Skip to content

Commit 1478591

Browse files
authored
Merge pull request #47072 from MicrosoftDocs/master
7/19 PM Publish
2 parents 727a0d5 + a05ab93 commit 1478591

File tree

231 files changed

+3959
-1646
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

231 files changed

+3959
-1646
lines changed

.openpublishing.redirection.json

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26406,9 +26406,19 @@
2640626406
"redirect_document_id": false
2640726407
},
2640826408
{
26409-
"source_path": "articles/cognitive-services/LUIS/traffic-manager.md",
26410-
"redirect_url": "/azure/cognitive-services/LUIS/luis-traffic-manager",
26411-
"redirect_document_id": true
26412-
}
26409+
"source_path": "articles/cognitive-services/LUIS/traffic-manager.md",
26410+
"redirect_url": "/azure/cognitive-services/LUIS/luis-traffic-manager",
26411+
"redirect_document_id": true
26412+
},
26413+
{
26414+
"source_path": "articles/cognitive-services/LUIS/find-region-csharp.md",
26415+
"redirect_url": "/azure/cognitive-services/LUIS/luis-find-region-csharp",
26416+
"redirect_document_id": true
26417+
},
26418+
{
26419+
"source_path": "articles/cognitive-services/LUIS/find-region-nodejs.md",
26420+
"redirect_url": "/azure/cognitive-services/LUIS/luis-find-region-nodejs",
26421+
"redirect_document_id": true
26422+
}
2641326423
]
2641426424
}

articles/active-directory/active-directory-reporting-activity-sign-ins-errors.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,7 @@ The following section provides you with a complete overview of all possible erro
5656

5757
|Error|Description|
5858
|---|---|
59+
|16000|This is an internal implementation detail and not an error condition. You can safely ignore this reference.|
5960
|20001|There is an issue with your federated Identity Provider. Contact your IDP to resolve this issue.|
6061
|20012|There is an issue with your federated Identity Provider. Contact your IDP to resolve this issue.|
6162
|20033|There is an issue with your federated Identity Provider. Contact your IDP to resolve this issue.|
@@ -171,6 +172,7 @@ The following section provides you with a complete overview of all possible erro
171172
|81001|User's Kerberos ticket is too large. This can happen if the user is in too many groups and thus the Kerberos ticket contains too many group memberships. Reduce the user's group memberships and try again.|
172173
|81005|Authentication Package Not Supported|
173174
|81007|Tenant is not enabled for Seamless SSO|
175+
|81012|This is not an error condition. It indicates that user trying to sign in to Azure AD is different from the user signed into the device. You can safely ignore this code in the logs.|
174176
|90010|The request is not supported for various reasons. For example, the request is made using an unsupported request method (only POST method is supported) or the token signing algorithm that was requested is not supported. Contact the application developer.|
175177
|90014| A required field for a protocol message was missing, contact the application owner. If you are the application owner, ensure that you have all the necessary parameters for the login request. |
176178
|90072| The account needs to be added as an external user in the tenant first. Sign-out and sign-in again with a different Azure AD account.|

articles/active-directory/active-directory-reporting-api-getting-started-azure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ For detailed instructions, see the [prerequisites to access the Azure Active Dir
4646

4747
## APIs with Graph Explorer
4848

49-
You can use the [MSGraph explorer](https://developer.microsoft.com/en-us/graph/graph-explorer) to verify your sign-in and audit API data. Make sure to sign in to your account using both of the sign-in buttons in the Graph Explorer UI, and set **Tasks.ReadWrite** and **Directory.ReadAll** permissions for your tenant as shown.
49+
You can use the [MSGraph explorer](https://developer.microsoft.com/en-us/graph/graph-explorer) to verify your sign-in and audit API data. Make sure to sign in to your account using both of the sign-in buttons in the Graph Explorer UI, and set **AuditLog.Read.All** and **Directory.Read.All** permissions for your tenant as shown.
5050

5151
![Graph Explorer](./media/active-directory-reporting-api-getting-started-azure-portal/graph-explorer.png)
5252

