Skip to content

Commit 1c2b20b

Browse files
authored
Merge pull request #42270 from MicrosoftDocs/master
5/25 AM Publish
2 parents 56771c0 + 10ba250 commit 1c2b20b

File tree

432 files changed

+3829
-4160
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

432 files changed

+3829
-4160
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -155,6 +155,12 @@
155155
"branch": "GuidedSetup",
156156
"branch_mapping": {}
157157
},
158+
{
159+
"path_to_root": "iot-samples-node",
160+
"url": "https://github.com/Azure-Samples/azure-iot-samples-node",
161+
"branch": "master",
162+
"branch_mapping": {}
163+
},
158164
{
159165
"path_to_root": "samples-cognitive-services-speech-sdk",
160166
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",

.openpublishing.redirection.json

Lines changed: 41 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2490,6 +2490,11 @@
24902490
"redirect_url": "/azure/automation/automation-create-runas-account",
24912491
"redirect_document_id": false
24922492
},
2493+
{
2494+
"source_path": "articles/automation/automation-alert-activity-log.md",
2495+
"redirect_url": "/azure/automation/automation-alert-metric",
2496+
"redirect_document_id": false
2497+
},
24932498
{
24942499
"source_path": "articles/automation/automation-remove-hrw.md",
24952500
"redirect_url": "/azure/automation/automation-hybrid-runbook-worker",
@@ -17952,7 +17957,7 @@
1795217957
},
1795317958
{
1795417959
"source_path": "articles/virtual-machines/windows/ps-extensions-diagnostics.md",
17955-
"redirect_url": "/azure/virtual-machines/extensions/diagnostics-powershell",
17960+
"redirect_url": "/azure/virtual-machines/extensions/diagnostics-windows",
1795617961
"redirect_document_id": false
1795717962
},
1795817963
{
@@ -18175,6 +18180,31 @@
1817518180
"redirect_url": "https://github.com/Azure/iot-edge/tree/master/v1/doc/module_development/iot-hub-iot-edge-create-module-java.md",
1817618181
"redirect_document_id": false
1817718182
},
18183+
{
18184+
"source_path": "articles/iot-hub/iot-hub-node-node-twin-how-to-configure.md",
18185+
"redirect_url": "/azure/iot-hub/tutorial-routing",
18186+
"redirect_document_id": false
18187+
},
18188+
{
18189+
"source_path": "articles/iot-hub/iot-hub-java-java-twin-how-to-configure.md",
18190+
"redirect_url": "/azure/iot-hub/tutorial-routing",
18191+
"redirect_document_id": false
18192+
},
18193+
{
18194+
"source_path": "articles/iot-hub/iot-hub-csharp-node-twin-how-to-configure.md",
18195+
"redirect_url": "/azure/iot-hub/tutorial-routing",
18196+
"redirect_document_id": false
18197+
},
18198+
{
18199+
"source_path": "articles/iot-hub/iot-hub-csharp-csharp-twin-how-to-configure.md",
18200+
"redirect_url": "/azure/iot-hub/tutorial-routing",
18201+
"redirect_document_id": false
18202+
},
18203+
{
18204+
"source_path": "articles/iot-hub/iot-hub-python-python-twin-how-to-configure.md",
18205+
"redirect_url": "/azure/iot-hub/tutorial-routing",
18206+
"redirect_document_id": false
18207+
},
1817818208
{
1817918209
"source_path": "articles/iot-suite/iot-suite-gateway-kit-get-started-sensortag.md",
1818018210
"redirect_url": "https://github.com/Azure/iot-edge/tree/master/v1/doc/connect_to_preconfigured_solutions/iot-suite-gateway-kit-get-started-sensortag.md",
@@ -21883,6 +21913,16 @@
2188321913
"source_path": "articles/application-gateway/create-waf-portal.md",
2188421914
"redirect_url": "/azure/application-gateway/application-gateway-web-application-firewall-portal",
2188521915
"redirect_document_id": false
21916+
},
21917+
{
21918+
"source_path": "articles/application-gateway/application-gateway-web-application-firewall-powershell.md",
21919+
"redirect_url": "/azure/application-gateway/tutorial-restrict-web-traffic-powershell",
21920+
"redirect_document_id": false
21921+
},
21922+
{
21923+
"source_path": "articles/application-gateway/application-gateway-web-application-firewall-cli.md",
21924+
"redirect_url": "/azure/application-gateway/tutorial-restrict-web-traffic-cli",
21925+
"redirect_document_id": false
2188621926
},
2188721927
{
2188821928
"source_path": "articles/active-directory/active-directory-conditional-access-vpn-connectivity-windows10.md",

articles/active-directory/active-directory-conditional-access-conditions.md

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -185,6 +185,65 @@ Applying this condition only to supported platforms is the equivalent to all dev
185185
- [Azure Active Directory app-based conditional access](active-directory-conditional-access-mam.md)
186186

187187

188+
### Legacy authentication
189+
190+
Conditional access now applies to older Office clients that do not support modern authentication as well as clients that use mail protocols like POP, IMAP, SMTP, etc. This allows you to configure policies like “block access from other clients”.
191+
192+
193+
#### How to get started
194+
195+
To enforce policies for legacy authentication flows, follow the steps below:
196+
1. Go to Conditional access and create a new policy.
197+
198+
2. Select the users and cloud apps and conditions as appropriate. We recommend testing the policy with a small set of users to understand the usage of “Other clients” in your organization.
199+
200+
3. Navigate to the client app condition and select "Other clients"
201+
202+
203+
204+
4. Select the access control you want to enforce for "Other clients". (Any control selection will lead to block access since the other clients are not able to enforce controls like MFA, device compliance, etc.).
205+
206+
207+
#### Known issues
208+
209+
- Configuring policy for “Other clients” will lead to blocking the entire organization from certain clients like SPConnect. This is due to these older clients authenticating in unexpected ways. This issue does not apply to the major Office applications like the older Office clients.
210+
211+
- It can take up to 24 hours for the policy to take effect.
212+
213+
214+
#### Frequently asked questions
215+
216+
**Will this block Exchange Web Services (EWS)?**
217+
218+
It depends on the authentication protocol that EWS is using. If the EWS application is using modern authentication, it will be covered by the "Mobile apps and desktop clients" client app. If the EWS application is using basic authentication, it will be covered by the “Other clients” client app.
219+
220+
221+
**What controls can I use for "Other clients**
222+
223+
Any control can be configured for "Other clients". However, the end user experience will be block access for all cases. "Other clients" do not support controls like MFA, compliant device, domain join, etc.
224+
225+
**What conditions can I use for "Other clients?"**
226+
227+
Any conditions can be configured for "Other clients".
228+
229+
**Does Exchange ActiveSync support all conditions and controls?**
230+
231+
No. Here is the summary of Exchange ActiveSync (EAS) support:
232+
233+
- EAS only supports user and group targeting. It doesn’t support guest, roles. If guest/role condition is configured, all users will get blocked since we cannot determine if the policy should apply to the user or not.
234+
235+
- EAS only works with Exchange as the cloud app.
236+
237+
- EAS does not support any condition except client app itself.
238+
239+
- EAS can be configured with any control (all except device compliance will lead to block).
240+
241+
**Do the policies apply to all client apps by default going forward?**
242+
243+
No. There is no change in the default policy behavior. The policies will continue to apply to browser and mobile applications/desktop clients by default.
244+
245+
246+
188247
## Next steps
189248

190249
- If you want to know how to configure a conditional access policy, see [get started with conditional access in Azure Active Directory](active-directory-conditional-access-azure-portal-get-started.md).

0 commit comments

Comments
 (0)