Skip to content

Commit 1731507

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nat-freshness-qs
2 parents e718e7a + a687d68 commit 1731507

File tree

337 files changed

+4315
-2088
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

337 files changed

+4315
-2088
lines changed

.whatsnew/.application-management.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
},
1818
"areas": [
1919
{
20-
"name": [ "."],
20+
"names": [ "."],
2121
"heading": "Azure Active Directory application management"
2222
}
2323
]

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 11/04/2022
7+
ms.date: 11/11/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -63,7 +63,7 @@ When a user goes through combined registration to set up the Authenticator app,
6363

6464
### AD FS adapter
6565

66-
The AD FS adapter supports number matching after installing an update. Earlier versions of Windows Server don't support number matching. On earlier versions, users will continue to see the **Approve**/**Deny** experience and won't see number matching until you upgrade.
66+
The AD FS adapter supports number matching after installing an update. Unpatched versions of Windows Server don't support number matching. Users will continue to see the **Approve**/**Deny** experience and won't see number matching unless these updates are applied.
6767

6868
| Version | Update |
6969
|---------|--------|

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/10/2022
9+
ms.date: 11/11/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -159,12 +159,6 @@ Depending on user activity, the data file can become outdated quickly. Any chang
159159
### Install MFA Server update
160160
Run the new installer on the Primary MFA Server. Before you upgrade a server, remove it from load balancing or traffic sharing with other MFA Servers. You don't need to uninstall your current MFA Server before running the installer. The installer performs an in-place upgrade using the current installation path (for example, C:\Program Files\Multi-Factor Authentication Server). If you're prompted to install a Microsoft Visual C++ 2015 Redistributable update package, accept the prompt. Both the x86 and x64 versions of the package are installed. It isn't required to install updates for User portal, Web SDK, or AD FS Adapter.
161161

162-
After the installation is complete, it can take several minutes for the datafile to be upgraded. During this time, the User portal may have issues connecting to the MFA Service. **Don't restart the MFA Service, or the MFA Server during this time.** This behavior is normal. Once the upgrade is complete, the primary server’s main service will again be functional.
163-
164-
You can check \Program Files\Multi-Factor Authentication Server\Logs\MultiFactorAuthSvc.log to see progress and make sure the upgrade is complete. **Completed performing tasks to upgrade from 23 to 24**.
165-
166-
If you have thousands of users, you might schedule the upgrade during a maintenance window and take the User portal offline during this time. To estimate how long the upgrade will take, plan on around 4 minutes per 10,000 users. You can minimize the time by cleaning up disabled or inactive users prior to the upgrade.
167-
168162
>[!NOTE]
169163
>After you run the installer on your primary server, secondary servers may begin to log **Unhandled SB** entries. This is due to schema changes made on the primary server that will not be recognized by secondary servers. These errors are expected. In environments with 10,000 users or more, the amount of log entries can increase significantly. To mitigate this issue, you can increase the file size of your MFA Server logs, or upgrade your secondary servers.
170164

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 06/23/2021
12+
ms.date: 11/11/2022
1313
ms.author: ryanwi
14-
ms.reviewer: lenalepa, sureshja, zachowd
14+
ms.reviewer: xurobert, brianokoyo
1515
ms.custom: contperf-fy21q4, aaddev
1616
---
1717

articles/active-directory/develop/index.yml

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ metadata:
1616
author: Dickson-Mwendia
1717
manager: CelesteDG
1818
ms.author: dmwendia
19-
ms.date: 04/01/2022
19+
ms.date: 11/11/2022
2020
ms.service: active-directory
2121
ms.subservice: develop
2222
ms.topic: hub-page
@@ -27,20 +27,29 @@ metadata:
2727
highlightedContent:
2828
items:
2929
- title: What is the Microsoft identity platform?
30-
itemType: overview # controls the icon image and super-title text
30+
itemType: overview
3131
url: v2-overview.md
3232
- title: Authentication & authorization basics
3333
url: authentication-vs-authorization.md
3434
itemType: concept
35-
# - title: OAuth 2.0 and OpenID Connect (OIDC)
36-
# url: active-directory-v2-protocols.md
37-
# itemType: concept
3835
- title: App types and authentication flows
3936
url: authentication-flows-app-scenarios.md
4037
itemType: concept
4138
- title: Code samples
4239
url: sample-v2-code.md
4340
itemType: sample
41+
- title: What's new in docs
42+
url: whats-new-docs.md
43+
itemType: whats-new
44+
- title: OAuth 2.0 and OpenID Connect (OIDC)
45+
url: active-directory-v2-protocols.md
46+
itemType: concept
47+
- title: Migrate apps to MSAL
48+
url: msal-migration.md
49+
itemType: concept
50+
- title: Register an application
51+
url: quickstart-register-app.md
52+
itemType: quickstart
4453
## BAND 1 - HIGHLIGHTED CONTENT END ##########################################################################################################################
4554

