You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Configure Azure AD Multi-Factor Authentication settings
20
20
21
21
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications. Some settings are available directly in the Azure portal for Azure Active Directory (Azure AD), and some are in a separate Azure AD Multi-Factor Authentication portal.
22
-
22
+
23
23
The following Azure AD Multi-Factor Authentication settings are available in the Azure portal:
24
24
25
25
| Feature | Description |
26
26
| ------- | ----------- |
27
-
|[Account lockout](#account-lockout)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server only)|
27
+
|[Account lockout (MFA Server only)](#account-lockout-mfa-server-only)| Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who use MFA Server to enter a PIN to authenticate. |
28
28
|[Block/unblock users](#block-and-unblock-users)| Block specific users from being able to receive Azure AD Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they're blocked or until they're manually unblocked. |
29
29
|[Report suspicious activity](#report-suspicious-activity)| Configure settings that allow users to report fraudulent verification requests. |
30
30
|[Notifications](#notifications)| Enable notifications of events from MFA Server. |
@@ -34,9 +34,12 @@ The following Azure AD Multi-Factor Authentication settings are available in the
34
34
35
35

36
36
37
-
## Account lockout
37
+
## Account lockout (MFA Server only)
38
+
39
+
>[!NOTE]
40
+
>Account lockout only affects users who sign in by using MFA Server on-premises.
38
41
39
-
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt.
42
+
To prevent repeated MFA attempts as part of an attack, the account lockout settings let you specify how many failed attempts to allow before the account becomes locked out for a period of time. The account lockout settings are applied only when a PIN code is entered for the MFA prompt by using MFA Server on-premises.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-userdevicesettings.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,7 @@ ms.reviewer: michmcla, dawoo
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
+
18
19
# Manage user authentication methods for Azure AD Multi-Factor Authentication
19
20
20
21
Users in Azure AD have two distinct sets of contact information:
@@ -89,11 +90,8 @@ If you're assigned the *Authentication Administrator* role, you can require user
89
90
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
90
91
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
91
92
-**Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
92
-
-**Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
93
-
94
-
> [!NOTE]
95
-
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
96
-
93
+
-**Require Re-register MFA** deactivates the user's hardware OATH tokens and deletes the following authentication methods from this user: phone numbers, Microsoft Authenticator apps and software OATH tokens. If needed, the user is requested to set up a new MFA authentication method the next time they sign in.
94
+
97
95
-**Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
98
96
99
97
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::
@@ -111,7 +109,7 @@ To delete a user's app passwords, complete the following steps:
111
109
1. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
112
110
1. Select **Manage user settings**, then check the box for **Delete all existing app passwords generated by the selected users**, as shown in the following example:
113
111

You can now integrate SAP SuccessFactors as an authoritative identity source in Azure AD. This integration helps you automate the end-to-end identity lifecycle, including using HR-based events, like new hires or terminations, to control provisioning of Azure AD accounts.
6359
-
6360
-
For more information about how to set up SAP SuccessFactors inbound provisioning to Azure AD, see the [Configure SAP SuccessFactors automatic provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md) tutorial.
6361
-
6362
-
---
6363
-
6364
-
### Support for customized emails in Azure AD B2C (Public Preview)
You can now use Azure AD B2C to create customized emails when your users sign up to use your apps. By using DisplayControls (currently in preview) and a third-party email provider (such as, [SendGrid](https://sendgrid.com/), [SparkPost](https://sparkpost.com/), or a custom REST API), you can use your own email template, **From** address, and subject text, as well as support localization and custom one-time password (OTP) settings.
6371
-
6372
-
For more information, see [Custom email verification in Azure Active Directory B2C](../../active-directory-b2c/custom-email-sendgrid.md).
6373
-
6374
-
---
6375
-
6376
-
### Replacement of baseline policies with security defaults
6377
-
6378
-
**Type:** Changed feature
6379
-
**Service category:** Other
6380
-
**Product capability:** Identity Security and Protection
6381
-
6382
-
As part of a secure-by-default model for authentication, we're removing the existing baseline protection policies from all tenants. This removal is targeted for completion at the end of February. The replacement for these baseline protection policies is security defaults. If you've been using baseline protection policies, you must plan to move to the new security defaults policy or to Conditional Access. If you haven't used these policies, there is no action for you to take.
6383
-
6384
-
For more information about the new security defaults, see [What are security defaults?](./concept-fundamentals-security-defaults.md) For more information about Conditional Access policies, see [Common Conditional Access policies](../conditional-access/concept-conditional-access-policy-common.md).
Copy file name to clipboardExpand all lines: articles/aks/windows-faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,7 +106,7 @@ az aks update \
106
106
```
107
107
108
108
> [!IMPORTANT]
109
-
> Performing the `az aks update` operation upgrades only Windows Server node pools. Linux node pools are not affected.