Lines changed: 208 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,208 @@
1+
- name: Authentication Documentation
2+
href: index.yml
3+
- name: Overview
4+
items:
5+
- name: What is authentication?
6+
href: overview-authentication.md
7+
- name: Quickstart
8+
items:
9+
- name: Configure password reset
10+
href: quickstart-sspr.md
11+
- name: Tutorials
12+
items:
13+
- name: 1 Enable MFA for Applications
14+
href: tutorial-mfa-applications.md
15+
- name: 2 Enable a SSPR pilot
16+
href: tutorial-sspr-pilot.md
17+
- name: Enable SSPR on-premises integration
18+
href: tutorial-enable-writeback.md
19+
- name: Enable Windows 10 password reset
20+
href: tutorial-sspr-windows.md
21+
- name: Integrate Azure Identity Protection
22+
href: tutorial-risk-based-sspr-mfa.md
23+
- name: Concepts
24+
expanded: true
25+
items:
26+
- name: Authentication methods
27+
href: concept-authentication-methods.md
28+
- name: Self-service password reset
29+
items:
30+
- name: How password reset works
31+
href: concept-sspr-howitworks.md
32+
- name: Password reset options
33+
href: concept-sspr-customization.md
34+
- name: Password reset policies
35+
href: concept-sspr-policy.md
36+
- name: What license do I need?
37+
href: concept-sspr-licensing.md
38+
- name: On-premises integration
39+
href: concept-sspr-writeback.md
40+
- name: Multi-Factor Authentication
41+
items:
42+
- name: How MFA works
43+
href: concept-mfa-howitworks.md
44+
- name: What version is right?
45+
href: concept-mfa-whichversion.md
46+
- name: License your users
47+
href: concept-mfa-licensing.md
48+
- name: Create an Auth Provider
49+
href: concept-mfa-authprovider.md
50+
- name: Security guidance
51+
href: multi-factor-authentication-security-best-practices.md
52+
- name: MFA for Office 365
53+
href: https://support.office.com/article/Plan-for-multi-factor-authentication-for-Office-365-Deployments-043807b2-21db-4d5c-b430-c8a6dee0e6ba
54+
- name: MFA FAQ
55+
href: multi-factor-authentication-faq.md
56+
- name: Azure AD password protection
57+
items:
58+
- name: Eliminate weak passwords in the cloud
59+
href: concept-password-ban-bad.md
60+
- name: Eliminate weak passwords on-premises
61+
href: concept-password-ban-bad-on-premises.md
62+
- name: How-to guides
63+
items:
64+
- name: Password reset
65+
items:
66+
- name: Deploy password reset
67+
href: howto-sspr-deployment.md
68+
- name: Pre-register authentication data
69+
href: howto-sspr-authenticationdata.md
70+
- name: Enable password writeback
71+
href: howto-sspr-writeback.md
72+
- name: Cloud-based MFA
73+
items:
74+
- name: Deploy cloud-based MFA
75+
href: howto-mfa-getstarted.md
76+
- name: Per user MFA
77+
href: howto-mfa-userstates.md
78+
- name: User and device settings
79+
href: howto-mfa-userdevicesettings.md
80+
- name: Configure settings
81+
href: howto-mfa-mfasettings.md
82+
- name: Directory Federation
83+
items:
84+
- name: Windows Server 2016 AD FS Adapter
85+
href: https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa
86+
- name: Federation Services
87+
href: multi-factor-authentication-get-started-adfs.md
88+
- name: Use AD FS
89+
href: howto-mfa-adfs.md
90+
- name: RADIUS Integration
91+
items:
92+
- name: Use existing network policy servers
93+
href: howto-mfa-nps-extension.md
94+
- name: Advanced configuration for NPS extension
95+
href: howto-mfa-nps-extension-advanced.md
96+
- name: Remote Desktop Gateway
97+
href: howto-mfa-nps-extension-rdg.md
98+
- name: VPN
99+
href: howto-mfa-nps-extension-vpn.md
100+
- name: Banned password lists
101+
items:
102+
- name: Configure the banned password list
103+
href: howto-password-ban-bad.md
104+
- name: Deploy Azure AD password protection
105+
href: howto-password-ban-bad-on-premises.md
106+
- name: Configure Azure AD password protection
107+
href: howto-password-ban-bad-on-premises-operations.md
