Skip to content

Commit 0e18103

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into diberry/1108-dashboard-meta-description
2 parents d2f6ee8 + 46a8810 commit 0e18103

File tree

457 files changed

+2213
-1837
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

457 files changed

+2213
-1837
lines changed

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -206,6 +206,9 @@ function Set-MfaState {
206206
Get-MsolUser -All | Set-MfaState -State Disabled
207207
```
208208

209+
> [!NOTE]
210+
> We recently changed the behavior and PowerShell script above accordingly. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
211+
209212
## Plan Conditional Access policies
210213

211214
To plan your Conditional Access policy strategy, which will determine when MFA and other controls are required, refer to [What is Conditional Access in Azure Active Directory?](../conditional-access/overview.md).

articles/active-directory/develop/quickstart-v2-android.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -46,11 +46,11 @@ Applications must be represented by an app object in Azure Active Directory so t
4646
> > ![Already configured](media/quickstart-v2-android/green-check.png) Your application is configured with these attributes
4747
>
4848
> ### Step 2: Download the project
49-
> * [Download the code sample](https://github.com/Azure-Samples/ms-identity-android-java)
49+
> * [Download the code sample](https://github.com/Azure-Samples/ms-identity-android-java/archive/master.zip)
5050
>
5151
> ### Step 3: Configure your project
5252
> 1. Extract and open the Project in Android Studio.
53-
> 2. Inside app > src > main > res > raw, open auth_config_multiple_account.json and replace it with the following code:
53+
> 2. Inside **app** > **src** > **main** > **res** > **raw**, open **auth_config_multiple_account.json** and replace it with the following code:
5454
> ```javascript
5555
> {
5656
> "client_id" : "Enter_the_Application_Id_Here",
@@ -71,7 +71,7 @@ Applications must be represented by an app object in Azure Active Directory so t
7171
> ```
7272
7373
> [!div class="sxs-lookup" renderon="portal"]
74-
> 3. Inside app > src > main > res > raw, open auth_config_single_account.json and replace it with the following code:
74+
> 3. Inside **app** > **src** > **main** > **res** > **raw**, open **auth_config_single_account.json** and replace it with the following code:
7575
> ```javascript
7676
> {
7777
> "client_id" : "Enter_the_Application_Id_Here",
@@ -95,22 +95,22 @@ Applications must be represented by an app object in Azure Active Directory so t
9595
> 4. Inside **app** > **src** > **main**, open **AndroidManifest.xml**.
9696
> 5. In the **manifest\application** node, replace the **<activity android:name="com.microsoft.identity.client.BrowserTabActivity">** node with the following:
9797
> ```xml
98-
> <!--Intent filter to catch Microsoft's callback after Sign In-->
99-
> <activity android:name="com.microsoft.identity.client.BrowserTabActivity">
100-
> <intent-filter>
101-
> <action android:name="android.intent.action.VIEW" />
102-
> <category android:name="android.intent.category.DEFAULT" />
103-
> <category android:name="android.intent.category.BROWSABLE" />
104-
> <!--
98+
> &lt;!--Intent filter to catch Microsoft's callback after Sign In--&gt;
99+
> &lt;activity android:name=&quot;com.microsoft.identity.client.BrowserTabActivity&quot;&gt;
100+
> &lt;intent-filter&gt;
101+
> &lt;action android:name=&quot;android.intent.action.VIEW&quot; /&gt;
102+
> &lt;category android:name=&quot;android.intent.category.DEFAULT&quot; /&gt;
103+
> &lt;category android:name=&quot;android.intent.category.BROWSABLE&quot; /&gt;
104+
> &lt;!--
105105
> Add in your scheme/host from registered redirect URI
106-
> note that the leading "/" is required for android:path
107-
> -->
108-
> <data android:scheme="msauth"
109-
> android:host="Enter_the_Package_Name_here"
110-
> android:path="Enter_the_Signature_Hash_here"
111-
> android:scheme = "msauth" />
112-
> </intent-filter>
113-
> </activity>
106+
> note that the leading &quot;/&quot; is required for android:path
107+
> --&gt;
108+
> &lt;data android:scheme=&quot;msauth&quot;
109+
> android:host=&quot;Enter_the_Package_Name_Here&quot;
110+
> android:path=&quot;Enter_the_Signature_Hash_Here&quot;
111+
> android:scheme = &quot;msauth&quot; /&gt;
112+
> &lt;/intent-filter&gt;
113+
> &lt;/activity&gt;
114114
> ```
115115
> 6. Run the app!
116116
> The sample app starts on the **Single Account Mode** screen. A default scope, **user.read**, is provided by default, which is used when reading your own profile data during the Microsoft Graph API call. The URL for the Microsoft Graph API call is provided by default. You can change both of these if you wish.
@@ -133,7 +133,7 @@ Applications must be represented by an app object in Azure Active Directory so t
133133
> [!div renderon="docs"]
134134
> ## Step 1: Get the sample app
135135
