Skip to content

Commit 0e3f1ce

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into tamram21-1018
2 parents 94424ad + 12b4b36 commit 0e3f1ce

File tree

177 files changed

+2902
-1705
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

177 files changed

+2902
-1705
lines changed

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,11 +57,11 @@ The following information is provided to better explain the anchor attributes an
5757

5858
The anchor attribute is a unique attribute of an object type that does not change and represents that object in the ECMA Connector Host in-memory cache.
5959

60-
The distinguished name (DN) is a name that uniquely identifies an object by indicating its current location in the directory hierarchy. Or in the case of SQL, in the partition. The name is formed by concatenating the anchor attribute a the root of the directory partition.
60+
The distinguished name (DN) is a name that uniquely identifies an object by indicating its current location in the directory hierarchy. Or in the case of SQL, in the partition. The name is formed by concatenating the anchor attribute at the root of the directory partition.
6161

6262
When we think of traditional DNs in a traditional format, for say, Active Directory or LDAP, we think of something similar to:
6363

64-
CN=Lola Jacobson,CN=Users,DC=contoso,DC=com
64+
`CN=Lola Jacobson,CN=Users,DC=contoso,DC=com`
6565

6666
However, for a data source such as SQL, which is flat, not hierarchical, the DN needs to be either already present in one of the table or created from the information we provide to the ECMA Connector Host.
6767

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ In this example, users and or groups are created in an HR database connected to
9494

9595
In this example, user creation occurs in Azure AD and the Azure AD provisioning service manages automatic user provisioning to the target (SaaS) applications.
9696

97-
![Diagram that shows the user/group creation process from an on-premises H R application through the Azure A D Provisioning Service to the target S a a S applications.](./media/plan-auto-user-provisioning/cloudprovisioning.png)
97+
![Diagram that shows the user/group creation process from an on-premises H R application through the Azure A D Provisioning Service to the target S A A S applications.](./media/plan-auto-user-provisioning/cloudprovisioning.png)
9898

9999
**Description of workflow:**
100100

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ The following client apps have been confirmed to support this setting:
157157
- Nine Mail - Email & Calendar
158158

159159
> [!NOTE]
160-
> Microsoft Kaizala, Microsoft Skype for Business and Microsoft Visio do not support the **Require app protection policy** grant. If you require these apps to work, please use the **Require approved apps** grant exclusively. The use of the or clause between the two grants will not work for these three applications.
160+
> Microsoft Kaizala, Microsoft Skype for Business and Microsoft Visio do not support the **Require app protection policy** grant. If you require these apps to work, please use the **Require approved apps** grant exclusively. The use of the `or` clause between the two grants will not work for these three applications.
161161
162162
**Remarks**
163163

articles/active-directory/develop/msal-net-migration-public-client.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@ result = await context.AcquireTokenAsync(resource, clientId,
221221
// AcquireTokenByIntegratedWindowsAuth form that takes in the username
222222
223223
// Error Code: integrated_windows_auth_not_supported_managed_user
224-
// Explanation: This method relies on an a protocol exposed by Active Directory (AD). If a user was created in Azure
224+
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
225225
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
226226
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
227227
// Mitigation: Use interactive authentication

articles/active-directory/develop/scenario-desktop-acquire-token-integrated-windows-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ static async Task GetATokenForGraph()
124124
// AcquireTokenByIntegratedWindowsAuth form that takes in the username
125125
126126
// Error Code: integrated_windows_auth_not_supported_managed_user
127-
// Explanation: This method relies on an a protocol exposed by Active Directory (AD). If a user was created in Azure
127+
// Explanation: This method relies on a protocol exposed by Active Directory (AD). If a user was created in Azure
128128
// Active Directory without AD backing ("managed" user), this method will fail. Users created in AD and backed by
129129
// AAD ("federated" users) can benefit from this non-interactive method of authentication.
130130
// Mitigation: Use interactive authentication

