Skip to content

Commit 0e938ef

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into register-scan-azure-arc-enabled-sql-server
2 parents 4006f7f + a3d32cf commit 0e938ef

File tree

367 files changed

+5630
-3628
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

367 files changed

+5630
-3628
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5516,6 +5516,11 @@
55165516
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-prometheus-monitoring-addon.md",
55175517
"redirect_url": "/azure/azure-monitor/containers/container-insights-prometheus",
55185518
"redirect_document_id": false
5519+
},
5520+
{
5521+
"source_path_from_root": "/articles/azure-monitor/app/powershell-azure-diagnostics.md",
5522+
"redirect_url": "/azure/azure-monitor/agents/diagnostics-extension-to-application-insights",
5523+
"redirect_document_id": false
55195524
}
55205525
]
55215526
}

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/backup/backup-center-community.md",
5+
"redirect_url": "/azure/backup/backup-center-overview",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/api-management/developer-portal-widget-contribution-guidelines.md",
510
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
@@ -7018,6 +7023,11 @@
70187023
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
70197024
"redirect_document_id": false
70207025
},
7026+
{
7027+
"source_path_from_root": "/articles/azure-monitor/app/azure-functions-supported-features.md",
7028+
"redirect_url": "/azure/azure-functions/functions-monitoring",
7029+
"redirect_document_id": false
7030+
},
70217031
{
70227032
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
70237033
"redirect_url": "/azure/azure-government",
@@ -18273,6 +18283,11 @@
1827318283
"redirect_url": "/azure/sentinel/sap/sap-solution-log-reference",
1827418284
"redirect_document_id": false
1827518285
},
18286+
{
18287+
"source_path_from_root": "/articles/sentinel/monitor-sentinel-health.md",
18288+
"redirect_url": "/azure/sentinel/enable-monitoring",
18289+
"redirect_document_id": false
18290+
},
1827618291
{
1827718292
"source_path_from_root": "/articles/service-bus/index.md",
1827818293
"redirect_url": "/azure/service-bus-messaging/index",

articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/10/2022
12+
ms.date: 11/17/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -133,7 +133,6 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
133133
</CryptographicKeys>
134134
<OutputClaims>
135135
<OutputClaim ClaimTypeReferenceId="issuerUserId" PartnerClaimType="oid"/>
136-
<OutputClaim ClaimTypeReferenceId="tenantId" PartnerClaimType="tid"/>
137136
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
138137
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
139138
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
@@ -208,4 +207,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
208207
- Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).
209208
- Check out the Azure AD multi-tenant federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory), and how to pass Azure AD access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#azure-active-directory-with-access-token)
210209

211-
::: zone-end
210+
::: zone-end

articles/active-directory-b2c/relyingparty.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 06/26/2022
11+
ms.date: 11/17/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -144,7 +144,8 @@ The **UserJourneyBehaviors** element contains the following elements:
144144
| JourneyFraming | 0:1| Allows the user interface of this policy to be loaded in an iframe. |
145145
| ScriptExecution| 0:1| The supported [JavaScript](javascript-and-page-layout.md) execution modes. Possible values: `Allow` or `Disallow` (default).
146146

147-
147+
When you use the above elements, you need add them to your **UserJourneyBehaviors** element in the order specified in the table. For example, the **JourneyInsights** element must be added before (above) the **ScriptExecution** element.
148+
148149
### SingleSignOn
149150

150151
The **SingleSignOn** element contains the following attributes:

articles/active-directory-b2c/service-limits.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
1111
ms.author: kengaderdus
12-
ms.date: 10/27/2022
12+
ms.date: 11/14/2022
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
1515
---
@@ -168,7 +168,7 @@ The following table lists the administrative configuration limits in the Azure A
168168
|Levels of [inheritance](custom-policy-overview.md#inheritance-model) in custom policies |10 |
169169
|Number of policies per Azure AD B2C tenant (user flows + custom policies) |200 |
170170
|Maximum policy file size |1024 KB |
171-
|Number of API connectors per tenant |19 |
171+
|Number of API connectors per tenant |20 |
172172