>
136-
> [Clone the code](https://github.com/Azure-Samples/ms-identity-android-java.git).
136+
> [Download the code](https://github.com/Azure-Samples/ms-identity-android-java/archive/master.zip).
137137
>
138138
> ## Step 2: Run the sample app
139139
>

articles/active-directory/devices/azureadjoin-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ When you're using AD FS, you need to enable the following WS-Trust endpoints:
7676
If your identity provider does not support these protocols, Azure AD join does not work natively. Beginning with Windows 10 1809, your users can sign in to an Azure AD joined device with a SAML-based identity provider through [web sign-in on Windows 10](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1809#web-sign-in-to-windows-10). Currently, web sign-in is a preview feature and is not recommended for production deployments.
7777

7878
>[!NOTE]
79-
> Currently, Azure AD join does not work with [AD FS 2019 configured with external authentication providers as the primary authentication method](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/additional-authentication-methods-ad-fs#enable-external-authentication-methods-as-primary). Azure AD join defaults to password authentication as the primary method, which results in authentication failures in this scenario
79+
> Currently, Azure AD join does not work with [AD FS 2019 configured with external authentication providers as the primary authentication method](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/additional-authentication-methods-ad-fs#enable-external-authentication-methods-as-primary). Azure AD join defaults to password authentication as the primary method, which results in authentication failures in this scenario
8080
8181

8282
### Smartcards and certificate-based authentication

articles/active-directory/devices/hybrid-azuread-join-federated-domains.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ A federated environment should have an identity provider that supports the follo
4040
`/adfs/services/trust/13/certificatemixed`
4141

4242
> [!WARNING]
43-
> Both **adfs/services/trust/2005/windowstransport** or **adfs/services/trust/13/windowstransport** should be enabled as intranet facing endpoints only and must NOT be exposed as extranet facing endpoints through the Web Application Proxy. To learn more on how to disable WS-Trust Windows endpoints, see [Disable WS-Trust Windows endpoints on the proxy](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#disable-ws-trust-windows-endpoints-on-the-proxy-ie-from-extranet). You can see what endpoints are enabled through the AD FS management console under **Service** > **Endpoints**.
43+
> Both **adfs/services/trust/2005/windowstransport** or **adfs/services/trust/13/windowstransport** should be enabled as intranet facing endpoints only and must NOT be exposed as extranet facing endpoints through the Web Application Proxy. To learn more on how to disable WS-Trust Windows endpoints, see [Disable WS-Trust Windows endpoints on the proxy](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#disable-ws-trust-windows-endpoints-on-the-proxy-ie-from-extranet). You can see what endpoints are enabled through the AD FS management console under **Service** > **Endpoints**.
4444
4545
In this tutorial, you learn how to configure hybrid Azure AD join for Active Directory domain-joined computers devices in a federated environment by using AD FS.
4646

articles/active-directory/devices/hybrid-azuread-join-manual.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ When you're using AD FS, you need to enable the following WS-Trust endpoints
184184
- `/adfs/services/trust/13/certificatemixed`
185185

186186
> [!WARNING]
187-
> Both **adfs/services/trust/2005/windowstransport** or **adfs/services/trust/13/windowstransport** should be enabled as intranet facing endpoints only and must NOT be exposed as extranet facing endpoints through the Web Application Proxy. To learn more on how to disable WS-Trust Windows endpoints, see [Disable WS-Trust Windows endpoints on the proxy](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#disable-ws-trust-windows-endpoints-on-the-proxy-ie-from-extranet). You can see what endpoints are enabled through the AD FS management console under **Service** > **Endpoints**.
187+
> Both **adfs/services/trust/2005/windowstransport** or **adfs/services/trust/13/windowstransport** should be enabled as intranet facing endpoints only and must NOT be exposed as extranet facing endpoints through the Web Application Proxy. To learn more on how to disable WS-Trust Windows endpoints, see [Disable WS-Trust Windows endpoints on the proxy](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#disable-ws-trust-windows-endpoints-on-the-proxy-ie-from-extranet). You can see what endpoints are enabled through the AD FS management console under **Service** > **Endpoints**.
188188
189189
> [!NOTE]
190190
