Skip to content

Commit 17d6b92

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into device-management-azure-portal
2 parents 26e1aac + 17cad7a commit 17d6b92

File tree

552 files changed

+6641
-3678
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

552 files changed

+6641
-3678
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/manage-apps/common-scenarios.md",
5+
"redirect_url": "/azure/active-directory/manage-apps/what-is-application-management",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/active-directory/manage-apps/application-management-fundamentals.md",
10+
"redirect_url": "/azure/active-directory/manage-apps/what-is-application-management",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-limitations.md",
515
"redirect_url": "/azure/active-directory/azuread-dev/azure-ad-endpoint-comparison",

.openpublishing.redirection.iot-hub.json

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -938,7 +938,6 @@
938938
"redirect_url": "/azure/iot-hub/tutorial-x509-scripts",
939939
"redirect_document_id": false
940940
},
941-
942941
{
943942
"source_path_from_root": "/articles/iot-hub/iot-hub-gateway-kit-c-iot-gateway-connect-device-to-cloud.md",
944943
"redirect_url": "https://github.com/Azure/iot-edge/tree/master/v1/doc/commercial_gateway_kit/iot-hub-gateway-kit-c-iot-gateway-connect-device-to-cloud.md",
@@ -1005,7 +1004,11 @@
10051004
"redirect_url": "https://github.com/Azure/iot-edge/tree/master/v1/samples/simulated_device_cloud_upload/iot-hub-windows-iot-edge-simulated-device.md",
10061005
"redirect_document_id": false
10071006
},
1008-
1007+
{
1008+
"source_path_from_root": "/articles/iot-hub/tutorial-firmware-update.md",
1009+
"redirect_url": "/azure/iot-hub-device-update/device-update-raspberry-pi",
1010+
"redirect_document_id": false
1011+
}
10091012

10101013
]
10111014
}

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23653,6 +23653,11 @@
2365323653
"redirect_url": "https://notebooks.azure.com",
2365423654
"redirect_document_id": false
2365523655
},
23656+
{
23657+
"source_path_from_root": "/articles/notebooks/quickstart-export-jupyter-notebook-project.md",
23658+
"redirect_url": "https://notebooks.azure.com",
23659+
"redirect_document_id": false
23660+
},
2365623661
{
2365723662
"source_path_from_root": "/articles/notification-hubs/configure-android-device-messaging.md",
2365823663
"redirect_url": "/azure/notification-hubs/configure-google-firebase-cloud-messaging",
@@ -44238,6 +44243,21 @@
4423844243
"redirect_url": "/azure/azure-monitor/logs/log-powerbi",
4423944244
"redirect_document_id": false
4424044245
},
44246+
{
44247+
"source_path_from_root": "/articles/azure-monitor/deploy.md",
44248+
"redirect_url": "/azure/azure-monitor/best-practices",
44249+
"redirect_document_id": false
44250+
},
44251+
{
44252+
"source_path_from_root": "/articles/azure-monitor/deploy-scale.md",
44253+
"redirect_url": "/azure/azure-monitor/best-practices",
44254+
"redirect_document_id": false
44255+
},
44256+
{
44257+
"source_path_from_root": "/articles/azure-monitor/visualizations.md",
44258+
"redirect_url": "/azure/azure-monitor/best-practices-analysis",
44259+
"redirect_document_id": false
44260+
},
4424144261
{
4424244262
"source_path_from_root": "/articles/load-balancer/tutorial-load-balancer-standard-manage-portal.md",
4424344263
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-portal",

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -225,10 +225,9 @@ Now, grant permissions to the API scope you exposed earlier in the *IdentityExpe
225225
1. Select the **My APIs** tab, then select the **IdentityExperienceFramework** application.
226226
1. Under **Permission**, select the **user_impersonation** scope that you defined earlier.
227227
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
228-
1. Select **Grant admin consent for (your tenant name)**.
229-
1. Select your currently signed-in administrator account, or sign in with an account in your Azure AD B2C tenant that's been assigned at least the *Cloud application administrator* role.
230-
1. Select **Accept**.
231-
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status** for the scopes - offline_access, openid and user_impersonation. It might take a few minutes for the permissions to propagate.
228+
1. Select **Grant admin consent for *<your tenant name)>***.
229+
1. Select **Yes**.
230+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status** for the scope.
232231