108+
- name: Monitor Azure AD password protection
109+
href: howto-password-ban-bad-on-premises-troubleshoot.md
110+
- name: Azure AD smart lockout
111+
href: howto-password-smart-lockout.md
112+
- name: Windows Hello for Business
113+
href: https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification
114+
- name: Certificate-based authentication
115+
items:
116+
- name: Get started with certificate auth
117+
href: ../active-directory-certificate-based-authentication-get-started.md
118+
items:
119+
- name: CBA on Android Devices
120+
href: ../active-directory-certificate-based-authentication-android.md
121+
- name: CBA on iOS Devices
122+
href: ../active-directory-certificate-based-authentication-ios.md
123+
- name: Develop
124+
items:
125+
- name: Build MFA into custom apps
126+
href: howto-mfa-sdk.md
127+
- name: Reporting
128+
items:
129+
- name: SSPR Reports
130+
href: howto-sspr-reporting.md
131+
- name: MFA Reports
132+
href: howto-mfa-reporting.md
133+
- name: Data collection
134+
href: howto-mfa-reporting-datacollection.md
135+
- name: MFA Server
136+
items:
137+
- name: Deploy MFA on-premises
138+
href: howto-mfaserver-deploy.md
139+
- name: Install the user portal
140+
href: howto-mfaserver-deploy-userportal.md
141+
- name: Mobile App Web Service
142+
href: howto-mfaserver-deploy-mobileapp.md
143+
- name: Configure high availability
144+
href: howto-mfaserver-deploy-ha.md
145+
- name: Upgrade MFA Server
146+
href: howto-mfaserver-deploy-upgrade.md
147+
- name: Upgrade from PhoneFactor
148+
href: howto-mfaserver-deploy-upgrade-pf.md
149+
- name: Windows Authentication
150+
href: howto-mfaserver-windows.md
151+
- name: IIS web apps
152+
href: howto-mfaserver-iis.md
153+
- name: Directory Integration
154+
items:
155+
- name: LDAP Authentication
156+
href: howto-mfaserver-dir-ldap.md
157+
- name: RADIUS Authentication
158+
href: howto-mfaserver-dir-radius.md
159+
- name: Active Directory
160+
href: howto-mfaserver-dir-ad.md
161+
- name: Directory Federation
162+
items:
163+
- name: Use AD FS 2.0
164+
href: howto-mfaserver-adfs-2.md
165+
- name: Use Windows Server 2012 R2 AD FS
166+
href: howto-mfaserver-adfs-2012.md
167+
- name: RADIUS Integration
168+
items:
169+
- name: Remote Desktop Gateway
170+
href: howto-mfaserver-nps-rdg.md
171+
- name: Advanced VPN Configurations
172+
href: howto-mfaserver-nps-vpn.md
173+
- name: NPS extension errors
174+
href: howto-mfa-nps-extension-errors.md
175+
- name: Troubleshoot
176+
items:
177+
- name: Troubleshoot SSPR
178+
href: active-directory-passwords-troubleshoot.md
179+
- name: SSPR FAQ
180+
href: active-directory-passwords-faq.md
181+
- name: MFA FAQ
182+
href: multi-factor-authentication-faq.md
183+
- name: NPS extension
184+
href: howto-mfa-nps-extension-errors.md
185+
- name: Reference
186+
items:
187+
- name: MFA user guide
188+
href: ./end-user/current/multi-factor-authentication-end-user.md
189+
- name: Code samples
190+
href: https://azure.microsoft.com/resources/samples/?service=active-directory
191+
- name: Azure PowerShell cmdlets
192+
href: /powershell/azure/overview
193+
- name: Service limits and restrictions
194+
href: ../users-groups-roles/directory-service-limits-restrictions.md
195+
- name: Resources
196+
items:
197+
- name: Azure feedback forum
198+
href: https://feedback.azure.com/forums/169401-azure-active-directory
199+
- name: MSDN forum
200+
href: https://social.msdn.microsoft.com/Forums/azure/en-US/home?forum=WindowsAzureAD
201+
- name: Pricing
202+
href: https://azure.microsoft.com/pricing/details/active-directory/
203+
- name: Service updates
204+
href: ../fundamentals/whats-new.md
205+
- name: Stack Overflow
206+
href: http://stackoverflow.com/questions/tagged/azure-active-directory
207+
- name: Videos
208+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory

