Skip to content

Commit 132b40a

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into Release_Archive_main_2023-06-29-15-23-03
2 parents fc82bcb + 532faa8 commit 132b40a

18 files changed

+139
-114
lines changed

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/26/2023
9+
ms.date: 06/29/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -19,12 +19,12 @@ ms.custom: contperf-fy20q4
1919
# Configure Azure AD Multi-Factor Authentication settings
2020

2121
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications. Some settings are available directly in the Azure portal for Azure Active Directory (Azure AD), and some are in a separate Azure AD Multi-Factor Authentication portal.
22-
22+
2323
The following Azure AD Multi-Factor Authentication settings are available in the Azure portal:
2424

2525
| Feature | Description |
2626
| ------- | ----------- |
27-
| [Account lockout](#account-lockout) | Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server only) |
27+
| [Account lockout (MFA Server only)](#account-lockout-mfa-server-only) | Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who use MFA Server to enter a PIN to authenticate. |
2828
| [Block/unblock users](#block-and-unblock-users) | Block specific users from being able to receive Azure AD Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they're blocked or until they're manually unblocked. |
2929
| [Report suspicious activity](#report-suspicious-activity) | Configure settings that allow users to report fraudulent verification requests. |
3030
| [Notifications](#notifications) | Enable notifications of events from MFA Server. |
@@ -34,9 +34,12 @@ The following Azure AD Multi-Factor Authentication settings are available in the
3434

3535
![Azure portal - Azure AD Multi-Factor Authentication settings](./media/howto-mfa-mfasettings/multi-factor-authentication-settings-portal.png)
3636

37-
## Account lockout
37+
## Account lockout (MFA Server only)
38+
39+
>[!NOTE]
40+
>Account lockout only affects users who sign in by using MFA Server on-premises.
3841
39-
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt.
42+
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt by using MFA Server on-premises.
4043

4144
The following settings are available:
4245

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ ms.reviewer: michmcla, dawoo
1515

1616
ms.collection: M365-identity-device-management
1717
---
18+
1819
# Manage user authentication methods for Azure AD Multi-Factor Authentication
1920

2021
Users in Azure AD have two distinct sets of contact information:
@@ -89,11 +90,8 @@ If you're assigned the *Authentication Administrator* role, you can require user
8990
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
9091
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
9192
- **Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
92-
- **Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
93-
94-
> [!NOTE]
95-
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
96-
93+
- **Require Re-register MFA** deactivates the user's hardware OATH tokens and deletes the following authentication methods from this user: phone numbers, Microsoft Authenticator apps and software OATH tokens. If needed, the user is requested to set up a new MFA authentication method the next time they sign in.
94+
9795
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
9896

9997
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::
@@ -111,7 +109,7 @@ To delete a user's app passwords, complete the following steps:
111109
1. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
112110
1. Select **Manage user settings**, then check the box for **Delete all existing app passwords generated by the selected users**, as shown in the following example:
113111
![Delete all existing app passwords](./media/howto-mfa-userdevicesettings/deleteapppasswords.png)
114-
1. Select **save**, then **close**.
112+
1. 1. Select **save**, then **close**.
115113

116114
## Next steps
117115

articles/active-directory/develop/quickstart-register-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: quickstart
1010
ms.workload: identity
11-
ms.date: 10/31/2022
11+
ms.date: 06/29/2023
1212
ms.author: cwerner
1313
ms.custom: aaddev, identityplatformtop40, contperf-fy21q1, contperf-fy21q2, contperf-fy21q4, mode-other
1414

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -6347,41 +6347,3 @@ Starting on February 8, 2020, when a request is sent to login.microsoftonline.co
63476347

