Skip to content

Commit 17fe5fe

Browse files
authored
Merge pull request #48808 from MicrosoftDocs/master
8/10 PM Publish
2 parents 387d7ed + 3be724b commit 17fe5fe

File tree

168 files changed

+2563
-895
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

168 files changed

+2563
-895
lines changed

.openpublishing.redirection.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9842,12 +9842,22 @@
98429842
},
98439843
{
98449844
"source_path": "articles/machine-learning/cortana-intelligence-appsource-evaluation-tool.md",
9845-
"redirect_url": "/azure/machine-learning/team-data-science-process/cortana-intelligence-appsource-evaluation-tool",
9845+
"redirect_url": "https://azure.microsoft.com/overview/ai-platform/",
9846+
"redirect_document_id": false
9847+
},
9848+
{
9849+
"source_path": "articles/machine-learning/team-data-science-process/cortana-intelligence-appsource-evaluation-tool.md",
9850+
"redirect_url": "https://azure.microsoft.com/overview/ai-platform/",
98469851
"redirect_document_id": false
98479852
},
98489853
{
98499854
"source_path": "articles/machine-learning/cortana-intelligence-appsource-publishing-guide.md",
9850-
"redirect_url": "/azure/machine-learning/team-data-science-process/cortana-intelligence-appsource-publishing-guide",
9855+
"redirect_url": "https://azure.microsoft.com/overview/ai-platform/",
9856+
"redirect_document_id": false
9857+
},
9858+
{
9859+
"source_path": "articles/machine-learning/team-data-science-process/cortana-intelligence-appsource-publishing-guide.md",
9860+
"redirect_url": "https://azure.microsoft.com/overview/ai-platform/",
98519861
"redirect_document_id": false
98529862
},
98539863
{

articles/active-directory/authentication/concept-password-ban-bad.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -51,11 +51,10 @@ Each time a user resets or changes their Azure AD password it flows through this
5151

5252
## License requirements
5353

54-
The benefits of the global banned password list apply to all users of Azure Active Directory (Azure AD).
55-
56-
The custom banned password list requires Azure AD Basic licenses.
57-
58-
Azure AD password protection for Windows Server Active Directory requires Azure AD Premium licenses.
54+
| | Azure AD password protection with global banned password list | Azure AD password protection with custom banned password list|
55+
| --- | --- | --- |
56+
| Cloud-only users | Azure AD Free | Azure AD Basic |
57+
| Users synchronized from on-premises Windows Server Active Directory | Azure AD Premium P1 or P2 | Azure AD Premium P1 or P2 |
5958

6059
Additional licensing information, including costs, can be found on the [Azure Active Directory pricing site](https://azure.microsoft.com/pricing/details/active-directory/).
6160

articles/active-directory/authentication/concept-sspr-howitworks.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,9 @@ When using a mobile app, like the Microsoft Authenticator app, as a method for p
9292

9393
Users do not have the option to register their mobile app when registering for self-service password reset from [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup). Users can register their mobile app at [https://aka.ms/mfasetup](https://aka.ms/mfasetup), or in the new security info registration preview at [https://aka.ms/setupsecurityinfo](https://aka.ms/setupsecurityinfo).
9494

95+
> [!WARNING]
96+
> You must enable the [Converged registration for self-service password reset and Azure Multi-Factor Authentication (Public preview)](concept-registration-mfa-sspr-converged.md) before users will be able to access the new experience at [https://aka.ms/setupsecurityinfo](https://aka.ms/setupsecurityinfo).
97+
9598
### Change authentication methods
9699

97100
If you start with a policy that has only one required authentication method for reset or unlock registered and you change that to two methods, what happens?

articles/active-directory/authentication/howto-mfa-nps-extension-rdg.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ The Remote Desktop Gateway needs to be configured as a RADIUS client to the NPS
263263
### Configure Network Policy
264264
Recall that the NPS server with the Azure MFA extension is the designated central policy store for the Connection Authorization Policy (CAP). Therefore, you need to implement a CAP on the NPS server to authorize valid connections requests.
265265

266-
1. In the NPS (Local) console, expand **Policies**, and click **Network Policies**.
266+
1. On the NPS Server, open the NPS (Local) console, expand **Policies**, and click **Network Policies**.
267267
2. Right-click **Connections to other access servers**, and click **Duplicate policy**.
268268

269269
![Duplicate Policy](./media/howto-mfa-nps-extension-rdg/image19.png)

articles/active-directory/conditional-access/conditions.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ ms.reviewer: calebb
2525