173173
<sup>1</sup> See also [Azure AD service limits and restrictions](../active-directory/enterprise-users/directory-service-limits-restrictions.md).
174174

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2022
9+
ms.date: 11/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -57,8 +57,24 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
5757
>
5858
> When two methods are required, users can reset using either a notification or verification code in addition to any other enabled methods.
5959
60+
61+
## FIPS 140 compliant for Azure AD authentication
62+
63+
Beginning with version 6.6.8, Microsoft Authenticator for iOS is compliant with [Federal Information Processing Standard (FIPS) 140](https://csrc.nist.gov/publications/detail/fips/140/3/final?azure-portal=true) for all Azure AD authentications using push multi-factor authentications (MFA), passwordless Phone Sign-In (PSI), and time-based one-time passcodes (TOTP).  
64+
65+
Consistent with the guidelines outlined in [NIST SP 800-63B](https://pages.nist.gov/800-63-3/sp800-63b.html?azure-portal=true), authenticators are required to use FIPS 140 validated cryptography. This helps federal agencies meet the requirements of [Executive Order (EO) 14028](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/?azure-portal=true) and healthcare organizations working with [Electronic Prescriptions for Controlled Substances (EPCS)](/azure/compliance/offerings/offering-epcs-us)
66+
67+
FIPS 140 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140 standard is maintained by the [Cryptographic Module Validation Program (CMVP)](https://csrc.nist.gov/Projects/cryptographic-module-validation-program?azure-portal=true).
68+
69+
No changes in configurations are required in Microsoft Authenticator or the Azure portal to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default.
70+
71+
Authenticator leverages the native Apple cryptography to achieve FIPS 140, Security Level 1 compliance on Apple iOS devices beginning with Microsoft Authenticator version 6.6.8. For more information about the certifications being used, see the [Apple CoreCrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web?azure-portal=true)
72+
73+
FIPS 140 compliance for Microsoft Authenticator on Android is in progress and will follow soon.
74+
6075
## Next steps
6176

6277
- To get started with passwordless sign-in, see [Enable passwordless sign-in with the Microsoft Authenticator](howto-authentication-passwordless-phone.md).
6378

6479
- Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
80+

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/14/2022
9+
ms.date: 11/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -191,7 +191,7 @@ The MFA Server Migration utility targets a single Azure AD group for all migrati
191191

192192
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window and the utility will begin searching for the appropriate group. The window will populate all users in the group. A large group can take several minutes to finish.
193193

194-
To view user attribute data for a user, highlight the user, and select **View**:
194+
To view attribute data for a user, highlight the user, and select **View**:
195195

196196
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/view-user.png" alt-text="Screenshot of how to view use settings.":::
197197

@@ -202,7 +202,10 @@ The settings option allows you to change the settings for the migration process:
202202
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/settings.png" alt-text="Screenshot of settings.":::
203203

204204
- Migrate – This setting allows you to specify which method(s) should be migrated for the selection of users
205-
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName
205+
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName:
206+
- The migration utility tries direct matching to UPN before using the on-premises Active Directory attribute.
207+
- If no match is found, it calls a Windows API to find the Azure AD UPN and get the SID, which it uses to search the MFA Server user list.
208+
- If the Windows API doesn’t find the user or the SID isn’t found in the MFA Server, then it will use the configured Active Directory attribute to find the user in the on-premises Active Directory, and then use the SID to search the MFA Server user list.
206209
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined
207210

208211
The migration process can be an automatic process, or a manual process.
@@ -367,7 +370,7 @@ Content-Type: application/json
367370
}
368371
```
369372

370-
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
373+
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
371374

372375
>[!NOTE]
373376
>The update of the domain federation setting can take up to 24 hours to take effect.
@@ -443,7 +446,8 @@ If the upgrade had issues, follow these steps to roll back:
443446
}
444447
```
445448

