Skip to content

Commit 0dc69e0

Browse files
authored
Merge pull request #189392 from MicrosoftDocs/main
2/22 PM Publish
2 parents f0905ab + 6b1809f commit 0dc69e0

File tree

135 files changed

+1066
-2014
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

135 files changed

+1066
-2014
lines changed

.openpublishing.redirection.json

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19830,9 +19830,9 @@
1983019830
"redirect_document_id": false
1983119831
},
1983219832
{
19833-
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-app-service.md",
19834-
"redirect_url": "/azure/machine-learning/how-to-deploy-app-service",
19835-
"redirect_document_id": true
19833+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-app-service.md",
19834+
"redirect_url": "/azure/machine-learning/how-to-deploy-managed-online-endpoints",
19835+
"redirect_document_id": false
1983619836
},
1983719837
{
1983819838
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-azure-container-instance.md",
@@ -19859,6 +19859,11 @@
1985919859
"redirect_url": "/azure/machine-learning/how-to-deploy-and-where",
1986019860
"redirect_document_id": false
1986119861
},
19862+
{
19863+
"source_path_from_root": "/articles/machine-learning/how-to-homomorphic-encryption-seal.md",
19864+
"redirect_url": "/azure/machine-learning/",
19865+
"redirect_document_id": false
19866+
},
1986219867
{
1986319868
"source_path_from_root": "/articles/machine-learning/service/concept-accelerate-with-fpgas.md",
1986419869
"redirect_url": "/azure/machine-learning/how-to-deploy-fpga-web-service",
@@ -19870,9 +19875,14 @@
1987019875
"redirect_document_id": true
1987119876
},
1987219877
{
19873-
"source_path_from_root": "/articles/machine-learning/service/how-to-deploy-functions.md",
19874-
"redirect_url": "/azure/machine-learning/how-to-deploy-functions",
19875-
"redirect_document_id": true
19878+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-functions.md",
19879+
"redirect_url": "/azure/machine-learning/how-to-deploy-managed-online-endpoints",
19880+
"redirect_document_id": false
19881+
},
19882+
{
19883+
"source_path_from_root": "/articles/machine-learning/how-to-deploy-no-code-deployment.md",
19884+
"redirect_url": "/azure/machine-learning/how-to-deploy-mlflow-models-online-endpoints",
19885+
"redirect_document_id": false
1987619886
},
1987719887
{
1987819888
"source_path_from_root": "/articles/machine-learning/service/concept-accelerate-inferencing-with-gpus.md",

.openpublishing.redirection.media-services.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -629,6 +629,11 @@
629629
"source_path_from_root": "/articles/media-services/latest/asset-create-asset-upload-portal-quickstart.md",
630630
"redirect_url": "/azure/media-services/latest/video-on-demand-simple-portal-quickstart",
631631
"redirect_document_id": true
632+
},
633+
{
634+
"source_path_from_root": "/articles/media-services/latest/architecture-design-multi-drm-system.md",
635+
"redirect_url": "/azure/media-services/latest/drm-content-protection-concept",
636+
"redirect_document_id": true
632637
},
633638
{
634639
"source_path_from_root": "/articles/media-services/latest/latest/questions-collection.md",

articles/active-directory-b2c/partner-f5.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,7 @@ The next attempt at connecting to the application should take you straight to th
379379

380380
Failure to access the protected application could be down to any number of potential factors, including a misconfiguration.
381381

382-
- BIG-IP logs are a great source of information for isolating all authentication and SSO issues. If troubleshooting you should increase the log verbosity level.
382+
BIG-IP logs are a great source of information for isolating all authentication and SSO issues. If troubleshooting you should increase the log verbosity level.
383383

384384
1. Go to **Access Policy** > **Overview** > **Event Logs** > **Settings**.
385385

@@ -424,6 +424,6 @@ Exact root cause is still being investigated by F5 engineering, but issue appear
424424

425425
You should now see the Key (JWT) field populated with the key ID (KID) of the token signing certificate provided through the OpenID URI metadata.
426426

427-
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Apply those settings and select **Apply** again to refresh the access profile list.
427+
5. Finally, select the yellow **Apply Access Policy** option in the top left-hand corner, located next to the F5 logo. Then select **Apply** again to refresh the access profile list.
428428

429429
See F5’s guidance for more [OAuth client and resource server troubleshooting tips](https://techdocs.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-sso-13-0-0/37.html#GUID-774384BC-CF63-469D-A589-1595D0DDFBA2)

articles/active-directory-domain-services/faqs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,9 +85,9 @@ sections:
8585
No. A managed domain resource forest supports up to five one-way outbound forest trusts to on-premises forests.
8686
8787
- question: |
88-
Why can't I see the **Trusts** menu?
88+
Why can't I see the Trusts menu?
8989
answer: |
90-
If you don't see the **Trusts** menu option, check under **Properties** for the *Forest type*. Only *Resource* forests can create trusts. If the forest type is *User*, you can't create trusts. There's currently no way to change the forest type of a managed domain. You need to delete and recreate the managed domain as a resource forest.
90+
If you don't see the **Trusts** menu option, check under **Properties** for the **Forest type**. Only **Resource** forests can create trusts. If the forest type is **User**, you can't create trusts. There's currently no way to change the forest type of a managed domain. You need to delete and recreate the managed domain as a resource forest.
9191
9292
- question: |
9393
Can I move a managed domain?

