Skip to content

Commit 0bf3f9b

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents c2c7ef6 + be9fcaa commit 0bf3f9b

File tree

152 files changed

+1922
-1823
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+1922
-1823
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15155,6 +15155,11 @@
1515515155
"redirect_url": "/azure/aks/networking-overview",
1515615156
"redirect_document_id": false
1515715157
},
15158+
{
15159+
"source_path": "articles/stream-analytics/vs-code-how-to.md",
15160+
"redirect_url": "/azure/stream-analytics/vscode-explore-jobs",
15161+
"redirect_document_id": false
15162+
},
1515815163
{
1515915164
"source_path": "articles/stream-analytics/custom-deserializer.md",
1516015165
"redirect_url": "https://aka.ms/asapreview1",

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/31/2018
9+
ms.date: 05/16/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -77,8 +77,8 @@ The following table describes the password policy settings applied to user accou
7777

7878
| Property | Requirements |
7979
| --- | --- |
80-
| Characters allowed |<ul><li>A – Z</li><li>a - z</li><li>0 – 9</li> <li>@ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ‘ , . ? / \` ~ " ( ) ;</li></ul> blank space |
81-
| Characters not allowed |<ul><li>Unicode characters.</li><li>Spaces.</li><li> Cannot contain a dot character "." immediately preceding the "\@\" symbol”.</li></ul> |
80+
| Characters allowed |<ul><li>A – Z</li><li>a - z</li><li>0 – 9</li> <li>@ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ‘ , . ? / \` ~ " ( ) ;</li> <li>blank space</li></ul> |
81+
| Characters not allowed |<ul><li>Unicode characters.</li><li> Cannot contain a dot character "." immediately preceding the "\@\" symbol”.</li></ul> |
8282
| Password restrictions |<ul><li>A minimum of 8 characters and a maximum of 256 characters.</li><li>Requires three out of four of the following:<ul><li>Lowercase characters.</li><li>Uppercase characters.</li><li>Numbers (0-9).</li><li>Symbols (see the previous password restrictions).</li></ul></li></ul> |
8383
| Password expiry duration |<ul><li>Default value: **90** days.</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell.</li></ul> |
8484
| Password expiry notification |<ul><li>Default value: **14** days (before password expires).</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet.</li></ul> |
@@ -95,7 +95,6 @@ This guidance applies to other providers, such as Intune and Office 365, which a
9595

9696
> [!NOTE]
9797
> Only passwords for user accounts that are not synchronized through directory synchronization can be configured to not expire. For more information about directory synchronization, see [Connect AD with Azure AD](https://docs.microsoft.com/azure/active-directory/connect/active-directory-aadconnect).
98-
>
9998
10099
## Set or check the password policies by using PowerShell
101100

