Skip to content

Commit 111884a

Browse files
committed
fix
2 parents 6fe571f + 4f9e59d commit 111884a

File tree

308 files changed

+4463
-2640
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

308 files changed

+4463
-2640
lines changed

.openpublishing.redirection.json

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39472,6 +39472,71 @@
3947239472
"source_path": "articles/azure-monitor/app/app-insights-dashboards.md",
3947339473
"redirect_url": "/azure/azure-monitor/app/overview-dashboard",
3947439474
"redirect_document_id": false
39475+
},
39476+
{
39477+
"source_path" : "articles/active-directory-domain-services/active-directory-ds-admin-guide-administer-domain.md",
39478+
"redirect_url" : "/azure/active-directory-domain-services/manage-domain",
39479+
"redirect_document_id": true
39480+
},
39481+
{
39482+
"source_path": "articles/active-directory-domain-services/active-directory-ds-admin-guide-configure-secure-ldap.md",
39483+
"redirect_url": "/azure/active-directory-domain-services/configure-ldaps",
39484+
"redirect_document_id": false
39485+
},
39486+
{
39487+
"source_path": "articles/active-directory-domain-services/active-directory-ds-admin-guide-create-ou.md",
39488+
"redirect_url": "/azure/active-directory-domain-services/create-ou",
39489+
"redirect_document_id": false
39490+
},
39491+
{
39492+
"source_path": "articles/active-directory-domain-services/active-directory-ds-comparison.md",
39493+
"redirect_url": "/azure/active-directory-domain-services/comparison",
39494+
"redirect_document_id": false
39495+
},
39496+
{
39497+
"source_path": "articles/active-directory-domain-services/active-directory-ds-contact-us.md",
39498+
"redirect_url": "/azure/active-directory-domain-services/contact-us",
39499+
"redirect_document_id": false
39500+
},
39501+
{
39502+
"source_path": "articles/active-directory-domain-services/active-directory-ds-faqs.md",
39503+
"redirect_url": "/azure/active-directory-domain-services/faqs",
39504+
"redirect_document_id": false
39505+
},
39506+
{
39507+
"source_path": "articles/active-directory-domain-services/active-directory-ds-getting-started.md",
39508+
"redirect_url": "/azure/active-directory-domain-services/create-instance",
39509+
"redirect_document_id": false
39510+
},
39511+
{
39512+
"source_path": "articles/active-directory-domain-services/active-directory-ds-networking.md",
39513+
"redirect_url": "/azure/active-directory-domain-services/network-considerations",
39514+
"redirect_document_id": false
39515+
},
39516+
{
39517+
"source_path": "articles/active-directory-domain-services/active-directory-ds-overview.md",
39518+
"redirect_url": "/azure/active-directory-domain-services/overview",
39519+
"redirect_document_id": false
39520+
},
39521+
{
39522+
"source_path": "articles/active-directory-domain-services/active-directory-ds-synchronization.md",
39523+
"redirect_url": "/azure/active-directory-domain-services/synchronization",
39524+
"redirect_document_id": false
39525+
},
39526+
{
39527+
"source_path": "articles/active-directory-domain-services/active-directory-ds-scenarios.md",
39528+
"redirect_url": "/azure/active-directory-domain-services/scenarios",
39529+
"redirect_document_id": false
39530+
},
39531+
{
39532+
"source_path": "articles/active-directory-domain-services/active-directory-ds-admin-guide-join-windows-vm-portal.md",
39533+
"redirect_url": "/azure/active-directory-domain-services/join-windows-vm",
39534+
"redirect_document_id": false
39535+
},
39536+
{
39537+
"source_path": "articles/active-directory-domain-services/active-directory-ds-troubleshooting.md",
39538+
"redirect_url": "/azure/active-directory-domain-services/troubleshoot",
39539+
"redirect_document_id": false
3947539540
}
3947639541
]
3947739542
}

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Admins manage users and devices - Azure MFA - Azure Active Directory
3-
description: This describes how to change user settings such as forcing the users to do the proof-up process again.
3+
description: How can administrators change user settings such as forcing the users to do the proof-up process again.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -32,13 +32,21 @@ This setting forces the user to complete the registration process again. Non-bro
3232
1. Sign in to the [Azure portal](https://portal.azure.com).
3333
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
3434
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
35-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appear on the right.
35+
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
3636
5. Select **Manage user settings**.
3737
6. Check the box for **Require selected users to provide contact methods again**.
3838
![Require users to provide contact methods again](./media/howto-mfa-userdevicesettings/reproofup.png)
3939
7. Click **save**.
4040
8. Click **close**.
4141

42+
Organizations can complete these steps with PowerShell using the following as a guide to clear the `StrongAuthenticationMethods` attribute:
43+
44+
```PowerShell
45+
46+
$noMfaConfig = @()
47+
Set-MsolUser -UserPrincipalName $Upn -StrongAuthenticationMethods $noMfaConfig
48+
```
49+
4250
## Delete users existing app passwords
4351

