParty>` element with the following technical profile XML.
210214

211215
```xml
212216
<TechnicalProfile Id="PolicyProfile">

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 11/30/2021
12+
ms.date: 06/22/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -117,7 +117,7 @@ The **Protocol** element specifies the protocol to be used for the communication
117117
| Attribute | Required | Description |
118118
| --------- | -------- | ----------- |
119119
| Name | Yes | The name of a valid protocol supported by Azure AD B2C that's used as part of the technical profile. Possible values are `OAuth1`, `OAuth2`, `SAML2`, `OpenIdConnect`, `Proprietary`, or `None`. |
120-
| Handler | No | When the protocol name is set to `Proprietary`, specifies the name of the assembly that's used by Azure AD B2C to determine the protocol handler. |
120+
| Handler | No | When the protocol name is set to `Proprietary`, specifies the name of the assembly that's used by Azure AD B2C to determine the protocol handler. If you set the protocol *Name* attribute to `None`, do not include the *Handler* attribute.|
121121

122122
## Metadata
123123

articles/active-directory-domain-services/join-rhel-linux-vm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -311,21 +311,21 @@ To verify that the VM has been successfully joined to the managed domain, start
311311
1. Create a new SSH connection from your console. Use a domain account that belongs to the managed domain using the `ssh -l` command, such as `contosoadmin@aaddscontoso.com` and then enter the address of your VM, such as *rhel.aaddscontoso.com*. If you use the Azure Cloud Shell, use the public IP address of the VM rather than the internal DNS name.
312312

313313
```bash
314-
sudo ssh -l contosoadmin@AADDSCONTOSO.com rhel.aaddscontoso.com
314+
ssh -l contosoadmin@AADDSCONTOSO.com rhel.aaddscontoso.com
315315
```
316316

317317
1. When you've successfully connected to the VM, verify that the home directory was initialized correctly:
318318
319319
```bash
320-
sudo pwd
320+
pwd
321321
```
322322
323323
You should be in the */home* directory with your own directory that matches the user account.
324324
325325
1. Now check that the group memberships are being resolved correctly:
326326
327327
```bash
328-
sudo id
328+
id
329329
```
330330
331331
You should see your group memberships from the managed domain.

articles/active-directory-domain-services/join-windows-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 01/29/2023
11+
ms.date: 06/22/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an server administrator, I want to learn how to join a Windows Server VM to an Azure Active Directory Domain Services managed domain to provide centralized identity and policy.
@@ -67,7 +67,7 @@ If you already have a VM that you want to domain-join, skip to the section to [j
6767
| Virtual machine name | Enter a name for the VM, such as *myVM* |
6868
| Region | Choose the region to create your VM in, such as *East US* |
6969
| Username | Enter a username for the local administrator account to create on the VM, such as *azureuser* |
70-
| Password | Enter, and then confirm, a secure password for the local administrator to create on the VM. Don't specify a domain user account's credentials. |
70+
| Password | Enter, and then confirm, a secure password for the local administrator to create on the VM. Don't specify a domain user account's credentials. [Windows LAPS](/windows-server/identity/laps/laps-overview) isn't supported. |
7171

7272
1. By default, VMs created in Azure are accessible from the Internet using RDP. When RDP is enabled, automated sign-in attacks are likely to occur, which may disable accounts with common names such as *admin* or *administrator* due to multiple failed successive sign-in attempts.
7373

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/12/2023
9+
ms.date: 06/22/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919
# Protecting authentication methods in Azure Active Directory
2020

2121
>[!NOTE]
22-
>The Microsoft managed value for Authenticator Lite will move from disabled to enabled on June 9th, 2023. All tenants left in the default state 'Microsoft managed' will be enabled for the feature on June 9th.
22+
>The Microsoft managed value for Authenticator Lite will move from disabled to enabled on June 26th, 2023. All tenants left in the default state **Microsoft managed** will be enabled for the feature on June 26th.
2323
2424
Azure Active Directory (Azure AD) adds and improves security features to better protect customers against increasing attacks. As new attack vectors become known, Azure AD may respond by enabling protection by default to help customers stay ahead of emerging security threats.
2525

@@ -39,9 +39,6 @@ Number matching is a good example of protection for an authentication method tha
3939

4040
As MFA fatigue attacks rise, number matching becomes more critical to sign-in security. As a result, Microsoft will change the default behavior for push notifications in Microsoft Authenticator.
4141

42-
>[!NOTE]
43-
>Number matching will begin to be enabled for all users of Microsoft Authenticator starting May 08, 2023.
44-
4542
## Microsoft managed settings
4643

4744
In addition to configuring Authentication methods policy settings to be either **Enabled** or **Disabled**, IT admins can configure some settings in the Authentication methods policy to be **Microsoft managed**. A setting that is configured as **Microsoft managed** allows Azure AD to enable or disable the setting.