articles/active-directory/authentication/active-directory-passwords-faq.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ description: Frequently asked questions about Azure AD self-service password res
55
services: active-directory
66
ms.service: active-directory
77
ms.component: authentication
8-
ms.topic: article
9-
ms.date: 01/11/2018
8+
ms.topic: conceptual
9+
ms.date: 07/11/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -112,7 +112,7 @@ This FAQ is split into the following sections:
112112
>
113113
* **Q: How can I educate my users about where to go to reset their passwords?**
114114

115-
> **A:** Try some of the suggestions in our [SSPR deployment](howto-sspr-deployment.md#email-based-rollout) article.
115+
> **A:** Try some of the suggestions in our [SSPR deployment](howto-sspr-deployment.md#sample-communication) article.
116116
>
117117
>
118118
* **Q: Can I use this page from a mobile device?**
@@ -167,7 +167,7 @@ This FAQ is split into the following sections:
167167
>
168168
* **Q: I configured my policy to require users to use security questions for reset, but the Azure administrators seem to be configured differently.**
169169

170-
> **A:** This is the expected behavior. Microsoft enforces a strong default two-gate password reset policy for any Azure administrator role. This prevents administrators from using security questions. You can find more information about this policy in the [Password policies and restrictions in Azure Active Directory](concept-sspr-policy.md#administrator-password-policy-differences) article.
170+
> **A:** This is the expected behavior. Microsoft enforces a strong default two-gate password reset policy for any Azure administrator role. This prevents administrators from using security questions. You can find more information about this policy in the [Password policies and restrictions in Azure Active Directory](concept-sspr-policy.md) article.
171171
>
172172
>
173173
* **Q: If a user has registered more than the maximum number of questions required to reset, how are the security questions selected during reset?**
@@ -271,7 +271,7 @@ This FAQ is split into the following sections:
271271
>
272272
* **Q: Is password writeback secure? How can I be sure I won’t get hacked?**
273273

274-
> **A:** Yes, password writeback is secure. To read more about the four layers of security implemented by the password writeback service, check out the [Password writeback security model](howto-sspr-writeback.md#password-writeback-security-model) section in the [Password writeback overview](howto-sspr-writeback.md) article.
274+
> **A:** Yes, password writeback is secure. To read more about the multiple layers of security implemented by the password writeback service, check out the [Password writeback security](concept-sspr-writeback.md#password-writeback-security) section in the [Password writeback overview](howto-sspr-writeback.md) article.
275275
>
276276
>
277277

articles/active-directory/authentication/active-directory-passwords-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ description: What can Azure AD self-service password reset do for your organizat
55
services: active-directory
66
ms.service: active-directory
77
ms.component: authentication
8-
ms.topic: article
9-
ms.date: 01/11/2018
8+
ms.topic: conceptual
9+
ms.date: 07/11/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo

articles/active-directory/authentication/active-directory-passwords-troubleshoot.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ description: Troubleshooting Azure AD self-service password reset
55
services: active-directory
66
ms.service: active-directory
77
ms.component: authentication
8-
ms.topic: article
9-
ms.date: 01/11/2018
8+
ms.topic: conceptual
9+
ms.date: 07/11/2018
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -77,7 +77,7 @@ Are you having a problem with Azure Active Directory (Azure AD) self-service pas
7777