4452
This setting deletes all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created.
@@ -48,7 +56,7 @@ This setting deletes all of the app passwords that a user has created. Non-brows
4856
1. Sign in to the [Azure portal](https://portal.azure.com).
4957
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
5058
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
51-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appear on the right.
59+
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
5260
5. Select **Manage user settings**.
5361
6. Check the box for **Delete all existing app passwords generated by the selected users**.
5462
![Delete all existing app passwords](./media/howto-mfa-userdevicesettings/deleteapppasswords.png)
@@ -61,14 +69,14 @@ One of the configurable features of Azure Multi-Factor Authentication is giving
6169

6270
Users can opt out of two-step verification for a configurable number of days on their regular devices. If an account is compromised or a trusted device is lost, you need to be able to remove the trusted status and require two-step verification again.
6371

64-
The **Restore multi-factor authentication on all remembered devices** setting means that the user will be challenged to perform two-step verification the next time they sign in, regardless of whether they chose to mark their device as trusted.
72+
When checked, **Restore multi-factor authentication on all remembered devices** users are required to perform two-step verification the next time they sign in, even if they marked their device as trusted.
6573

6674
### How to restore MFA on all suspended devices for a user
6775

6876
1. Sign in to the [Azure portal](https://portal.azure.com).
6977
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
7078
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
71-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appear on the right.
79+
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
7280
5. Select **Manage user settings**.
7381
6. Check the box for **Restore multi-factor authentication on all remembered devices**
7482
![Restore multi-factor authentication on all remembered devices](./media/howto-mfa-userdevicesettings/rememberdevices.png)

articles/active-directory/b2b/current-limitations.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 05/23/2017
9+
ms.date: 05/29/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -28,6 +28,9 @@ In the B2B collaboration flows, we add users to the directory and dynamically up
2828
## Azure AD directories
2929
Azure AD B2B is subject to Azure AD service directory limits. For details about the number of directories a user can create and the number of directories to which a user or guest user can belong, see [Azure AD service limits and restrictions](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-service-limits-restrictions).
3030

31+
## National clouds
32+
[National clouds](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud) are physically isolated instances of Azure. B2B collaboration is not supported across national cloud boundaries. For example, if your Azure tenant is in the public, global cloud, you can't invite a user whose account is in a national cloud. To collaborate with the user, ask them for another email address or create a member user account for them in your directory.
33+
3134
## Next steps
3235

3336
See the following articles on Azure AD B2B collaboration:

articles/active-directory/b2b/redemption-experience.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ For information about how you as a tenant administrator can link to your organiz
5555

5656
## Terms of use
5757

58-
You can present terms of use to the guest user during the initial redemption process by using the Azure AD Terms of use feature. In Azure Active Directory, you can access this feature under **Manage** > **Organizational relationships** > **Terms of use** or under **Security** > **Conditional Access** > **Terms of use**. For details, see [Azure AD Terms of use feature](../conditional-access/terms-of-use.md).
58+
You can present terms of use to the guest user during the initial redemption process by using the Azure AD terms of use feature. In Azure Active Directory, you can access this feature under **Manage** > **Organizational relationships** > **Terms of use** or under **Security** > **Conditional Access** > **Terms of use**. For details, see [Azure AD terms of use feature](../conditional-access/terms-of-use.md).
5959

6060
![Screenshot showing new terms of use](media/redemption-experience/organizational-relationships-terms-of-use.png)
6161

articles/active-directory/conditional-access/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@
6464
href: ../authentication/howto-registration-mfa-sspr-combined.md#conditional-access-policies-for-combined-registration
6565
- name: Require MFA for access attempts from untrusted networks
6666
href: untrusted-networks.md
67-
- name: Require Terms of use
67+
- name: Require terms of use
6868
href: terms-of-use.md
6969
- name: Reference
7070
items:

articles/active-directory/conditional-access/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ All policies are enforced in two phases:
6767

6868
![Order](./media/best-practices/06.png)
6969

70-
External MFA providers and Terms of Use come next.
70+
External MFA providers and terms of use come next.
7171

7272

7373

articles/active-directory/conditional-access/controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Your device must be registered to Azure AD before an application can be marked a
106106
For a list of supported policy protected client apps, see [app protection policy requirement](technical-reference.md#app-protection-policy-requirement).
107107

108108

109-
### Terms of Use
109+
### Terms of use
110110

111111
You can require a user in your tenant to consent to the terms of use before being granted access to a resource. As an administrator, you can configure and customize terms of use by uploading a PDF document. If a user falls in scope of this control access to an application is only granted if the terms of use have been agreed.
112112

articles/active-directory/conditional-access/location-condition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ A named location has the following components:
5454
- **Countries/Regions** - This option enables you to select one or more country or region to define a named location.
5555
- **Include unknown areas** - Some IP addresses are not mapped to a specific country or region. This option allows you to choose if these IP addresses should be included in the named location. Use this setting when the policy using the named location should apply to unknown locations.
5656

57-
The number of named locations you can configure is constrained by the size of the related object in Azure AD. Organizations can configure up to 90 named locations, each configured with up to 12000 IP ranges.
57+
The number of named locations you can configure is constrained by the size of the related object in Azure AD. Organizations can configure up to 90 named locations, each configured with up to 1200 IP ranges.
5858

5959
Conditional access policy applies to IPv4 and IPv6 traffic. Currently named locations do not allow IPv6 ranges to be configured. This limitation causes the following situations:
6060

0 commit comments

Comments
 (0)