articles/active-directory/authentication/how-to-mfa-microsoft-managed.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/11/2021
9+
ms.date: 02/22/2022
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -26,7 +26,7 @@ The option to let Azure AD manage the setting is a convenient way for an organiz
2626

2727
## Settings that can be Microsoft managed
2828

29-
The following table lists settings that can be set to Microsoft managed and whether it is enabled or disabled.
29+
The following table list each setting that can be set to Microsoft managed and whether that setting is enabled or disabled by default.
3030

3131
| Setting | Configuration |
3232
|---------------------------------------------------------------------------------------------------------------------------------|---------------|

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/22/2021
9+
ms.date: 02/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -25,7 +25,7 @@ Azure AD can issue Kerberos ticket-granting tickets (TGTs) for one or more of yo
2525

2626
An Azure AD Kerberos Server object is created in your on-premises Active Directory instance and then securely published to Azure Active Directory. The object isn't associated with any physical servers. It's simply a resource that can be used by Azure Active Directory to generate Kerberos TGTs for your Active Directory domain.
2727

28-
:::image type="Image" source="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png" alt-text="Diagram showing how to get a T G T from Azure AD and Active Directory Domain Services." lightbox="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png":::
28+
:::image type="Image" source="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png" alt-text="Diagram showing how to get a TGT from Azure AD and Active Directory Domain Services." lightbox="./media/howto-authentication-passwordless-on-premises/fido2-ticket-granting-ticket-exchange-process.png":::
2929

3030
1. A user signs in to a Windows 10 device with an FIDO2 security key and authenticates to Azure AD.
3131
1. Azure AD checks the directory for a Kerberos Server key that matches the user's on-premises Active Directory domain.
@@ -107,7 +107,7 @@ Run the following steps in each domain and forest in your organization that cont
107107
$domain = "contoso.corp.com"
108108
109109
# Enter an Azure Active Directory global administrator username and password.
110-
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Domain Admins group for a domain and a member of the Enterprise Admins group for a forest.'
110+
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Global Administrators group for Azure AD.'
111111
112112
# Enter a domain administrator username and password.
113113
$domainCred = Get-Credential -Message 'An Active Directory user who is a member of the Domain Admins group.'

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ metadata:
66
services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
9-
ms.topic: faq
10-
ms.date: 11/21/2019
9+
ms.topic: how-to
10+
ms.date: 02/16/2022
1111
ms.author: justinha
1212
author: justinha
1313
manager: karenhoran
@@ -31,7 +31,7 @@ sections:
3131
3232
### Is on-premises Azure AD Password Protection supported in non-public clouds?
3333
34-
On-premises Azure AD Password Protection is supported in the public cloud and the Arlington cloud. No date has been announced for availability in other clouds.
34+
On-premises Azure AD Password Protection is supported in both Azure Global and Azure Government clouds.
3535
3636
The Azure AD portal does allow modification of the on-premises-specific "Password protection for Windows Server Active Directory" configuration even in non-supported clouds; such changes will be persisted but otherwise will never take effect. Registration of on-premises proxy agents or forests is unsupported in non-supported clouds, and any such registration attempts will always fail.
3737

articles/active-directory/authentication/troubleshoot-sspr-writeback.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: troubleshooting
9-
ms.date: 08/25/2021
9+
ms.date: 02/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Troubleshoot self-service password reset writeback in Azure Active Directory
1919

20-
Azure Active Directory (Azure AD) self-service password reset (SSPR) lets users reset their passwords in the cloud. Password writeback is a feature enabled with [Azure AD Connect](../hybrid/whatis-hybrid-identity.md) that allows password changes in the cloud to be written back to an existing on-premises directory in real time.
20+
Azure Active Directory (Azure AD) self-service password reset (SSPR) lets users reset their passwords in the cloud. Password writeback is a feature enabled with [Azure AD Connect](../hybrid/whatis-hybrid-identity.md) or [cloud sync](tutorial-enable-cloud-sync-sspr-writeback.md) that allows password changes in the cloud to be written back to an existing on-premises directory in real time.
2121

2222
If you have problems with SSPR writeback, the following troubleshooting steps and common errors may help. If you can't find the answer to your problem, [our support teams are always available](#contact-microsoft-support) to assist you further.
2323

Loading
Loading

0 commit comments

Comments
 (0)