>If you don’t have AD FS as your on-premises federation service, follow the instructions from your vendor to make sure they support WS-Trust 1.3 or 2005 endpoints and that these are published through the Metadata Exchange file (MEX).

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ As a first planning step, you should review your environment and determine wheth
7272

7373
Hybrid Azure AD join is currently not supported if your environment consists of a single AD forest synchronizing identity data to more than one Azure AD tenant.
7474

75-
If your environment uses virtual desktop infrastructure (VDI), see [Device identity and desktop virtualization](https://docs.microsoft.com/en-us/azure/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure).
75+
If your environment uses virtual desktop infrastructure (VDI), see [Device identity and desktop virtualization](https://docs.microsoft.com/azure/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure).
7676

7777
Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support. Starting from WIndows 10 1903 release, TPMs 1.2 are not used for hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
7878

@@ -123,7 +123,7 @@ When you're using AD FS, you need to enable the following WS-Trust endpoints:
123123
`/adfs/services/trust/13/certificatemixed`
124124

125125
> [!WARNING]
126-
> Both **adfs/services/trust/2005/windowstransport** or **adfs/services/trust/13/windowstransport** should be enabled as intranet facing endpoints only and must NOT be exposed as extranet facing endpoints through the Web Application Proxy. To learn more on how to disable WS-Trust Windows endpoints, see [Disable WS-Trust Windows endpoints on the proxy](https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#disable-ws-trust-windows-endpoints-on-the-proxy-ie-from-extranet). You can see what endpoints are enabled through the AD FS management console under **Service** > **Endpoints**.
126+
> Both **adfs/services/trust/2005/windowstransport** or **adfs/services/trust/13/windowstransport** should be enabled as intranet facing endpoints only and must NOT be exposed as extranet facing endpoints through the Web Application Proxy. To learn more on how to disable WS-Trust Windows endpoints, see [Disable WS-Trust Windows endpoints on the proxy](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#disable-ws-trust-windows-endpoints-on-the-proxy-ie-from-extranet). You can see what endpoints are enabled through the AD FS management console under **Service** > **Endpoints**.
127127
128128
> [!NOTE]
129129
> Azure AD does not support smartcards or certificates in managed domains.

articles/active-directory/hybrid/how-to-connect-install-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ This page allows you to review the UPN domains present in on-premises AD DS and
9090
![Unverified domains](./media/how-to-connect-install-custom/aadsigninconfig2.png)
9191
Review every domain marked **Not Added** and **Not Verified**. Make sure those domains you use have been verified in Azure AD. Click the Refresh symbol when you have verified your domains. For more information, see [add and verify the domain](../active-directory-domains-add-azure-portal.md)
9292

93-
**UserPrincipalName** - The attribute userPrincipalName is the attribute users use when they sign in to Azure AD and Office 365. The domains used, also known as the UPN-suffix, should be verified in Azure AD before the users are synchronized. Microsoft recommends to keep the default attribute userPrincipalName. If this attribute is non-routable and cannot be verified, then it is possible to select another attribute. You can for example select email as the attribute holding the sign-in ID. Using another attribute than userPrincipalName is known as **Alternate ID**. The Alternate ID attribute value must follow the RFC822 standard. An Alternate ID can be used with password hash sync, pass-through authentication, and federation. The attribute must not be defined in Active Directory as multi-valued, even if it only has a single value. For more information on the Alternate ID, [please click here.](https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-pta-faq#does-pass-through-authentication-support-alternate-id-as-the-username-instead-of-userprincipalname)
93+
**UserPrincipalName** - The attribute userPrincipalName is the attribute users use when they sign in to Azure AD and Office 365. The domains used, also known as the UPN-suffix, should be verified in Azure AD before the users are synchronized. Microsoft recommends to keep the default attribute userPrincipalName. If this attribute is non-routable and cannot be verified, then it is possible to select another attribute. You can for example select email as the attribute holding the sign-in ID. Using another attribute than userPrincipalName is known as **Alternate ID**. The Alternate ID attribute value must follow the RFC822 standard. An Alternate ID can be used with password hash sync, pass-through authentication, and federation. The attribute must not be defined in Active Directory as multi-valued, even if it only has a single value. For more information on the Alternate ID, [please click here.](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-pta-faq#does-pass-through-authentication-support-alternate-id-as-the-username-instead-of-userprincipalname)
9494

