Skip to content

Commit 0d7f52c

Browse files
committed
Merge branch 'main' into release-ga-apim-graphql-resolvers
2 parents d7f8f67 + 1dbc4a0 commit 0d7f52c

File tree

199 files changed

+3618
-2360
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

199 files changed

+3618
-2360
lines changed

.openpublishing.redirection.defender-for-cloud.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -804,6 +804,11 @@
804804
"source_path_from_root": "/articles/defender-for-cloud/supported-machines-endpoint-solutions-clouds-servers.md",
805805
"redirect_url": "/azure/defender-for-cloud/support-matrix-defender-for-servers",
806806
"redirect_document_id": true
807+
},
808+
{
809+
"source_path_from_root": "/articles/defender-for-cloud/faq-azure-monitor-logs.yml",
810+
"redirect_url": "/azure/defender-for-cloud/faq-data-collection-agents",
811+
"redirect_document_id": true
807812
}
808813
]
809814
}

.openpublishing.redirection.defender-for-iot.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-work-with-device-notifications.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#manage-device-notifications-from-an-ot-sensor-device-map",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-view-information-per-zone.md",
10+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#view-a-device-map-for-a-specific-zone",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-training-sessions.md",
515
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-ninja-training/ba-p/2428899",

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 03/01/2023
4+
ms.date: 03/06/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -30,6 +30,20 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
3030

3131
- [Migrate applications using header-based authentication to Azure Active Directory B2C with Grit's app proxy](partner-grit-app-proxy.md)
3232
- [Configure Grit's biometric authentication with Azure Active Directory B2C](partner-grit-authentication.md)
33+
- [Create and run your own custom policies in Azure Active Directory B2C](custom-policies-series-overview.md)
34+
- [Write your first Azure Active Directory B2C custom policy - Hello World!](custom-policies-series-hello-world.md)
35+
- [Collect and manipulate user inputs by using Azure AD B2C custom policy](custom-policies-series-collect-user-input.md)
36+
- [Validate user inputs by using Azure Active Directory B2C custom policy](custom-policies-series-validate-user-input.md)
37+
- [Create branching in user journey by using Azure Active Directory B2C custom policy](custom-policies-series-branch-user-journey.md)
38+
- [Validate custom policy files by using TrustFrameworkPolicy schema](custom-policies-series-install-xml-extensions.md)
39+
- [Call a REST API by using Azure Active Directory B2C custom policy](custom-policies-series-call-rest-api.md)
40+
- [Create and read a user account by using Azure Active Directory B2C custom policy](custom-policies-series-store-user.md)
41+
- [Set up a sign-up and sign-in flow by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in.md)
42+
- [Set up a sign-up and sign-in flow with a social account by using Azure Active Directory B2C custom policy](custom-policies-series-sign-up-or-sign-in-federation.md)
43+
- [Manage administrator accounts in Azure Active Directory B2C](tenant-management-manage-administrator.md)
44+
- [Manage emergency access accounts in Azure Active Directory B2C](tenant-management-emergency-access-account.md)
45+
- [Review tenant creation permission in Azure Active Directory B2C](tenant-management-check-tenant-creation-permission.md)
46+
- [Find tenant name and tenant ID in Azure Active Directory B2C](tenant-management-read-tenant-name.md)
3347

3448
### Updated articles
3549

articles/active-directory-domain-services/password-policy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,13 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/29/2023
13+
ms.date: 03/06/2023
1414
ms.author: justinha
1515

1616
---
1717
# Password and account lockout policies on Azure Active Directory Domain Services managed domains
1818

19-
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.
19+
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific users or groups.
2020

2121
This article shows you how to create and configure a fine-grained password policy in Azure AD DS using the Active Directory Administrative Center.
2222

@@ -110,15 +110,15 @@ To create a custom password policy, you use the Active Directory Administrative
110110

111111
![Select the users and groups to apply the password policy to](./media/password-policy/fgpp-applies-to.png)
112112

113-
1. Password policies can only be applied to groups. In the **Locations** dialog, expand the domain name, such as *aaddscontoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
113+
1. In the **Locations** dialog, expand the domain name, such as *aaddscontoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
114114

115115
![Select the OU that the group belongs to](./media/password-policy/fgpp-container.png)
116116

117-
1. Type the name of the group you wish to apply the policy to, then select **Check Names** to validate that the group exists.
117+
1. Type the name of the user or group you wish to apply the policy to. Select **Check Names** to validate the account.
118118

119119
![Search for and select the group to apply FGPP](./media/password-policy/fgpp-apply-group.png)
120120

121-
1. With the name of the group you selected now displayed in **Directly Applies To** section, select **OK** to save your custom password policy.
121+
1. Click **OK** to save your custom password policy.
122122

123123
## Next steps
124124

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about deployment considerations and strategy for successful i
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: how-to
7-
ms.date: 01/29/2023
7+
ms.date: 03/06/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -187,7 +187,7 @@ If the user does not have a backup method available, you can:
187187

188188
- Provide them a Temporary Access Pass so that they can manage their own authentication methods. You can also provide a Temporary Access Pass to enable temporary access to resources.
189189
- Update their methods as an administrator. To do so, select the user in the Azure portal, then select Authentication methods and update their methods.
190-
User communications
190+
191191

192192
## Plan integration with on-premises systems
193193

articles/active-directory/devices/howto-vm-sign-in-azure-ad-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Ensure that your client meets the following requirements:
107107
- TCP connectivity from the client to either the public or private IP address of the VM. (ProxyCommand or SSH forwarding to a machine with connectivity also works.)
108108

109109
> [!IMPORTANT]
110-
> SSH clients based on PuTTY don't support OpenSSH certificates and can't be used to log in with Azure AD OpenSSH certificate-based authentication.
110+
> SSH clients based on PuTTY now supports OpenSSH certificates and can be used to log in with Azure AD OpenSSH certificate-based authentication.
111111
112112
## Enable Azure AD login for a Linux VM in Azure
113113

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure-graph.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: how-to
1110
ms.date: 02/27/2023
1211
ms.author: rolyon

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: how-to
1110
ms.date: 02/06/2023
1211
ms.author: rolyon

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: overview
1110
ms.date: 02/22/2023
1211
ms.author: rolyon

articles/active-directory/multi-tenant-organizations/cross-tenant-synchronization-topology.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ author: rolyon
66
manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
9-
ms.subservice: multi-tenant-organizations
109
ms.topic: conceptual
1110
ms.date: 01/23/2023
1211
ms.author: rolyon

0 commit comments

Comments
 (0)