2626
# What are conditions in Azure Active Directory conditional access?
2727

28-
You can control how authorized users access your cloud apps by using [Azure Active Directory (Azure AD) conditional access](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-azure-portal). In a conditional access policy, you define the response to the reason for triggering your policy. An example response is **Then do this**. An example reason is **When this happens**.
28+
You can control how authorized users access your cloud apps by using [Azure Active Directory (Azure AD) conditional access](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-azure-portal). In a conditional access policy, you define the response ("Then do this") to the reason for triggering your policy ("When this happens").
2929

3030
![Reason and response](./media/conditions/10.png)
3131

@@ -69,17 +69,20 @@ The **cloud apps** condition is mandatory in a conditional access policy. In you
6969

7070
![Include cloud apps](./media/conditions/03.png)
7171

72-
- Select **All cloud apps** to baseline policies to apply to the entire organization. Use this selection for policies that require multifactor authentication when sign-in risk is detected for any cloud app. A policy applied to **All cloud apps** applies to access to all websites and services. This setting isn't limited to the cloud apps that appear on the **Select apps** list.
72+
Select:
7373

74-
- Select individual cloud apps to target specific services by policy. For example, you can require users to have a [compliant device](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-mam#app-based-or-compliant-device-policy-for-exchange-online-and-sharepoint-online) to access SharePoint Online. This policy is also applied to other services when they access SharePoint content. An example is Microsoft Teams.
74+
- **All cloud apps** to baseline policies to apply to the entire organization. Use this selection for policies that require multifactor authentication when sign-in risk is detected for any cloud app. A policy applied to **All cloud apps** applies to access to all websites and services. This setting isn't limited to the cloud apps that appear on the **Select apps** list.
75+
76+
- Individual cloud apps to target specific services by policy. For example, you can require users to have a [compliant device](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-mam#app-based-or-compliant-device-policy-for-exchange-online-and-sharepoint-online) to access SharePoint Online. This policy is also applied to other services when they access SharePoint content. An example is Microsoft Teams.
7577

7678
You can exclude specific apps from a policy. However, these apps are still subject to the policies applied to the services they access.
7779

7880

7981

8082
## Sign-in risk
8183

82-
A sign-in risk is an indicator of the high, medium, or low likelihood that a sign-in attempt wasn't made by the legitimate owner of a user account. Azure AD calculates the sign-in risk level during a user's sign-in. The calculated sign-in risk level can be a condition in a conditional access policy.
84+
A sign-in risk is an indicator of the likelihood (high, medium, or low) that a sign-in attempt wasn't made by the legitimate owner of a user account. Azure AD calculates the sign-in risk level during a user's sign-in.
85+
You can use the calculated sign-in risk level as condition in a conditional access policy.
8386

8487
![Sign-in risk levels](./media/conditions/22.png)
8588

articles/active-directory/connect/active-directory-aadconnect-accounts-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Which permissions you require depends on the optional features you enable. If yo
116116

117117
| Feature | Permissions |
118118
| --- | --- |
119-
| msDS-ConsistencyGuid feature |Write permissions to the msDS-ConsistencyGuid attribute documented in [Design Concepts - Using msDS-ConsistencyGuid as sourceAnchor](active-directory-aadconnect-design-concepts.md#using-msds-consistencyguid-as-sourceanchor). |
119+
| ms-DS-ConsistencyGuid feature |Write permissions to the ms-DS-ConsistencyGuid attribute documented in [Design Concepts - Using ms-DS-ConsistencyGuid as sourceAnchor](active-directory-aadconnect-design-concepts.md#using-ms-ds-consistencyguid-as-sourceanchor). |
120120
| Password hash sync |<li>Replicate Directory Changes</li> <li>Replicate Directory Changes All |
121121
| Exchange hybrid deployment |Write permissions to the attributes documented in [Exchange hybrid writeback](active-directory-aadconnectsync-attributes-synchronized.md#exchange-hybrid-writeback) for users, groups, and contacts. |
122122
| Exchange Mail Public Folder |Read permissions to the attributes documented in [Exchange Mail Public Folder](active-directory-aadconnectsync-attributes-synchronized.md#exchange-mail-public-folder) for public folders. |

articles/active-directory/connect/active-directory-aadconnect-design-concepts.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: article
1515
ms.tgt_pltfrm: na
1616
ms.workload: Identity
17-
ms.date: 05/30/2018
17+
ms.date: 08/10/2018
1818
ms.component: hybrid
1919
ms.author: billmath
2020