4655

@@ -88,7 +97,7 @@ productDirectory:
8897
## BAND 3 - CONCEPTUAL CONTENT #############################################################################################################################
8998
conceptualContent:
9099
title: Get started
91-
summary: Quick access to documentation for adding core IAM features to your applications and guidance on the best practices for keeping your apps secure and available.
100+
summary: Quick access to guidance on adding core IAM features to your applications and best practices for keeping your apps secure and available.
92101
items:
93102
## CARD 1 ######################
94103
- title: Sign in users

articles/active-directory/develop/mark-app-as-publisher-verified.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,10 @@ ms.service: active-directory
88
ms.subservice: develop
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 09/27/2021
11+
ms.date: 11/12/2022
1212
ms.author: ryanwi
1313
ms.custom: aaddev
14-
ms.reviewer: ardhanap, jesakowi
14+
ms.reviewer: xurobert, brianokoyo, ardhanap
1515
---
1616

1717
# Mark your app as publisher verified

articles/active-directory/external-identities/reset-redemption-status.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 06/16/2022
10+
ms.date: 11/11/2022
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -28,13 +28,21 @@ In this article, you'll learn how to update the [guest user's](user-properties.m
2828

2929
To manage these scenarios previously, you had to manually delete the guest user’s account from your directory and reinvite the user. Now you can use the Azure portal, PowerShell or the Microsoft Graph invitation API to reset the user's redemption status and reinvite the user while keeping the user's object ID, group memberships, and app assignments. When the user redeems the new invitation, the [UPN](../hybrid/plan-connect-userprincipalname.md#what-is-userprincipalname) of the user doesn't change, but the user's sign-in name changes to the new email. Then the user can sign in using the new email or an email you've added to the `otherMails` property of the user object.
3030

31+
## Required Azure AD roles
32+
33+
To reset a user's redemption status, you'll need one of the following roles:
34+
35+
- [Guest Inviter](../roles/permissions-reference.md#guest-inviter) (least privileged)
36+
- [User Administrator](../roles/permissions-reference.md#user-administrator)
37+
- [Global Administrator](../roles/permissions-reference.md#global-administrator)
38+
3139
## Use the Azure portal to reset redemption status
3240

33-
1. Sign in to the [Azure portal](https://portal.azure.com/) using a Global administrator or User administrator account for the directory.
34-
1. Search for and select **Azure Active Directory**.
35-
1. Select **Users**.
36-
1. In the list, select the user's name to open their user profile.
37-
1. If the user wants to sign in using a different email:
41+
1. Sign in to the [Azure portal](https://portal.azure.com/) using an account that has one of the [required Azure AD roles](#required-azure-ad-roles).
42+
2. Search for and select **Azure Active Directory**.
43+
3. Select **Users**.
44+
4. In the list, select the user's name to open their user profile.
45+
5. If the user wants to sign in using a different email:
3846
- Select **Edit properties**.
3947
- Select the **Contact Information** tab.
4048
- Next to **Email**, type the new email.

articles/active-directory/governance/lifecycle-workflow-tasks.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ For Microsoft Graph the parameters for the **Generate Temporary Access Pass and
181181

182182
### Add user to groups
183183

184-
Allows users to be added to cloud-only groups. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
184+
Allows users to be added to Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
185185