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 06/28/2019
9+
ms.date: 10/26/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -31,7 +31,7 @@ With an Azure AD joined device, your users already have an SSO experience to the
3131

3232
Azure AD joined devices have no knowledge about your on-premises AD environment because they aren't joined to it. However, you can provide additional information about your on-premises AD to these devices with Azure AD Connect.
3333

34-
If you have a hybrid environment, with both Azure AD and on-premises AD, it is likely that you already have Azure AD Connect deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, Azure AD Connect synchronizes on-premises user and domain information to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
34+
If you have a hybrid environment, with both Azure AD and on-premises AD, it is likely that you already have Azure AD Connect or Azure AD Connect cloud sync deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, on-premises user and domain information is synchronized to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
3535

3636
1. Azure AD sends the details of the user's on-premises domain back to the device, along with the [Primary Refresh Token](concept-primary-refresh-token.md)
3737
1. The local security authority (LSA) service enables Kerberos and NTLM authentication on the device.

articles/active-directory/external-identities/one-time-passcode.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 10/21/2021
10+
ms.date: 10/26/2021
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -154,7 +154,11 @@ For more information about current limitations, see [Azure US Government clouds]
154154

155155
**Why do I still see “Automatically enable email one-time passcode for guests starting October 2021” selected in my email one-time passcode settings?**
156156

157-
Due to our deployment schedules, we will start rolling out the change to enable email one-time passcode by default globally on November 1, 2021. Until then, you might still see “Automatically enable email one-time passcode for guests starting October 2021” selected in my email one-time passcode settings.
157+
Due to our deployment schedules, we will start rolling out the change to enable email one-time passcode by default globally on November 1, 2021. Until then, you might still see “Automatically enable email one-time passcode for guests starting October 2021” selected in your email one-time passcode settings.
158+
159+
**What happens to my existing guest users if I enable email one-time passcode?**
160+
161+
Your existing guest users will not be affected if you enable email one-time passcode, as your existing users are already past the point of redemption. Enabling email one-time passcode will only affect future redemption activities where new guest users are redeeming into the tenant.
158162

159163
**What is the user experience for guests during global rollout?**
160164

@@ -172,20 +176,20 @@ Before the change is rolled out to your region, guests will see the following be
172176

173177
- If a guest has an existing unmanaged Azure AD account, they'll continue signing in with their unmanaged Azure AD account.
174178
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll continue signing in with their unmanaged Azure AD account.
175-
- If a guest doesn't have an existing unmanaged Azure AD account, they'll redeem using an email one-time passcode link, but they may get a sign-in error if they're not added to the Azure portal in advance.
179+
- If a guest doesn't have an existing unmanaged Azure AD account, they'll redeem using an unmanaged Azure AD account, but they may get a sign-in error if they're not added to the Azure portal in advance if redeeming on a direct application link.
176180

177181
After the change is rolled out to your region, guests will see the following behavior.
178182

179183
- With email one-time passcode enabled:
180184

181-
- If a guest has an existing unmanaged Azure AD account, they'll use email one-time passcode to redeem and sign in going forward.
185+
- If a guest has an existing unmanaged Azure AD account, they'll continue signing in with their unmanaged Azure AD account.
182186
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll use email one-time passcode to redeem and sign in going forward.
183187
- If a guest doesn't have an unmanaged Azure AD account, they'll use email one-time passcode to redeem and sign in going forward.
184188

185189
- With email one-time passcode disabled:
186190

187-
- If a guest has an existing unmanaged Azure AD account, they'll use a Microsoft account to redeem. They'll end up with two accounts (the unmanaged Azure AD account and the Microsoft account). To prevent this from happening, we strongly encourage you to enable email one-time passcode.
188-
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll use a Microsoft account to redeem. They'll end up with two accounts (the unmanaged Azure AD account and the Microsoft account). To prevent this from happening, we strongly encourage you to enable email one-time passcode.
191+
- If a guest has an existing unmanaged Azure AD account, they'll continue signing in with their unmanaged Azure AD account.
192+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll use a Microsoft account to redeem and sign in going forward.
189193
- If a guest doesn't have an unmanaged Azure AD account, they'll use a Microsoft account to redeem and sign in going forward.
190194