@@ -68,20 +68,20 @@ For this reason, the following restrictions apply to Azure AD Connect:
6868
* If you install another Azure AD Connect server, then you must select the same sourceAnchor attribute as previously used. If you have earlier been using DirSync and move to Azure AD Connect, then you must use **objectGUID** since that is the attribute used by DirSync.
6969
* If the value for sourceAnchor is changed after the object has been exported to Azure AD, then Azure AD Connect sync throws an error and does not allow any more changes on that object before the issue has been fixed and the sourceAnchor is changed back in the source directory.
7070

71-
## Using msDS-ConsistencyGuid as sourceAnchor
72-
By default, Azure AD Connect (version 1.1.486.0 and older) uses objectGUID as the sourceAnchor attribute. ObjectGUID is system-generated. You cannot specify its value when creating on-premises AD objects. As explained in section [sourceAnchor](#sourceanchor), there are scenarios where you need to specify the sourceAnchor value. If the scenarios are applicable to you, you must use a configurable AD attribute (for example, msDS-ConsistencyGuid) as the sourceAnchor attribute.
71+
## Using ms-DS-ConsistencyGuid as sourceAnchor
72+
By default, Azure AD Connect (version 1.1.486.0 and older) uses objectGUID as the sourceAnchor attribute. ObjectGUID is system-generated. You cannot specify its value when creating on-premises AD objects. As explained in section [sourceAnchor](#sourceanchor), there are scenarios where you need to specify the sourceAnchor value. If the scenarios are applicable to you, you must use a configurable AD attribute (for example, ms-DS-ConsistencyGuid) as the sourceAnchor attribute.
7373

74-
Azure AD Connect (version 1.1.524.0 and after) now facilitates the use of msDS-ConsistencyGuid as sourceAnchor attribute. When using this feature, Azure AD Connect automatically configures the synchronization rules to:
74+
Azure AD Connect (version 1.1.524.0 and after) now facilitates the use of ms-DS-ConsistencyGuid as sourceAnchor attribute. When using this feature, Azure AD Connect automatically configures the synchronization rules to:
7575

76-
1. Use msDS-ConsistencyGuid as the sourceAnchor attribute for User objects. ObjectGUID is used for other object types.
76+
1. Use ms-DS-ConsistencyGuid as the sourceAnchor attribute for User objects. ObjectGUID is used for other object types.
7777

78-
2. For any given on-premises AD User object whose msDS-ConsistencyGuid attribute isn't populated, Azure AD Connect writes its objectGUID value back to the msDS-ConsistencyGuid attribute in on-premises Active Directory. After the msDS-ConsistencyGuid attribute is populated, Azure AD Connect then exports the object to Azure AD.
78+
2. For any given on-premises AD User object whose ms-DS-ConsistencyGuid attribute isn't populated, Azure AD Connect writes its objectGUID value back to the ms-DS-ConsistencyGuid attribute in on-premises Active Directory. After the ms-DS-ConsistencyGuid attribute is populated, Azure AD Connect then exports the object to Azure AD.
7979

8080
>[!NOTE]
81-
> Once an on-premises AD object is imported into Azure AD Connect (that is, imported into the AD Connector Space and projected into the Metaverse), you cannot change its sourceAnchor value anymore. To specify the sourceAnchor value for a given on-premises AD object, configure its msDS-ConsistencyGuid attribute before it is imported into Azure AD Connect.
81+
> Once an on-premises AD object is imported into Azure AD Connect (that is, imported into the AD Connector Space and projected into the Metaverse), you cannot change its sourceAnchor value anymore. To specify the sourceAnchor value for a given on-premises AD object, configure its ms-DS-ConsistencyGuid attribute before it is imported into Azure AD Connect.
8282
8383
### Permission required
84-
For this feature to work, the AD DS account used to synchronize with on-premises Active Directory must be granted write permission to the msDS-ConsistencyGuid attribute in on-premises Active Directory.
84+
For this feature to work, the AD DS account used to synchronize with on-premises Active Directory must be granted write permission to the ms-DS-ConsistencyGuid attribute in on-premises Active Directory.
8585