63486348
---
63496349

6350-
## December 2019
6351-
6352-
### Integrate SAP SuccessFactors provisioning into Azure AD and on-premises AD (Public Preview)
6353-
6354-
**Type:** New feature
6355-
**Service category:** App Provisioning
6356-
**Product capability:** Identity Lifecycle Management
6357-
6358-
You can now integrate SAP SuccessFactors as an authoritative identity source in Azure AD. This integration helps you automate the end-to-end identity lifecycle, including using HR-based events, like new hires or terminations, to control provisioning of Azure AD accounts.
6359-
6360-
For more information about how to set up SAP SuccessFactors inbound provisioning to Azure AD, see the [Configure SAP SuccessFactors automatic provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md) tutorial.
6361-
6362-
---
6363-
6364-
### Support for customized emails in Azure AD B2C (Public Preview)
6365-
6366-
**Type:** New feature
6367-
**Service category:** B2C - Consumer Identity Management
6368-
**Product capability:** B2B/B2C
6369-
6370-
You can now use Azure AD B2C to create customized emails when your users sign up to use your apps. By using DisplayControls (currently in preview) and a third-party email provider (such as, [SendGrid](https://sendgrid.com/), [SparkPost](https://sparkpost.com/), or a custom REST API), you can use your own email template, **From** address, and subject text, as well as support localization and custom one-time password (OTP) settings.
6371-
6372-
For more information, see [Custom email verification in Azure Active Directory B2C](../../active-directory-b2c/custom-email-sendgrid.md).
6373-
6374-
---
6375-
6376-
### Replacement of baseline policies with security defaults
6377-
6378-
**Type:** Changed feature
6379-
**Service category:** Other
6380-
**Product capability:** Identity Security and Protection
6381-
6382-
As part of a secure-by-default model for authentication, we're removing the existing baseline protection policies from all tenants. This removal is targeted for completion at the end of February. The replacement for these baseline protection policies is security defaults. If you've been using baseline protection policies, you must plan to move to the new security defaults policy or to Conditional Access. If you haven't used these policies, there is no action for you to take.
6383-
6384-
For more information about the new security defaults, see [What are security defaults?](./concept-fundamentals-security-defaults.md) For more information about Conditional Access policies, see [Common Conditional Access policies](../conditional-access/concept-conditional-access-policy-common.md).
6385-
6386-
---
6387-

articles/aks/windows-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ az aks update \
106106
```
107107

108108
> [!IMPORTANT]
109-
> Performing the `az aks update` operation upgrades only Windows Server node pools. Linux node pools are not affected.
109+
> Performing the `az aks update` operation upgrades only Windows Server node pools and will cause a restart. Linux node pools are not affected.
110110
>
111111
> When you're changing `--windows-admin-password`, the new password must be at least 14 characters and meet [Windows Server password requirements][windows-server-password].
112112
@@ -123,7 +123,7 @@ $cluster | Set-AzAksCluster
123123
```
124124

125125
> [!IMPORTANT]
126-
> Performing the `Set-AzAksCluster` operation upgrades only Windows Server node pools. Linux node pools are not affected.
126+
> Performing the `Set-AzAksCluster` operation upgrades only Windows Server node pools and will cause a restart. Linux node pools are not affected.
127127
>
128128
> When you're changing the Windows administrator password, the new password must be at least 14 characters and meet [Windows Server password requirements][windows-server-password].
129129

articles/azure-cache-for-redis/cache-how-to-functions.md

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -232,21 +232,22 @@ public static void PubSubTrigger(
232232

233233
:::zone-end
234234

235-
### RedisListsTrigger
235+
### RedisListTrigger
236236

237-
The `RedisListsTrigger` pops elements from a list and surfaces those elements to the function. The trigger polls Redis at a configurable fixed interval, and uses [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/)/[`LMPOP`](https://redis.io/commands/lmpop/) to pop elements from the lists.
237+
The `RedisListTrigger` pops elements from a list and surfaces those elements to the function. The trigger polls Redis at a configurable fixed interval, and uses [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/)/[`LMPOP`](https://redis.io/commands/lmpop/) to pop elements from the lists.
238238

239-
#### Inputs for RedisListsTrigger
239+
#### Inputs for RedisListTrigger
240240

241-
- `ConnectionString`: connection string to the redis cache, for example`<cacheName>.redis.cache.windows.net:6380,password=...`.
242-
- `Keys`: Keys to read from, space-delimited.
241+
- `ConnectionStringSetting`: connection string to the redis cache, for example`<cacheName>.redis.cache.windows.net:6380,password=...`.
242+
- `Key`: Key or keys to read from, space-delimited.
243243
- Multiple keys only supported on Redis 7.0+ using [`LMPOP`](https://redis.io/commands/lmpop/).
244244
- Listens to only the first key given in the argument using [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/) on Redis versions less than 7.0.
245+
- This field can be resolved using `INameResolver`
245246
- (optional) `PollingIntervalInMs`: How often to poll Redis in milliseconds.
246247
- Default: 1000
247248
- (optional) `MessagesPerWorker`: How many messages each functions worker "should" process. Used to determine how many workers the function should scale to.
248249
- Default: 100
249-
- (optional) `BatchSize`: Number of elements to pull from Redis at one time.
250+
- (optional) `Count`: Number of elements to pull from Redis at one time. These are processed in parallel.
250251
- Default: 10
251252
- Only supported on Redis 6.2+ using the `COUNT` argument in [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/).
252253
- (optional) `ListPopFromBeginning`: determines whether to pop elements from the beginning using [`LPOP`](https://redis.io/commands/lpop/) or to pop elements from the end using [`RPOP`](https://redis.io/commands/rpop/).
@@ -257,9 +258,9 @@ The following sample polls the key `listTest` at a localhost Redis instance at `
257258
::: zone pivot="programming-language-csharp"
258259