109
+
> Performing the `az aks update` operation upgrades only Windows Server node pools and will cause a restart. Linux node pools are not affected.
110
110
>
111
111
> When you're changing `--windows-admin-password`, the new password must be at least 14 characters and meet [Windows Server password requirements][windows-server-password].
112
112
@@ -123,7 +123,7 @@ $cluster | Set-AzAksCluster
123
123
```
124
124
125
125
> [!IMPORTANT]
126
-
> Performing the `Set-AzAksCluster` operation upgrades only Windows Server node pools. Linux node pools are not affected.
126
+
> Performing the `Set-AzAksCluster` operation upgrades only Windows Server node pools and will cause a restart. Linux node pools are not affected.
127
127
>
128
128
> When you're changing the Windows administrator password, the new password must be at least 14 characters and meet [Windows Server password requirements][windows-server-password].
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/cache-how-to-functions.md
+21-20Lines changed: 21 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -232,21 +232,22 @@ public static void PubSubTrigger(
232
232
233
233
:::zone-end
234
234
235
-
### RedisListsTrigger
235
+
### RedisListTrigger
236
236
237
-
The `RedisListsTrigger` pops elements from a list and surfaces those elements to the function. The trigger polls Redis at a configurable fixed interval, and uses [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/)/[`LMPOP`](https://redis.io/commands/lmpop/) to pop elements from the lists.
237
+
The `RedisListTrigger` pops elements from a list and surfaces those elements to the function. The trigger polls Redis at a configurable fixed interval, and uses [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/)/[`LMPOP`](https://redis.io/commands/lmpop/) to pop elements from the lists.
238
238
239
-
#### Inputs for RedisListsTrigger
239
+
#### Inputs for RedisListTrigger
240
240
241
-
-`ConnectionString`: connection string to the redis cache, for example`<cacheName>.redis.cache.windows.net:6380,password=...`.
242
-
-`Keys`: Keys to read from, space-delimited.
241
+
-`ConnectionStringSetting`: connection string to the redis cache, for example`<cacheName>.redis.cache.windows.net:6380,password=...`.
242
+
-`Key`: Key or keys to read from, space-delimited.
243
243
- Multiple keys only supported on Redis 7.0+ using [`LMPOP`](https://redis.io/commands/lmpop/).
244
244
- Listens to only the first key given in the argument using [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/) on Redis versions less than 7.0.
245
+
- This field can be resolved using `INameResolver`
245
246
- (optional) `PollingIntervalInMs`: How often to poll Redis in milliseconds.
246
247
- Default: 1000
247
248
- (optional) `MessagesPerWorker`: How many messages each functions worker "should" process. Used to determine how many workers the function should scale to.
248
249
- Default: 100
249
-
- (optional) `BatchSize`: Number of elements to pull from Redis at one time.
250
+
- (optional) `Count`: Number of elements to pull from Redis at one time. These are processed in parallel.
250
251
- Default: 10
251
252
- Only supported on Redis 6.2+ using the `COUNT` argument in [`LPOP`](https://redis.io/commands/lpop/)/[`RPOP`](https://redis.io/commands/rpop/).
252
253
- (optional) `ListPopFromBeginning`: determines whether to pop elements from the beginning using [`LPOP`](https://redis.io/commands/lpop/) or to pop elements from the end using [`RPOP`](https://redis.io/commands/rpop/).
@@ -257,9 +258,9 @@ The following sample polls the key `listTest` at a localhost Redis instance at `
@@ -311,25 +312,25 @@ public static void ListsTrigger(
311
312
312
313
:::zone-end
313
314
314
-
### RedisStreamsTrigger
315
+
### RedisStreamTrigger
315
316
316
-
The `RedisStreamsTrigger` pops elements from a stream and surfaces those elements to the function.
317
+
The `RedisStreamTrigger` pops elements from a stream and surfaces those elements to the function.
317
318
The trigger polls Redis at a configurable fixed interval, and uses [`XREADGROUP`](https://redis.io/commands/xreadgroup/) to read elements from the stream.
319
+
The consumer group for all function instances will be the ID of the function. For example, for the StreamTrigger function in [this sample](https://github.com/Azure/azure-functions-redis-extension/blob/main/samples/dotnet/RedisSamples.cs), the consumer group would be `Microsoft.Azure.WebJobs.Extensions.Redis.Samples.RedisSamples.StreamTrigger`.
318
320
Each function creates a new random GUID to use as its consumer name within the group to ensure that scaled out instances of the function don't read the same messages from the stream.
319
321
320
-
#### Inputs for RedisStreamsTrigger
322
+
#### Inputs for RedisStreamTrigger
321
323
322
-
-`ConnectionString`: connection string to the redis cache, for example, `<cacheName>.redis.cache.windows.net:6380,password=...`.