8686
### How to enable the ConsistencyGuid feature - New installation
8787
You can enable the use of ConsistencyGuid as sourceAnchor during new installation. This section covers both Express and Custom installation in details.
@@ -100,7 +100,7 @@ When installing Azure AD Connect with Express mode, the Azure AD Connect wizard
100100
>[!NOTE]
101101
> Only newer versions of Azure AD Connect (1.1.524.0 and after) stores information in your Azure AD tenant about the sourceAnchor attribute used during installation. Older versions of Azure AD Connect do not.
102102
103-
* If information about the sourceAnchor attribute used isn't available, the wizard checks the state of the msDS-ConsistencyGuid attribute in your on-premises Active Directory. If the attribute isn't configured on any object in the directory, the wizard uses the msDS-ConsistencyGuid as the sourceAnchor attribute. If the attribute is configured on one or more objects in the directory, the wizard concludes the attribute is being used by other applications and is not suitable as sourceAnchor attribute...
103+
* If information about the sourceAnchor attribute used isn't available, the wizard checks the state of the ms-DS-ConsistencyGuid attribute in your on-premises Active Directory. If the attribute isn't configured on any object in the directory, the wizard uses the ms-DS-ConsistencyGuid as the sourceAnchor attribute. If the attribute is configured on one or more objects in the directory, the wizard concludes the attribute is being used by other applications and is not suitable as sourceAnchor attribute...
104104

105105
* In which case, the wizard falls back to using objectGUID as the sourceAnchor attribute.
106106

@@ -136,15 +136,15 @@ To switch from objectGUID to ConsistencyGuid as the Source Anchor attribute:
136136

137137
3. Enter your Azure AD Administrator credentials and click **Next**.
138138

139-
4. Azure AD Connect wizard analyzes the state of the msDS-ConsistencyGuid attribute in your on-premises Active Directory. If the attribute isn't configured on any object in the directory, Azure AD Connect concludes that no other application is currently using the attribute and is safe to use it as the Source Anchor attribute. Click **Next** to continue.
139+
4. Azure AD Connect wizard analyzes the state of the ms-DS-ConsistencyGuid attribute in your on-premises Active Directory. If the attribute isn't configured on any object in the directory, Azure AD Connect concludes that no other application is currently using the attribute and is safe to use it as the Source Anchor attribute. Click **Next** to continue.
140140

141141
![Enable ConsistencyGuid for existing deployment - step 4](./media/active-directory-aadconnect-design-concepts/consistencyguidexistingdeployment02.png)
142142

143143
5. In the **Ready to Configure** screen, click **Configure** to make the configuration change.
144144

145145
![Enable ConsistencyGuid for existing deployment - step 5](./media/active-directory-aadconnect-design-concepts/consistencyguidexistingdeployment03.png)
146146

147-
6. Once the configuration completes, the wizard indicates that msDS-ConsistencyGuid is now being used as the Source Anchor attribute.
147+
6. Once the configuration completes, the wizard indicates that ms-DS-ConsistencyGuid is now being used as the Source Anchor attribute.
148148

149149
![Enable ConsistencyGuid for existing deployment - step 6](./media/active-directory-aadconnect-design-concepts/consistencyguidexistingdeployment04.png)
150150

@@ -166,7 +166,7 @@ If you are managing AD FS outside of Azure AD Connect or you are using third-par
166166
![Third-party federation configuration](./media/active-directory-aadconnect-design-concepts/consistencyGuid-03.png)
167167

168168
### Adding new directories to existing deployment
169-
Suppose you have deployed Azure AD Connect with the ConsistencyGuid feature enabled, and now you would like to add another directory to the deployment. When you try to add the directory, Azure AD Connect wizard checks the state of the mSDS-ConsistencyGuid attribute in the directory. If the attribute is configured on one or more objects in the directory, the wizard concludes the attribute is being used by other applications and returns an error as illustrated in the diagram below. If you are certain that the attribute isn't used by existing applications, you need to contact Support for information on how to suppress the error.
169+
Suppose you have deployed Azure AD Connect with the ConsistencyGuid feature enabled, and now you would like to add another directory to the deployment. When you try to add the directory, Azure AD Connect wizard checks the state of the ms-DS-ConsistencyGuid attribute in the directory. If the attribute is configured on one or more objects in the directory, the wizard concludes the attribute is being used by other applications and returns an error as illustrated in the diagram below. If you are certain that the attribute isn't used by existing applications, you need to contact Support for information on how to suppress the error.
170170

171171
![Adding new directories to existing deployment](./media/active-directory-aadconnect-design-concepts/consistencyGuid-04.png)
172172

0 commit comments

Comments
 (0)