259260
```csharp
260-
[FunctionName(nameof(ListsTrigger))]
261-
public static void ListsTrigger(
262-
[RedisListsTrigger(ConnectionString = "127.0.0.1:6379", Keys = "listTest")] RedisMessageModel model,
261+
[FunctionName(nameof(ListTrigger))]
262+
public static void ListTrigger(
263+
[RedisListTrigger(ConnectionStringSetting = "127.0.0.1:6379", Key = "listTest")] RedisMessageModel model,
263264
ILogger logger)
264265
{
265266
logger.LogInformation(JsonSerializer.Serialize(model));
@@ -311,25 +312,25 @@ public static void ListsTrigger(
311312

312313
:::zone-end
313314

314-
### RedisStreamsTrigger
315+
### RedisStreamTrigger
315316

316-
The `RedisStreamsTrigger` pops elements from a stream and surfaces those elements to the function.
317+
The `RedisStreamTrigger` pops elements from a stream and surfaces those elements to the function.
317318
The trigger polls Redis at a configurable fixed interval, and uses [`XREADGROUP`](https://redis.io/commands/xreadgroup/) to read elements from the stream.
319+
The consumer group for all function instances will be the ID of the function. For example, for the StreamTrigger function in [this sample](https://github.com/Azure/azure-functions-redis-extension/blob/main/samples/dotnet/RedisSamples.cs), the consumer group would be `Microsoft.Azure.WebJobs.Extensions.Redis.Samples.RedisSamples.StreamTrigger`.
318320
Each function creates a new random GUID to use as its consumer name within the group to ensure that scaled out instances of the function don't read the same messages from the stream.
319321

320-
#### Inputs for RedisStreamsTrigger
322+
#### Inputs for RedisStreamTrigger
321323

322-
- `ConnectionString`: connection string to the redis cache, for example, `<cacheName>.redis.cache.windows.net:6380,password=...`.
323-
- `Keys`: Keys to read from, space-delimited.
324+
- `ConnectionStringSetting`: connection string to the redis cache, for example, `<cacheName>.redis.cache.windows.net:6380,password=...`.
325+
- `Key`: Key or keys to read from, space-delimited.
324326
- Uses [`XREADGROUP`](https://redis.io/commands/xreadgroup/).
327+
- This field can be resolved using `INameResolver`.
325328
- (optional) `PollingIntervalInMs`: How often to poll Redis in milliseconds.
326329
- Default: 1000
327330
- (optional) `MessagesPerWorker`: How many messages each functions worker "should" process. Used to determine how many workers the function should scale to.
328331
- Default: 100
329-
- (optional) `BatchSize`: Number of elements to pull from Redis at one time.
332+
- (optional) `Count`: Number of elements to pull from Redis at one time.
330333
- Default: 10
331-
- (optional) `ConsumerGroup`: The name of the consumer group that the function uses.
332-
- Default: "AzureFunctionRedisExtension"
333334
- (optional) `DeleteAfterProcess`: If the listener will delete the stream entries after the function runs.
334335
- Default: false
335336

@@ -338,9 +339,9 @@ The following sample polls the key `streamTest` at a localhost Redis instance at
338339
::: zone pivot="programming-language-csharp"
339340

340341
```csharp
341-
[FunctionName(nameof(StreamsTrigger))]
342-
public static void StreamsTrigger(
343-
[RedisStreamsTrigger(ConnectionString = "127.0.0.1:6379", Keys = "streamTest")] RedisMessageModel model,
342+
[FunctionName(nameof(StreamTrigger))]
343+
public static void StreamTrigger(
344+
[RedisStreamTrigger(ConnectionString = "127.0.0.1:6379", Keys = "streamTest")] RedisMessageModel model,
344345
ILogger logger)
345346
{
346347
logger.LogInformation(JsonSerializer.Serialize(model));