186186
You're able to customize the task name and description for this task.
187187
:::image type="content" source="media/lifecycle-workflow-task/add-group-task.png" alt-text="Screenshot of Workflows task: Add user to group task.":::
@@ -301,8 +301,8 @@ For Microsoft Graph the parameters for the **Run a Custom Task Extension** task
301301
|category | joiner, leaver |
302302
|displayName | Run a Custom Task Extension (Customizable by user) |
303303
|description | Run a Custom Task Extension to call-out to an external system. (Customizable by user) |
304-
|taskDefinitionId | "d79d1fcc-16be-490c-a865-f4533b1639ee |
305-
|argument | Argument contains a name parameter that is the "LogicAppURL", and a value parameter that is the Logic App HTTP trigger. |
304+
|taskDefinitionId | d79d1fcc-16be-490c-a865-f4533b1639ee |
305+
|argument | Argument contains a name parameter that is the "customTaskExtensionID", and a value parameter that is the ID of the previously created extension that contains information about the Logic App. |
306306

307307

308308

@@ -317,7 +317,7 @@ For Microsoft Graph the parameters for the **Run a Custom Task Extension** task
317317
"taskDefinitionId": "d79d1fcc-16be-490c-a865-f4533b1639ee",
318318
"arguments": [
319319
{
320-
"name": "CustomTaskExtensionID",
320+
"name": "customTaskExtensionID",
321321
"value": ""<ID of your Custom Task Extension>""
322322
}
323323
]
@@ -359,7 +359,7 @@ For Microsoft Graph the parameters for the **Disable user account** task are as
359359

360360
### Remove user from selected groups
361361

362-
Allows you to remove a user from cloud-only groups. Dynamic and Privileged Access Groups not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
362+
Allows users to be removed from Microsoft 365 and cloud-only security groups. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
363363

364364
You're able to customize the task name and description for this task in the Azure portal.
365365
:::image type="content" source="media/lifecycle-workflow-task/remove-group-task.png" alt-text="Screenshot of Workflows task: Remove user from select groups.":::
@@ -398,7 +398,7 @@ For Microsoft Graph the parameters for the **Remove user from selected groups**
398398

399399
### Remove users from all groups
400400

401-
Allows users to be removed from every cloud-only group they're a member of. Dynamic and Privileged Access Groups not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
401+
Allows users to be removed from every Microsoft 365 and cloud-only security group they're a member of. Mail-enabled, distribution, dynamic and privileged access groups are not supported. To control access to on-premises applications and resources, you need to enable group writeback. For more information, see [Azure AD Connect group writeback](../hybrid/how-to-connect-group-writeback-v2.md).
402402

403403

404404
You're able to customize the task name and description for this task in the Azure portal.

articles/active-directory/hybrid/four-steps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ Security logs and reports provide you with an electronic record of suspicious ac
164164

165165
### Assign least privileged admin roles for operations
166166

167-
As you think about your approach to operations, there are a couple levels of administration to consider. The first level places the burden of administration on your global administrator(s). Always using the global administrator role, might be appropriate for smaller companies. But for larger organizations with help desk personnel and administrators responsible for specific tasks, assigning the role of global administrator can be a security risk since it provides those individuals with the ability to manage tasks that are above and beyond what they should be capable of doing.
167+
As you think about your approach to operations, there are a couple levels of administration to consider. The first level places the burden of administration on your Hybrid Identity Administrator(s). Always using the Hybrid Identity Administrator role, might be appropriate for smaller companies. But for larger organizations with help desk personnel and administrators responsible for specific tasks, assigning the role of Hybrid Identity Administrator can be a security risk since it provides those individuals with the ability to manage tasks that are above and beyond what they should be capable of doing.
168168

169169
In this case, you should consider the next level of administration. Using Azure AD, you can designate end users as "limited administrators" who can manage tasks in less-privileged roles. For example, you might assign your help desk personnel the [security reader](../roles/permissions-reference.md#security-reader) role to provide them with the ability to manage security-related features with read-only access. Or perhaps it makes sense to assign the [authentication administrator](../roles/permissions-reference.md#authentication-administrator) role to individuals to give them the ability to reset non-password credentials or read and configure Azure Service Health.
170170

articles/active-directory/hybrid/how-to-bypassdirsyncoverrides.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,4 +138,4 @@ Clear-ADSyncToolsDirSyncOverridesUser '[email protected]' -MobilePhoneInAAD -Alt
138138

139139
## Next Steps
140140

141-
Learn more about [Azure AD Connect: ADSyncTools PowerShell Module](reference-connect-adsynctools.md)
141+
Learn more about [Azure AD Connect: ADSyncTools PowerShell Module](reference-connect-adsynctools.md)

0 commit comments

Comments
 (0)