7878
| Error | Solution |
7979
| --- | --- |
80-
| The password reset service does not start on-premises. Error 6800 appears in the Azure AD Connect machine’s application event log. <br> <br> After onboarding, federated, pass-through authentication, or password-hash-synchronized users can't reset their passwords. | When password writeback is enabled, the sync engine calls the writeback library to perform the configuration (onboarding) by communicating to the cloud onboarding service. Any errors encountered during onboarding or while starting the Windows Communication Foundation (WCF) endpoint for password writeback results in errors in the event sign in your Azure AD Connect machine. <br> <br> During restart of the Azure AD Sync (ADSync) service, if writeback was configured, the WCF endpoint starts up. But, if the startup of the endpoint fails, we will log event 6800 and let the sync service start up. The presence of this event means that the password writeback endpoint did not start up. Event log details for this event 6800, along with event log entries generate by the PasswordResetService component, indicate why you can't start up the endpoint. Review these event log errors and try to restart the Azure AD Connect if password writeback still isn’t working. If the problem persists, try to disable and then re-enable password writeback.
80+
| The password reset service does not start on-premises. Error 6800 appears in the Azure AD Connect machine’s application event log. <br> <br> After onboarding, federated, pass-through authentication, or password-hash-synchronized users can't reset their passwords. | When password writeback is enabled, the sync engine calls the writeback library to perform the configuration (onboarding) by communicating to the cloud onboarding service. Any errors encountered during onboarding or while starting the Windows Communication Foundation (WCF) endpoint for password writeback results in errors in the event log, on your Azure AD Connect machine. <br> <br> During restart of the Azure AD Sync (ADSync) service, if writeback was configured, the WCF endpoint starts up. But, if the startup of the endpoint fails, we will log event 6800 and let the sync service start up. The presence of this event means that the password writeback endpoint did not start up. Event log details for this event 6800, along with event log entries generate by the PasswordResetService component, indicate why you can't start up the endpoint. Review these event log errors and try to restart the Azure AD Connect if password writeback still isn’t working. If the problem persists, try to disable and then re-enable password writeback.
8181
| When a user attempts to reset a password or unlock an account with password writeback enabled, the operation fails. <br> <br> In addition, you see an event in the Azure AD Connect event log that contains: “Synchronization Engine returned an error hr=800700CE, message=The filename or extension is too long” after the unlock operation occurs. | Find the Active Directory account for Azure AD Connect and reset the password so that it contains no more than 127 characters. Then open the **Synchronization Service** from the **Start** menu. Browse to **Connectors** and find the **Active Directory Connector**. Select it and then select **Properties**. Browse to the **Credentials** page and enter the new password. Select **OK** to close the page. |
8282
| At the last step of the Azure AD Connect installation process, you see an error indicating that password writeback couldn't be configured. <br> <br> The Azure AD Connect application event log contains error 32009 with the text “Error getting auth token.” | This error occurs in the following two cases: <br><ul><li>You have specified an incorrect password for the global administrator account specified at the beginning of the Azure AD Connect installation process.</li><li>You have attempted to use a federated user for the global administrator account specified at the beginning of the Azure AD Connect installation process.</li></ul> To fix this problem, ensure that you're not using a federated account for the global administrator you specified at the beginning of the installation process. Also ensure that the password specified is correct. |
8383
| The Azure AD Connect machine event log contains error 32002 that is thrown by running PasswordResetService. <br> <br> The error reads: “Error Connecting to ServiceBus. The token provider was unable to provide a security token.” | Your on-premises environment isn't able to connect to the Azure Service Bus endpoint in the cloud. This error is normally caused by a firewall rule blocking an outbound connection to a particular port or web address. See [Connectivity prerequisites](./../connect/active-directory-aadconnect-prerequisites.md) for more info. After you have updated these rules, reboot the Azure AD Connect machine and password writeback should start working again. |

0 commit comments

Comments
 (0)