233232
* * *
234233

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@
5858
href: /office365/admin/security-and-compliance/set-up-multi-factor-authentication
5959
- name: FAQ
6060
href: multi-factor-authentication-faq.yml
61+
- name: Operator assistance
62+
href: concept-authentication-operator-assistance.md
6163
- name: Password protection
6264
items:
6365
- name: Combined password policy check
Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
---
2+
title: Operator assistance in Azure Active Directory
3+
description: Learn about deprecation of operator assistance feature in Azure Active Directory
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: conceptual
9+
ms.date: 10/19/2021
10+
11+
ms.author: justinha
12+
author: justinha
13+
manager: daveba
14+
ms.reviewer: ripull
15+
16+
ms.collection: M365-identity-device-management
17+
---
18+
# How to enable and disable operator assistance
19+
20+
Operator assistance is a feature within Azure AD that allows an operator to manually transfer phone calls instead of automatic transfer. When this setting is enabled, the office phone number is dialed and when answered, the system asks the operator to transfer the call to a given extension.
21+
22+
Operator assistance can be enabled for an entire tenant or for an individual user. If the setting is **On**, the entire tenant is enabled for operator assistance. If you choose **Phone call** as the default method and have an extension specified as part of your office phone number (delineated by **x**), an operator can manually transfer the phone call.
23+
24+
For example, let's say a customer in U.S has an office phone number 425-555-1234x5678. When operator assistance is enabled, the system will dial 425-555-1234. Once answered, the customer (also known as the operator) is asked to transfer the call to extension 5678. Once transferred and answered, the system recites the normal MFA prompt and awaits approval.
25+
26+
If the setting is **Off**, the system will automatically dial extensions as part of the phone number. Your admin can still specify individual users who should be enabled for operator assistance by prefixing the extension with ‘@’. For example, 425-555-1234x@5678 would indicate that operator assistance should be used, even though the setting is **Off**.
27+
28+
You can check the status of this feature in your own tenant by navigating to the [Azure AD portal](https://ms.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade), then in the left pane, click **Security** > **MFA** > **Phone call settings**. Check **Operator required to transfer extensions** to see if the setting is **On** or **Off**.
29+
30+
![Screenshot of operator assistance settings](./media/concept-authentication-operator-assistance/settings.png)
31+
32+
You can improve the reliability, security, and create a frictionless MFA experience by using the following guidance:
33+
34+
- You have [registered a direct phone number](https://aka.ms/mfasetup) (contains no extension) or [other method](concept-authentication-methods.md) to be used for Multi-Factor Authentication or self-service password reset if enabled.
35+
- Your admins have registered a direct phone number (contains no extension) on behalf of the user to be used for [Multi-Factor Authentication](howto-mfa-userdevicesettings.md#add-authentication-methods-for-a-user) or [self-service password reset](tutorial-enable-sspr.md) if enabled.
36+
- Phone system supports automated attendant functionality.
37+

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ The following providers offer FIDO2 security keys of different form factors that
142142
| IDmelon Technologies Inc. | ![y] | ![y]| ![y]| ![y]| ![n] | https://www.idmelon.com/#idmelon |
143143
| Kensington | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.kensington.com/solutions/product-category/why-biometrics/ |
144144
| KONA I | ![y] | ![n]| ![y]| ![y]| ![n] | https://konai.com/business/security/fido |
145-
| NeoWave | ![n] | ![y]| ![y]| ![n]| ![n] | https://neowave.fr/en/products/fido-range/ |
145+
| NEOWAVE | ![n] | ![y]| ![y]| ![n]| ![n] | https://neowave.fr/en/products/fido-range/ |
146146
| Nymi | ![y] | ![n]| ![y]| ![n]| ![n] | https://www.nymi.com/nymi-band |
147147
| Octatco | ![y] | ![y]| ![n]| ![n]| ![n] | https://octatco.com/ |
148148
| OneSpan Inc. | ![n] | ![y]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
53.8 KB
Loading

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 03/17/2021
10+
ms.date: 10/18/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -21,7 +21,8 @@ You need the following to use Azure AD Connect cloud sync:
2121

2222
- Domain Administrator or Enterprise Administrator credentials to create the Azure AD Connect Cloud Sync gMSA (group Managed Service Account) to run the agent service.
2323
- A hybrid identity administrator account for your Azure AD tenant that is not a guest user.
24-
- An on-premises server for the provisioning agent with Windows 2016 or later. This server should be a tier 0 server based on the [Active Directory administrative tier model](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material).
24+
- An on-premises server for the provisioning agent with Windows 2016 or later. This server should be a tier 0 server based on the [Active Directory administrative tier model](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material). Installing the agent on a domain controller is supported.
25+
- High availability refers to the Azure AD Connect cloud sync's ability to operate continuously without failure for a long time. By having multiple active agents installed and running, Azure AD Connect cloud sync can continue to function even if one agent should fail. Microsoft recommends having 3 active agents installed for high availability.
2526
- On-premises firewall configurations.
2627

2728
## Group Managed Service Accounts

articles/active-directory/cloud-sync/reference-cloud-sync-faq.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ metadata:
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2021
11+
ms.date: 10/18/2021
1212
ms.subservice: hybrid
1313
ms.author: billmath
1414
ms.collection: M365-identity-device-management
@@ -114,6 +114,10 @@ sections:
114114
Does Azure AD Connect cloud sync support large groups?
115115
answer: |
116116
Yes. Today we support up to 50K group members synchronized using the OU scope filtering.
117+
- question: |
118+
Does the cloud provisioning agent load balance if I have multiple agents installed?
119+
answer: |
120+
No. Only one agent is ever active.
117121
additionalContent: |
118122
119123
## Next steps

0 commit comments

Comments
 (0)