@@ -153,7 +152,7 @@ To get started, you need to [download and install the Azure AD PowerShell module
153152
```
154153

155154
> [!WARNING]
156-
> Passwords set to `-PasswordPolicies DisablePasswordExpiration` still age based on the `pwdLastSet` attribute. If you set the user passwords to never expire and then 90+ days go by, the passwords expire. Based on the `pwdLastSet` attribute, if you change the expiration to `-PasswordPolicies None`, all passwords that have a `pwdLastSet` older than 90 days require the user to change them the next time they sign in. This change can affect a large number of users.
155+
> Passwords set to `-PasswordPolicies DisablePasswordExpiration` still age based on the `pwdLastSet` attribute. If you set the user passwords to never expire and then 90+ days go by, the passwords expire. Based on the `pwdLastSet` attribute, if you change the expiration to `-PasswordPolicies None`, all passwords that have a `pwdLastSet` older than 90 days require the user to change them the next time they sign in. This change can affect a large number of users.
157156
158157
## Next steps
159158

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,8 @@ Password writeback provides:
3838
* **Supports password writeback when an admin resets them from the Azure portal**: Whenever an admin resets a user’s password in the [Azure portal](https://portal.azure.com), if that user is federated or password hash synchronized, the password is written back to on-premises. This functionality is currently not supported in the Office admin portal.
3939
* **Doesn’t require any inbound firewall rules**: Password writeback uses an Azure Service Bus relay as an underlying communication channel. All communication is outbound over port 443.
4040

41-
> [!Note]
41+
> [!NOTE]
4242
> User accounts that exist within protected groups in on-premises Active Directory cannot be used with password writeback. Administrator accounts that exist within protected groups in on-premises AD can be used with password writeback. For more information about protected groups, see [Protected accounts and groups in Active Directory](https://technet.microsoft.com/library/dn535499.aspx).
43-
>
4443
4544
## Licensing requirements for password writeback
4645

@@ -59,7 +58,6 @@ To use password writeback, you must have one of the following licenses assigned
5958

6059
> [!WARNING]
6160
> Standalone Office 365 licensing plans *don't support "Self-Service Password Reset/Change/Unlock with on-premises writeback"* and require that you have one of the preceding plans for this functionality to work.
62-
>
6361
6462
## How password writeback works
6563

@@ -86,7 +84,6 @@ When a federated or password hash synchronized user attempts to reset or change
8684
1. If the password set operation is successful, the user is told their password has been changed.
8785
> [!NOTE]
8886
> If the user's password hash is synchronized to Azure AD by using password hash synchronization, there is a chance that the on-premises password policy is weaker than the cloud password policy. In this case, the on-premises policy is enforced. This policy ensures that your on-premises policy is enforced in the cloud, no matter if you use password hash synchronization or federation to provide single sign-on.
89-
>
9087
9188
1. If the password set operation fails, an error prompts the user to try again. The operation might fail because:
9289
* The service was down.
@@ -151,6 +148,7 @@ Passwords are written back in all the following situations:
151148
* Any administrator self-service force change password operation, for example, password expiration
152149
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com)
153150
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com)
151+
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com)
154152

155153
## Unsupported writeback operations
156154

@@ -159,11 +157,10 @@ Passwords are *not* written back in any of the following situations:
159157
* **Unsupported end-user operations**
160158
* Any end user resetting their own password by using PowerShell version 1, version 2, or the Azure AD Graph API
161159
* **Unsupported administrator operations**
162-
* Any administrator-initiated end-user password reset from the [Office management portal](https://portal.office.com)
163160
* Any administrator-initiated end-user password reset from PowerShell version 1, version 2, or the Azure AD Graph API
164161

165162
> [!WARNING]
166-
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is not supported. When changing a password on-premises do not check this option.
163+
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is not supported. When changing a password on-premises do not check this option.
167164
168165
## Next steps
169166

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/1/2019
9+
ms.date: 05/16/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo

articles/active-directory/conditional-access/technical-reference.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,6 @@ You can assign a conditional access policy to the following cloud apps from Micr
4646
- Microsoft Application Insights Analytics
4747
- Microsoft Azure Information Protection - [Learn more](https://docs.microsoft.com/azure/information-protection/faqs#i-see-azure-information-protection-is-listed-as-an-available-cloud-app-for-conditional-accesshow-does-this-work)
4848
- Microsoft Azure Management - [Learn more](https://docs.microsoft.com/azure/role-based-access-control/conditional-access-azure-management)
49-
- Microsoft Azure RemoteApp
5049
- Microsoft Azure Subscription Management
5150
- Microsoft Cloud App Security
5251
- Microsoft Commerce Tools Access Control Portal
@@ -165,7 +164,6 @@ This setting has an impact on access attempts made from the following mobile app
165164

166165
| Client apps | Target Service | Platform |
167166
| --- | --- | --- |
168-
| Azure Remote app | Azure Remote App service | Windows 10, Windows 8.1, Windows 7, iOS, Android, and macOS |
169167
| Dynamics CRM app | Dynamics CRM | Windows 10, Windows 8.1, iOS, and Android |
170168
| Mail/Calendar/People app, Outlook 2016, Outlook 2013 (with modern authentication)| Office 365 Exchange Online | Windows 10 |
171169
| MFA and location policy for apps. Device based policies are not supported.| Any My Apps app service| Android and iOS |

articles/active-directory/conditional-access/terms-of-use.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: conceptual
1414
ms.subservice: compliance
15-
ms.date: 04/03/2019
15+
ms.date: 05/15/2019
1616
ms.author: rolyon
1717

1818
ms.collection: M365-identity-device-management
@@ -380,6 +380,9 @@ A: You can [review previously accepted Terms of use](#how-users-can-review-their
380380
**Q: What happens if I'm also using Intune terms and conditions?**<br />
381381
A: If you have configured both Azure AD Terms of use and [Intune terms and conditions](/intune/terms-and-conditions-create), the user will be required to accept both. For more information, see the [Choosing the right Terms solution for your organization blog post](https://go.microsoft.com/fwlink/?linkid=2010506&clcid=0x409).
382382

383+
**Q: What endpoints does the Terms of use service use for authentication?**<br />
384+
A: Terms of use utilizes the following endpoints for authentication: https://tokenprovider.termsofuse.identitygovernance.azure.com and https://account.activedirectory.windowsazure.com. If your organization has an allow list of URLs for enrollment, you will need to add these endpoints to your allow list, along with the Azure AD endpoints for sign in.
385+
383386
## Next steps
384387

385388
- [Quickstart: Require terms of use to be accepted before accessing cloud apps](require-tou.md)

0 commit comments

Comments
 (0)