Skip to content

Commit 09d68d0

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into azureadds-rm-template
2 parents 0a00c32 + 5545f9d commit 09d68d0

File tree

1,589 files changed

+62240
-14212
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,589 files changed

+62240
-14212
lines changed

.openpublishing.redirection.json

Lines changed: 46593 additions & 1902 deletions
Large diffs are not rendered by default.

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -139,6 +139,6 @@ In this article, you used the Azure portal to configure and deploy resources usi
139139
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
140140
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
141141
[create-azure-ad-ds-instance]: tutorial-create-instance.md
142-
[template-overview]: ../azure-resource-manager/template-deployment-overview.md
143-
[deploy-powershell]: ../azure-resource-manager/resource-group-template-deploy.md
144-
[deploy-cli]: ../azure-resource-manager/resource-group-template-deploy-cli.md
142+
[template-overview]: ../azure-resource-manager/templates/overview.md
143+
[deploy-powershell]: ../azure-resource-manager/templates/deploy-powershell.md
144+
[deploy-cli]: ../azure-resource-manager/templates/deploy-cli.md

articles/active-directory-domain-services/mismatched-tenant-error.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ In this example deployment scenario, the Contoso Azure AD DS managed domain is e
5252
The following two options resolve the mismatched directory error:
5353

5454
* [Delete the Azure AD DS managed domain](delete-aadds.md) from your existing Azure AD directory. [Create a replacement Azure AD DS managed domain](tutorial-create-instance.md) in the same Azure AD directory as the virtual network you wish to use. When ready, join all machines previously joined to the deleted domain to the recreated managed domain.
55-
* [Move the Azure subscription](../billing/billing-subscription-transfer.md) containing the virtual network to the same Azure AD directory as the Azure AD DS managed domain.
55+
* [Move the Azure subscription](../cost-management-billing/manage/billing-subscription-transfer.md) containing the virtual network to the same Azure AD directory as the Azure AD DS managed domain.
5656

5757
## Next steps
5858

articles/active-directory-domain-services/security-audit-events.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ To enable Azure AD DS security audit events using Azure PowerShell, complete the
122122
123123
1. Create the target resource for the security audit events.
124124
125-
* **Azure storage** - [Create a storage account using Azure PowerShell](../storage/common/storage-quickstart-create-account.md?tabs=azure-powershell)
125+
* **Azure storage** - [Create a storage account using Azure PowerShell](../storage/common/storage-account-create.md?tabs=azure-powershell)
126126
* **Azure event hubs** - [Create an event hub using Azure PowerShell](../event-hubs/event-hubs-quickstart-powershell.md). You may also need to use the [New-AzEventHubAuthorizationRule](/powershell/module/az.eventhub/new-azeventhubauthorizationrule) cmdlet to create an authorization rule that grants Azure AD DS permissions to the event hub *namespace*. The authorization rule must include the **Manage**, **Listen**, and **Send** rights.
127127
128128
> [!IMPORTANT]

articles/active-directory-domain-services/troubleshoot-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The Azure AD DS managed domain's health automatically updates itself within two
8888

8989
Azure AD DS requires an active subscription, and can't be moved to a different subscription. If the Azure subscription that the Azure AD DS managed domain was associated with is deleted, you must recreate an Azure subscription and Azure AD DS managed domain.
9090

91-
1. [Create an Azure subscription](../billing/billing-create-subscription.md).
91+
1. [Create an Azure subscription](../cost-management-billing/manage/create-subscription.md).
9292
1. [Delete the Azure AD DS managed domain](delete-aadds.md) from your existing Azure AD directory.
9393
1. [Create a replacement Azure AD DS managed domain](tutorial-create-instance.md).
9494

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure MFA versions and consumption plans - Azure Active Directory
3-
description: Information about the Multi-factor Authentication client and the different methods and versions available.
3+
description: Information about the Multi-factor Authentication client and the different methods and versions available.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -28,7 +28,7 @@ The following table describes the differences between versions of multi-factor a
2828