191195
For more information about the different redemption pathways, see [B2B collaboration invitation redemption](redemption-experience.md).

articles/active-directory/fundamentals/security-operations-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ As part of an Azure hybrid environment, the following should be baselined and in
151151

152152
* **PTA Agent** – The Pass-through authentication agent is used to enable pass-through authentication and is installed on-premises. See [Azure AD Pass-through Authentication agent: Version release history](../hybrid/reference-connect-pta-version-history.md) for information on verifying your agent version and next steps.
153153

154-
* **AD FS/WAP** – Azure Active Directory Federation Services (Azure AD FS) and Web Application Proxy (WAP) enable secure sharing of digital identity and entitlement rights across your security and enterprise boundaries. For information on security best practices, see [Best practices for securing Active Directory Federation Services]/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs).
154+
* **AD FS/WAP** – Azure Active Directory Federation Services (Azure AD FS) and Web Application Proxy (WAP) enable secure sharing of digital identity and entitlement rights across your security and enterprise boundaries. For information on security best practices, see [Best practices for securing Active Directory Federation Services](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs).
155155

156156
* **Azure AD Connect Health Agent** – The agent used to provide a communications link for Azure AD Connect Health. For information on installing the agent, see [Azure AD Connect Health agent installation](../hybrid/how-to-connect-health-agent-install.md).
157157

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: how-to
9-
ms.date: 05/27/2021
9+
ms.date: 10/26/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -38,7 +38,7 @@ Configured trusted [network locations](../conditional-access/location-condition.
3838

3939
### Risk remediation
4040

41-
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and self-service password reset (SSPR).
41+
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD Multi-Factor Authentication (MFA) and self-service password reset (SSPR).
4242

4343
- When a user risk policy triggers:
4444
- Administrators can require a secure password reset, requiring Azure AD MFA be done before the user creates a new password with SSPR, resetting the user risk.
@@ -65,6 +65,8 @@ There are two locations where these policies may be configured, Conditional Acce
6565

6666
> [!VIDEO https://www.youtube.com/embed/zEsbbik-BTE]
6767
68+
Before enabling remediation policies, organizations may want to [investigate](howto-identity-protection-investigate-risk.md) and [remediate](howto-identity-protection-remediate-unblock.md) any active risks.
69+
6870
### User risk with Conditional Access
6971

7072
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.

articles/active-directory/identity-protection/howto-identity-protection-simulate-risk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ This section provides you with steps for testing the user and the sign-in risk p
9090
To test a user risk security policy, perform the following steps:
9191

9292
1. Navigate to the [Azure portal](https://portal.azure.com).
93-
1. Browse to **Azure Active Directory** > **Security** > **Overview**.
93+
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **Overview**.
9494
1. Select **Configure user risk policy**.
9595
1. Under **Assignments**
9696
1. **Users** - Choose **All users** or **Select individuals and groups** if limiting your rollout.
@@ -110,7 +110,7 @@ To test a user risk security policy, perform the following steps:
110110
To test a sign in risk policy, perform the following steps:
111111

112112
1. Navigate to the [Azure portal](https://portal.azure.com).
113-
1. Browse to **Azure Active Directory** > **Security** > **Overview**.
113+
1. Browse to **Azure Active Directory** > **Security** > **Identity Protection** > **Overview**.
114114
1. Select **Configure sign-in risk policy**.
115115
1. Under **Assignments**
116116
1. **Users** - Choose **All users** or **Select individuals and groups** if limiting your rollout.

0 commit comments

Comments
 (0)