446-
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
449+
450+
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
447451

448452

449453
## Next steps

articles/active-directory/develop/v2-oauth2-device-code.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,29 +9,31 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 06/25/2021
12+
ms.date: 11/15/2022
1313
ms.author: ludwignick
1414
ms.reviewer: marsma
15-
ms.custom: aaddev
15+
ms.custom: aaddev, engagement-fy23
1616
---
1717

1818
# Microsoft identity platform and the OAuth 2.0 device authorization grant flow
1919

20-
The Microsoft identity platform supports the [device authorization grant](https://tools.ietf.org/html/rfc8628), which allows users to sign in to input-constrained devices such as a smart TV, IoT device, or printer. To enable this flow, the device has the user visit a webpage in their browser on another device to sign in. Once the user signs in, the device is able to get access tokens and refresh tokens as needed.
20+
The Microsoft identity platform supports the [device authorization grant](https://tools.ietf.org/html/rfc8628), which allows users to sign in to input-constrained devices such as a smart TV, IoT device, or a printer. To enable this flow, the device has the user visit a webpage in a browser on another device to sign in. Once the user signs in, the device is able to get access tokens and refresh tokens as needed.
2121

22-
This article describes how to program directly against the protocol in your application. When possible, we recommend you use the supported Microsoft Authentication Libraries (MSAL) instead to [acquire tokens and call secured web APIs](authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). Also take a look at the [sample apps that use MSAL](sample-v2-code.md).
22+
This article describes how to program directly against the protocol in your application. When possible, we recommend you use the supported Microsoft Authentication Libraries (MSAL) instead to [acquire tokens and call secured web APIs](authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). You can refer to [sample apps that use MSAL](sample-v2-code.md) for examples.
2323

2424
[!INCLUDE [try-in-postman-link](includes/try-in-postman-link.md)]
2525

2626
## Protocol diagram
2727

28-
The entire device code flow looks similar to the next diagram. We describe each of the steps later in this article.
28+
The entire device code flow is shown in the following diagram. Each step is explained throughout this article.
2929

3030
![Device code flow](./media/v2-oauth2-device-code/v2-oauth-device-flow.svg)
3131

3232
## Device authorization request
3333

34-
The client must first check with the authentication server for a device and user code that's used to initiate authentication. The client collects this request from the `/devicecode` endpoint. In this request, the client should also include the permissions it needs to acquire from the user. From the moment this request is sent, the user has only 15 minutes to sign in (the usual value for `expires_in`), so only make this request when the user has indicated they're ready to sign in.
34+
The client must first check with the authentication server for a device and user code that's used to initiate authentication. The client collects this request from the `/devicecode` endpoint. In the request, the client should also include the permissions it needs to acquire from the user.
35+
36+
From the moment the request is sent, the user has 15 minutes to sign in. This is the default value for `expires_in`. The request should only be made when the user has indicated they're ready to sign in.
3537