articles/azure-functions/functions-reference-node.md

Lines changed: 48 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1418,21 +1418,62 @@ You can see the current version that the runtime is using by logging `process.ve
14181418
14191419
### Setting the Node version
14201420
1421-
# [Windows](#tab/windows-setting-the-node-version)
1421+
The way that you upgrade your Node.js version depends on the OS on which your function app runs.
14221422
1423-
For Windows function apps, target the version in Azure by setting the `WEBSITE_NODE_DEFAULT_VERSION` [app setting](functions-how-to-use-azure-function-app-settings.md#settings) to a supported LTS version, such as `~18`.
1423+
# [Windows](#tab/windows)
14241424
1425-
# [Linux](#tab/linux-setting-the-node-version)
1425+
When running on Windows, the Node.js version is set by the [`WEBSITE_NODE_DEFAULT_VERSION`](./functions-app-settings.md#website_node_default_version) application setting. This setting can be updated either by using the Azure CLI or in the Azure portal.
14261426
1427-
For Linux function apps, run the following Azure CLI command to update the Node version.
1427+
# [Linux](#tab/linux)
14281428
1429-
```azurecli
1430-
az functionapp config set --linux-fx-version "node|18" --name "<MY_APP_NAME>" --resource-group "<MY_RESOURCE_GROUP_NAME>"
1429+
When running on Windows, the Node.js version is set by the [linuxfxversion](./functions-app-settings.md#linuxfxversion) site setting. This setting can be updated using the Azure CLI.
1430+
1431+
---
1432+
1433+
For more information about Node.js versions, see [Supported versions](#supported-versions).
1434+
1435+
Before upgrading your Node.js version, make sure your function app is running on the latest version of the Azure Functions runtime. If you need to upgrade your runtime version, see [Migrate apps from Azure Functions version 3.x to version 4.x](migrate-version-3-version-4.md?pivots=programming-language-javascript).
1436+
1437+
# [Azure CLI](#tab/azure-cli/windows)
1438+
1439+
Run the Azure CLI [`az functionapp config appsettings set`](/cli/azure/functionapp/config#az-functionapp-config-appsettings-set) command to update the Node.js version for your function app running on Windows:
1440+
1441+
```azurecli-interactive
1442+
az functionapp config appsettings set --settings WEBSITE_NODE_DEFAULT_VERSION=~18 \
1443+
--name <FUNCTION_APP_NAME> --resource-group <RESOURCE_GROUP_NAME>
1444+
```
1445+
1446+
This sets the [`WEBSITE_NODE_DEFAULT_VERSION` application setting](./functions-app-settings.md#website_node_default_version) the supported LTS version of `~18`.
1447+
1448+
# [Azure portal](#tab/azure-portal/windows)
1449+
1450+
Use the following steps to change the Node.js version:
1451+
1452+
[!INCLUDE [functions-set-nodejs-version-portal](../../includes/functions-set-nodejs-version-portal.md)]
1453+
1454+
# [Azure CLI](#tab/azure-cli/linux)
1455+
1456+
Run the Azure CLI [`az functionapp config set`](/cli/azure/functionapp/config#az-functionapp-config-set) command to update the Node.js version for your function app running on Linux:
1457+
1458+
```azurecli-interactive
1459+
az functionapp config set --linux-fx-version "node|18" --name "<FUNCTION_APP_NAME>" \
1460+
--resource-group "<RESOURCE_GROUP_NAME>"
14311461
```
14321462
1463+
This sets the base image of the Linux function app to Node.js version 18.
1464+
1465+
# [Azure portal](#tab/azure-portal/linux)
1466+
1467+
>[!NOTE]
1468+
> You can't change the Node.js version in the Azure portal when your function app is running on Linux in a Consumption plan. Instead use the Azure CLI.
1469+
1470+
For Premium and Dedicated plans, use the following steps to change the Node.js version:
1471+
1472+
[!INCLUDE [functions-set-nodejs-version-portal](../../includes/functions-set-nodejs-version-portal.md)]
1473+
14331474
---
14341475
1435-
To learn more about Azure Functions runtime support policy, refer to this [article](./language-support-policy.md).
1476+
After changes are made, your function app restarts. To learn more about Functions support for Node.js, see [Language runtime support policy](./language-support-policy.md).
14361477
14371478
<a name="access-environment-variables-in-code"></a>
14381479

0 commit comments

Comments
 (0)