323
-
-`Keys`: Keys to read from, space-delimited.
324
+
-`ConnectionStringSetting`: connection string to the redis cache, for example, `<cacheName>.redis.cache.windows.net:6380,password=...`.
325
+
-`Key`: Key or keys to read from, space-delimited.
- This field can be resolved using `INameResolver`.
325
328
- (optional) `PollingIntervalInMs`: How often to poll Redis in milliseconds.
326
329
- Default: 1000
327
330
- (optional) `MessagesPerWorker`: How many messages each functions worker "should" process. Used to determine how many workers the function should scale to.
328
331
- Default: 100
329
-
- (optional) `BatchSize`: Number of elements to pull from Redis at one time.
332
+
- (optional) `Count`: Number of elements to pull from Redis at one time.
330
333
- Default: 10
331
-
- (optional) `ConsumerGroup`: The name of the consumer group that the function uses.
332
-
- Default: "AzureFunctionRedisExtension"
333
334
- (optional) `DeleteAfterProcess`: If the listener will delete the stream entries after the function runs.
334
335
- Default: false
335
336
@@ -338,9 +339,9 @@ The following sample polls the key `streamTest` at a localhost Redis instance at
The way that you upgrade your Node.js version depends on the OS on which your function app runs.
1422
1422
1423
-
For Windows function apps, target the version in Azure by setting the `WEBSITE_NODE_DEFAULT_VERSION` [app setting](functions-how-to-use-azure-function-app-settings.md#settings) to a supported LTS version, such as `~18`.
1423
+
# [Windows](#tab/windows)
1424
1424
1425
-
# [Linux](#tab/linux-setting-the-node-version)
1425
+
When running on Windows, the Node.js version is set by the [`WEBSITE_NODE_DEFAULT_VERSION`](./functions-app-settings.md#website_node_default_version) application setting. This setting can be updated either by using the Azure CLI or in the Azure portal.
1426
1426
1427
-
For Linux function apps, run the following Azure CLI command to update the Node version.
1427
+
# [Linux](#tab/linux)
1428
1428
1429
-
```azurecli
1430
-
az functionapp config set --linux-fx-version "node|18"--name "<MY_APP_NAME>"--resource-group "<MY_RESOURCE_GROUP_NAME>"
1429
+
When running on Windows, the Node.js version is set by the [linuxfxversion](./functions-app-settings.md#linuxfxversion) site setting. This setting can be updated using the Azure CLI.
1430
+
1431
+
---
1432
+
1433
+
For more information about Node.js versions, see [Supported versions](#supported-versions).
1434
+
1435
+
Before upgrading your Node.js version, make sure your function app is running on the latest version of the Azure Functions runtime. If you need to upgrade your runtime version, see [Migrate apps from Azure Functions version 3.x to version 4.x](migrate-version-3-version-4.md?pivots=programming-language-javascript).
1436
+
1437
+
# [Azure CLI](#tab/azure-cli/windows)
1438
+
1439
+
Run the Azure CLI [`az functionapp config appsettings set`](/cli/azure/functionapp/config#az-functionapp-config-appsettings-set) command to update the Node.js version for your function app running on Windows:
1440
+
1441
+
```azurecli-interactive
1442
+
az functionapp config appsettings set --settings WEBSITE_NODE_DEFAULT_VERSION=~18 \
This sets the [`WEBSITE_NODE_DEFAULT_VERSION` application setting](./functions-app-settings.md#website_node_default_version) the supported LTS version of `~18`.
1447
+
1448
+
# [Azure portal](#tab/azure-portal/windows)
1449
+
1450
+
Use the following steps to change the Node.js version:
Run the Azure CLI [`az functionapp config set`](/cli/azure/functionapp/config#az-functionapp-config-set) command to update the Node.js version for your function app running on Linux:
1457
+
1458
+
```azurecli-interactive
1459
+
az functionapp config set --linux-fx-version "node|18"--name "<FUNCTION_APP_NAME>" \
1460
+
--resource-group "<RESOURCE_GROUP_NAME>"
1431
1461
```
1432
1462
1463
+
This sets the base image of the Linux function app to Node.js version 18.
1464
+
1465
+
# [Azure portal](#tab/azure-portal/linux)
1466
+
1467
+
>[!NOTE]
1468
+
> You can't change the Node.js version in the Azure portal when your function app is running on Linux in a Consumption plan. Instead use the Azure CLI.
1469
+
1470
+
For Premium and Dedicated plans, use the following steps to change the Node.js version:
To learn more about Azure Functions runtime support policy, refer to this [article](./language-support-policy.md).
1476
+
After changes are made, your function app restarts. To learn more about Functions support for Node.js, see [Language runtime support policy](./language-support-policy.md).
0 commit comments