3638
```HTTP
3739
// Line breaks are for legibility only.
@@ -46,7 +48,7 @@ client_id=6731de76-14a6-49ae-97bc-6eba6914391e
4648

4749
| Parameter | Condition | Description |
4850
| --- | --- | --- |
49-
| `tenant` | Required | Can be /common, /consumers, or /organizations. It can also be the directory tenant that you want to request permission from in GUID or friendly name format. |
51+
| `tenant` | Required | Can be `/common`, `/consumers`, or `/organizations`. It can also be the directory tenant that you want to request permission from in GUID or friendly name format. |
5052
| `client_id` | Required | The **Application (client) ID** that the [Azure portal – App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience assigned to your app. |
5153
| `scope` | Required | A space-separated list of [scopes](v2-permissions-and-consent.md) that you want the user to consent to. |
5254

@@ -68,19 +70,17 @@ A successful response will be a JSON object containing the required information
6870
6971
## Authenticating the user
7072

71-
After receiving the `user_code` and `verification_uri`, the client displays these to the user, instructing them to sign in using their mobile phone or PC browser.
73+
After receiving the `user_code` and `verification_uri`, the client displays these to the user, instructing them to use their mobile phone or PC browser to sign in.
7274

73-
If the user authenticates with a personal account (on /common or /consumers), they will be asked to sign in again in order to transfer authentication state to the device. They will also be asked to provide consent, to ensure they are aware of the permissions being granted. This does not apply to work or school accounts used to authenticate.
75+
If the user authenticates with a personal account, using `/common` or `/consumers`, they'll be asked to sign in again in order to transfer authentication state to the device. This is because the device is unable to access the user's cookies. They'll also be asked to consent to the permissions requested by the client. This however doesn't apply to work or school accounts used to authenticate.
7476

7577
While the user is authenticating at the `verification_uri`, the client should be polling the `/token` endpoint for the requested token using the `device_code`.
7678

7779
```HTTP
7880
POST https://login.microsoftonline.com/{tenant}/oauth2/v2.0/token
7981
Content-Type: application/x-www-form-urlencoded
8082
81-
grant_type=urn:ietf:params:oauth:grant-type:device_code
82-
&client_id=6731de76-14a6-49ae-97bc-6eba6914391e
83-
&device_code=GMMhmHCXhWEzkobqIHGG_EnNYYsAkukHspeYUk9E8...
83+
grant_type=urn:ietf:params:oauth:grant-type:device_code&client_id=6731de76-14a6-49ae-97bc-6eba6914391e&device_code=GMMhmHCXhWEzkobqIHGG_EnNYYsAkukHspeYUk9E8...
8484
```
8585

8686
| Parameter | Required | Description|
@@ -92,14 +92,14 @@ grant_type=urn:ietf:params:oauth:grant-type:device_code
9292

9393
### Expected errors
9494

95-
The device code flow is a polling protocol so your client must expect to receive errors before the user has finished authenticating.
95+
The device code flow is a polling protocol so errors served to the client must be expected prior to completion of user authentication.
9696

9797
| Error | Description | Client Action |
9898
| ------ | ----------- | -------------|
9999
| `authorization_pending` | The user hasn't finished authenticating, but hasn't canceled the flow. | Repeat the request after at least `interval` seconds. |
100-
| `authorization_declined` | The end user denied the authorization request.| Stop polling, and revert to an unauthenticated state. |
100+
| `authorization_declined` | The end user denied the authorization request.| Stop polling and revert to an unauthenticated state. |
101101
| `bad_verification_code`| The `device_code` sent to the `/token` endpoint wasn't recognized. | Verify that the client is sending the correct `device_code` in the request. |
102-
| `expired_token` | At least `expires_in` seconds have passed, and authentication is no longer possible with this `device_code`. | Stop polling and revert to an unauthenticated state. |
102+
| `expired_token` | Value of `expires_in` has been exceeded and authentication is no longer possible with `device_code`. | Stop polling and revert to an unauthenticated state. |
103103

104104
### Successful authentication response
105105

@@ -119,8 +119,8 @@ A successful token response will look like:
119119
| Parameter | Format | Description |
120120
| --------- | ------ | ----------- |
121121
| `token_type` | String| Always `Bearer`. |
122-
| `scope` | Space separated strings | If an access token was returned, this lists the scopes the access token is valid for. |
123-
| `expires_in`| int | Number of seconds before the included access token is valid for. |
122+
| `scope` | Space separated strings | If an access token was returned, this lists the scopes in which the access token is valid for. |
123+
| `expires_in`| int | Number of seconds the included access token is valid for. |
124124
| `access_token`| Opaque string | Issued for the [scopes](v2-permissions-and-consent.md) that were requested. |
125125
| `id_token` | JWT | Issued if the original `scope` parameter included the `openid` scope. |
126126
| `refresh_token` | Opaque string | Issued if the original `scope` parameter included `offline_access`. |

0 commit comments

Comments
 (0)