9595
>[!NOTE]
9696
> When you enable Pass-through Authentication you must have at least one verified domain in order to continue through the wizard.

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To synchronize your password, Azure AD Connect sync extracts your password hash
2727

2828
The actual data flow of the password hash synchronization process is similar to the synchronization of user data. However, passwords are synchronized more frequently than the standard directory synchronization window for other attributes. The password hash synchronization process runs every 2 minutes. You cannot modify the frequency of this process. When you synchronize a password, it overwrites the existing cloud password.
2929

30-
The first time you enable the password hash synchronization feature, it performs an initial synchronization of the passwords of all in-scope users. You cannot explicitly define a subset of user passwords that you want to synchronize. However, if there are multiple connectors, it is possible to disable password hash sync for some connectors but not others using the [Set-ADSyncAADPasswordSyncConfiguration](https://docs.microsoft.com/en-us/azure/active-directory-domain-services/active-directory-ds-getting-started-password-sync-synced-tenant) cmdlet.
30+
The first time you enable the password hash synchronization feature, it performs an initial synchronization of the passwords of all in-scope users. You cannot explicitly define a subset of user passwords that you want to synchronize. However, if there are multiple connectors, it is possible to disable password hash sync for some connectors but not others using the [Set-ADSyncAADPasswordSyncConfiguration](https://docs.microsoft.com/azure/active-directory-domain-services/active-directory-ds-getting-started-password-sync-synced-tenant) cmdlet.
3131

3232
When you change an on-premises password, the updated password is synchronized, most often in a matter of minutes.
3333
The password hash synchronization feature automatically retries failed synchronization attempts. If an error occurs during an attempt to synchronize a password, an error is logged in your event viewer.

articles/active-directory/hybrid/how-to-connect-staged-rollout.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -113,16 +113,16 @@ Enable Seamless SSO on the AD forests using PowerShell. If you have more than
113113

114114
2. Navigate to the %programfiles%\\Microsoft Azure Active Directory Connect folder.
115115

116-
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\\AzureADSSO.psd1`.
116+
3. Import the Seamless SSO PowerShell module using this command: `Import-Module .\AzureADSSO.psd1`.
117117

118118
4. Run PowerShell as an Administrator. In PowerShell, call `New-AzureADSSOAuthenticationContext`. This command should give you a dialog box where you can enter your tenant's Global Administrator credentials.
119119

120-
5. Call `Get-AzureADSSOStatus|ConvertFrom-Json`. This command provides you the list of AD forests (look at the \"Domains\" list) on which this feature has been enabled. By default, it is set to false at the tenant level.
120+
5. Call `Get-AzureADSSOStatus | ConvertFrom-Json`. This command provides you the list of AD forests (look at the \"Domains\" list) on which this feature has been enabled. By default, it is set to false at the tenant level.
121121

122122
> **Example:**
123123
> ![Example of the Windows PowerShell output](./media/how-to-connect-staged-rollout/sr3.png)
124124
125-
6. Call `$creds=Get-Credential`. When prompted, enter the Domain Administrator credentials for the intended AD forest.
125+
6. Call `$creds = Get-Credential`. When prompted, enter the Domain Administrator credentials for the intended AD forest.
126126

127127
7. Call `Enable-AzureADSSOForest -OnPremCredentials $creds`. This command creates the AZUREADSSOACC computer account from the on-premises domain controller for this specific Active Directory forest that is required for Seamless SSO.
128128

articles/active-directory/hybrid/reference-connect-sync-attributes-synchronized.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ In this case, start with the list of attributes in this topic and identify those
5959
| company |X |X | | |
6060
| countryCode |X |X | | |
6161
| department |X |X | | |
62-
| description |X |X |X | |
62+
| description | | |X | |
6363
| displayName |X |X |X | |
6464
| dLMemRejectPerms |X |X |X | |
6565
| dLMemSubmitPerms |X |X |X | |

0 commit comments

Comments
 (0)