@@ -56,13 +53,13 @@ The following table lists each setting that can be set to Microsoft managed and
5653

5754
| Setting | Configuration |
5855
|-------------------------------------------------------------------------------------------------|---------------|
59-
| [Registration campaign](how-to-mfa-registration-campaign.md) | Disabled |
56+
| [Registration campaign](how-to-mfa-registration-campaign.md) | Beginning in July, 2023, enabled for SMS and voice call users with free and trial subscriptions. |
6057
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6158
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6259
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Disabled |
6360
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Disabled |
6461

65-
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/).
62+
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
6663

6764
## Next steps
6865

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: ignite-2022
99
ms.topic: conceptual
10-
ms.date: 06/10/2023
10+
ms.date: 06/22/2023
1111

1212
ms.author: justinha
1313
author: mjsantani
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
You can nudge users to set up Microsoft Authenticator during sign-in. Users will go through their regular sign-in, perform multifactor authentication as usual, and then be prompted to set up Microsoft Authenticator. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to the Authenticator app.
2323

24-
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to snooze the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed.
24+
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to postpone the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed. Users with free and trial subscriptions can postpone the app setup up to three times.
2525

2626
>[!NOTE]
2727
>As users go through their regular sign-in, Conditional Access policies that govern security info registration apply before the user is prompted to set up Authenticator. For example, if a Conditional Access policy requires security info updates can only occur on an internal network, then users won't be prompted to set up Authenticator unless they are on the internal network.
@@ -66,7 +66,7 @@ In addition to choosing who can be nudged, you can define how many days a user c
6666

6767
![Installation complete](./media/how-to-nudge-authenticator-app/finish.png)
6868

69-
1. If a user wishes to not install the Authenticator app, they can tap **Not now** to snooze the prompt for up to 14 days, which can be set by an admin.
69+
1. If a user wishes to not install the Authenticator app, they can tap **Not now** to snooze the prompt for up to 14 days, which can be set by an admin. Users with free and trial subscriptions can snooze the prompt up to three times.
7070

7171
![Snooze installation](./media/how-to-nudge-authenticator-app/snooze.png)
7272

@@ -75,10 +75,12 @@ In addition to choosing who can be nudged, you can define how many days a user c
7575
To enable a registration campaign in the Azure portal, complete the following steps:
7676

7777
1. In the Azure portal, click **Security** > **Authentication methods** > **Registration campaign**.
78-
1. For **State**, click **Enabled**, select any users or groups to exclude from the registration campaign, and then click **Save**.
78+
1. For **State**, click **Microsoft managed** or **Enabled**. In the following screenshot, the registration campaign is **Microsoft managed**. That setting allows Microsoft to set the default value to be either enabled or disabled. For the registration campaign, the Microsoft managed value is Enabled for voice call and SMS users with free and trial subscriptions. For more information, see [Protecting authentication methods in Azure Active Directory](concept-authentication-default-enablement.md).
7979

8080
![Screenshot of enabling a registration campaign.](./media/how-to-nudge-authenticator-app/registration-campaign.png)
8181

82+
1. Select any users or groups to exclude from the registration campaign, and then click **Save**.
83+
8284
## Enable the registration campaign policy using Graph Explorer
8385

8486
In addition to using the Azure portal, you can also enable the registration campaign policy using Graph Explorer. To enable the registration campaign policy, you must use the Authentication Methods Policy using Graph APIs. **Global administrators** and **Authentication Method Policy administrators** can update the policy.

articles/active-directory/authentication/howto-authentication-passwordless-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ For a full list of endpoints needed to use Microsoft online products, see [Offic
106106
To check if the Windows 10 client device has the right domain join type, use the following command:
107107

108108
```console
109-
Dsregcmd/status
109+
Dsregcmd /status
110110
```
111111

112112
The following sample output shows that the device is Azure AD joined as *AzureADJoined* is set to *YES*:

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,14 +87,17 @@ Users can register for passwordless phone sign-in directly within the Microsoft
8787
6. Once signed-in, continue following the additional steps to set up phone sign-in.
8888

8989
### Guided registration with My Sign-ins
90+
> [!NOTE]
91+
> Users will only be able to register Microsoft Authenticator via combined registration if the Microsoft Authenticator authentication mode is to Any or Push.
92+
9093
To register the Microsoft Authenticator app, follow these steps:
9194

9295
1. Browse to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
9396
1. Sign in, then select **Add method** > **Authenticator app** > **Add** to add Microsoft Authenticator.
9497
1. Follow the instructions to install and configure the Microsoft Authenticator app on your device.
9598
1. Select **Done** to complete Microsoft Authenticator configuration.
9699

97-
### Enable phone sign-in
100+
#### Enable phone sign-in
98101

99102
After users registered themselves for the Microsoft Authenticator app, they need to enable phone sign-in:
100103

0 commit comments

Comments
 (0)