2929
| Version | Description |
3030
| --- | --- |
31-
| Free option | Customers who are utilizing the free benefits of Azure AD can use [security defaults](../conditional-access/concept-conditional-access-security-defaults.md) to enable multi-factor authentication in their environment. |
31+
| Free option | Customers who are utilizing the free benefits of Azure AD can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication in their environment. |
3232
| Multi-Factor Authentication for Office 365 | This version is managed from the Office 365 or Microsoft 365 portal. Administrators can [secure Office 365 resources with two-step verification](https://support.office.com/article/Set-up-multi-factor-authentication-for-Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6). This version is part of an Office 365 subscription. |
3333
| Multi-Factor Authentication for Azure AD Administrators | Users assigned the Azure AD Global Administrator role in Azure AD tenants can enable two-step verification at no additional cost. |
3434
| Azure Multi-Factor Authentication | Often referred to as the "full" version, Azure Multi-Factor Authentication offers the richest set of capabilities. It provides additional configuration options via the [Azure portal](https://portal.azure.com), advanced reporting, and support for a range of on-premises and cloud applications. Azure Multi-Factor Authentication is a feature of [Azure Active Directory Premium](https://www.microsoft.com/cloud-platform/azure-active-directory-features) and [Microsoft 365 Business](https://www.microsoft.com/microsoft-365/business). |
@@ -44,7 +44,7 @@ The following table provides a list of the features that are available in the va
4444
> This comparison table discusses the features that are part of each version of Multi-Factor Authentication. If you have the full Azure Multi-Factor Authentication service, some features may not be available depending on whether you use [MFA in the cloud or MFA on-premises](concept-mfa-whichversion.md).
4545
>
4646
47-
| Feature | Multi-Factor Authentication for Office 365 | Multi-Factor Authentication for Azure AD Administrators | Azure Multi-Factor Authentication | Security defaults |
47+
| Feature | Multi-Factor Authentication for Office 365 | Multi-Factor Authentication for Azure AD Administrators | Azure Multi-Factor Authentication | Security defaults |
4848
| --- |:---:|:---:|:---:|:---:|
4949
| Protect Azure AD admin accounts with MFA ||● (Azure AD Global Administrator accounts only) |||
5050
| Mobile app as a second factor |||||

articles/active-directory/authentication/concept-sspr-customization.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@ Self-service password reset users have a "Contact your administrator" link avail
4040

4141
The contact email is sent to the following recipients in the following order:
4242

43-
1. If the **password administrator** role is assigned, administrators with this role are notified.
44-
2. If no password administrators are assigned, then administrators with the **user administrator** role are notified.
45-
3. If neither of the previous roles are assigned, then the **global administrators** are notified.
43+
1. If the **helpdesk administrator** role or **password administrator** role is assigned, administrators with these roles are notified.
44+
1. If no helpdesk administrators or password administrator are assigned, then administrators with the **user administrator** role are notified.
45+
1. If none of the previous roles are assigned, then the **global administrators** are notified.
4646

4747
In all cases, a maximum of 100 recipients are notified.
4848

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 12/10/2019
9+
ms.date: 01/14/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -30,15 +30,17 @@ More information about emergency access accounts and why they are important can
3030

3131
## Typical policies deployed by organizations
3232

33-
* [Require MFA for administrators](howto-conditional-access-policy-admin-mfa.md)
34-
* [Require MFA for Azure management](howto-conditional-access-policy-azure-management.md)
35-
* [Require MFA for all users](howto-conditional-access-policy-all-users-mfa.md)
36-
* [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)
33+
* [Require MFA for administrators](howto-conditional-access-policy-admin-mfa.md)\*
34+
* [Require MFA for Azure management](howto-conditional-access-policy-azure-management.md)\*
35+
* [Require MFA for all users](howto-conditional-access-policy-all-users-mfa.md)\*
36+
* [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
3737
* [Risk-based Conditional Access (Requires Azure AD Premium P2)](howto-conditional-access-policy-risk.md)
3838
* [Require trusted location for MFA registration](howto-conditional-access-policy-registration.md)
3939
* [Block access by location](howto-conditional-access-policy-location.md)
4040
* [Require compliant device](howto-conditional-access-policy-compliant-device.md)
4141

42+
\* These four policies when configured together, would mimic functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
43+
4244
## Next steps
4345

4446
- [Simulate sign in behavior using the Conditional Access What If tool.](troubleshoot-conditional-access-what-if.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-location.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ With the location condition in Conditional Access, you can control access to you
2727
1. Give your location a name.
2828
1. Choose **IP ranges** if you know the specific externally accessible IPv4 address ranges that make up that location or **Countries/Regions**.
2929
1. Provide the **IP ranges** or select the **Countries/Regions** for the location you are specifying.
30-
* If you chose Countries/Regions, you can optionally choose to include unknown areas.
30+
* If you choose Countries/Regions, you can optionally choose to include unknown areas.
3131
1. Choose **Save**
3232

3333
More information about the location condition in Conditional Access can be found in the article,

articles/active-directory/develop/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@
8282
href: tutorial-v2-windows-uwp.md
8383
- name: Windows Desktop .NET
8484
href: tutorial-v2-windows-desktop.md
85+
- name: Use shared-device mode in your Android app
86+
href: tutorial-v2-shared-device-mode.md
8587
- name: Daemon apps
8688
items:
8789
- name: ASP.NET daemon web app
@@ -208,6 +210,8 @@
208210
href: scenario-mobile-app-configuration.md
209211
- name: Mobile platforms specific config
210212
items:
213+
- name: Shared device mode for Android devices
214+
href: shared-device-mode.md
211215
- name: Xamarin Android
212216
href: msal-net-xamarin-android-considerations.md
213217
- name: System browser on Android

0 commit comments

Comments
 (0)