Skip to content

Commit 1da0fd7

Browse files
committed
Merge branch 'master' into kryalama/troubledocs
2 parents d3abb76 + 7ec4117 commit 1da0fd7

File tree

1,957 files changed

+17783
-15001
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,957 files changed

+17783
-15001
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
{:allowed-branchname-matches ["master" "release-.*"]
1+
{:allowed-branchname-matches ["main" "master" "release-.*"]
22
:allowed-filename-matches ["(?i)articles/(?:(?!active-directory/saas-apps/toc.yml))" "includes/"]}

.openpublishing.redirection.active-directory.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7167,14 +7167,24 @@
71677167
},
71687168
{
71697169
"source_path_from_root": "/articles/active-directory/users-groups-roles/roles-admin-units-add-manage-groups.md",
7170-
"redirect_url": "/azure/active-directory/roles/admin-units-add-manage-groups",
7171-
"redirect_document_id": true
7170+
"redirect_url": "/azure/active-directory/roles/admin-units-members-add",
7171+
"redirect_document_id": false
7172+
},
7173+
{
7174+
"source_path_from_root": "/articles/active-directory/roles/admin-units-add-manage-groups.md",
7175+
"redirect_url": "/azure/active-directory/roles/admin-units-members-add",
7176+
"redirect_document_id": false
71727177
},
71737178
{
71747179
"source_path_from_root": "/articles/active-directory/users-groups-roles/roles-admin-units-add-manage-users.md",
7175-
"redirect_url": "/azure/active-directory/roles/admin-units-add-manage-users",
7180+
"redirect_url": "/azure/active-directory/roles/admin-units-members-add",
71767181
"redirect_document_id": true
71777182
},
7183+
{
7184+
"source_path_from_root": "/articles/active-directory/roles/admin-units-add-manage-users.md",
7185+
"redirect_url": "/azure/active-directory/roles/admin-units-members-add",
7186+
"redirect_document_id": false
7187+
},
71787188
{
71797189
"source_path_from_root": "/articles/active-directory/users-groups-roles/roles-admin-units-assign-roles.md",
71807190
"redirect_url": "/azure/active-directory/roles/admin-units-assign-roles",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-configure-with-sentinel.md",
5+
"redirect_url": "/azure/sentinel/iot-solution",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-iot/device-builders/quickstart-building-the-defender-micro-agent-from-source.md",
510
"redirect_url": "/azure/defender-for-iot/device-builders/overview",
@@ -539,6 +544,16 @@
539544
"source_path_from_root": "/articles/defender-for-iot/troubleshoot-defender-micro-agent.md",
540545
"redirect_url": "/azure/defender-for-iot/device-builders/troubleshoot-defender-micro-agent",
541546
"redirect_document_id": false
547+
},
548+
{
549+
"source_path_from_root": "/articles/defender-for-iot/device-builders/concept-security-posture.md",
550+
"redirect_url": "/azure/defender-for-iot/device-builders/overview",
551+
"redirect_document_id": false
552+
},
553+
{
554+
"source_path_from_root": "/articles/defender-for-iot/device-builders/architecture-agent-based.md",
555+
"redirect_url": "/azure/defender-for-iot/device-builders/overview",
556+
"redirect_document_id": false
542557
}
543558
]
544559
}

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2393,6 +2393,16 @@
23932393
"redirect_url": "/azure/aks/windows-faq",
23942394
"redirect_document_id": false
23952395
},
2396+
{
2397+
"source_path_from_root": "/articles/aks/kubernetes-dashboard.md",
2398+
"redirect_url": "/azure/aks/kubernetes-portal",
2399+
"redirect_document_id": false
2400+
},
2401+
{
2402+
"source_path_from_root": "/articles/aks/egress.md",
2403+
"redirect_url": "/azure/aks/load-balancer-standard",
2404+
"redirect_document_id": false
2405+
},
23962406
{
23972407
"source_path_from_root": "/articles/analysis-services/analysis-services-create-model-portal.md",
23982408
"redirect_url": "/azure/analysis-services/analysis-services-overview",
@@ -44498,6 +44508,11 @@
4449844508
"redirect_url": "/azure/communication-services/concepts/telephony/port-phone-number",
4449944509
"redirect_document_id": false
4450044510
},
44511+
{
44512+
"source_path_from_root": "/articles/communication-services/quickstarts/voice-video-calling/pstn-call.md",
44513+
"redirect_url": "/azure/communication-services/quickstarts/telephony/pstn-call",
44514+
"redirect_document_id": false
44515+
},
4450144516
{
4450244517
"source_path_from_root": "/articles/communication-services/concepts/telephony-sms/concepts.md",
4450344518
"redirect_url": "/azure/communication-services/concepts/sms/concepts",

articles/active-directory-b2c/service-limits.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 12/21/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -38,13 +38,13 @@ The frequency of requests made to Azure AD B2C endpoints determine the overall t
3838

3939
|Endpoint |Endpoint type |Requests consumed |
4040
|-----------------------------|---------|------------------|
41-
|/oauth2/v2.0/authorize |Dynamic |Varies<sup>1</sup>|
41+
|/oauth2/v2.0/authorize |Dynamic |Varies <sup>1</sup>|
4242
|/oauth2/v2.0/token |Static |1 |
4343
|/openid/v2.0/userinfo |Static |1 |
4444
|/.well-known/openid-config |Static |1 |
4545
|/discovery/v2.0/keys |Static |1 |
4646
|/oauth2/v2.0/logout |Static |1 |
47-
|/samlp/sso/login |Dynamic |Varies<sup>1</sup>|
47+
|/samlp/sso/login |Dynamic |Varies <sup>1</sup>|
4848
|/samlp/sso/logout |Static |1 |
4949

5050
::: zone pivot="b2c-user-flow"
@@ -97,11 +97,13 @@ The token issuance rate of a Custom Policy is dependent on the number of request
9797
|Starter Pack |Scenario |User journey ID |Requests consumed|
9898
|---------|---------|---------|---------|
9999
|LocalAccounts| Sign-in| SignUpOrSignIn |2|
100+
|LocalAccounts SocialAndLocalAccounts | Sign-up| SignUpOrSignIn |6|
100101
|LocalAccounts|Profile edit| ProfileEdit |2|
101-
|LocalAccounts SocialAndLocalAccounts| PasswordReset| Password reset| 6|
102+
|LocalAccounts SocialAndLocalAccounts SocialAndLocalAccountsWithMfa| Password reset| PasswordReset| 6|
102103
|SocialAndLocalAccounts| Federated account sign-in|SignUpOrSignIn| 4|
103104
|SocialAndLocalAccounts| Federated account sign-up|SignUpOrSignIn| 6|
104105
|SocialAndLocalAccountsWithMfa| Local account sign-in with MFA|SignUpOrSignIn |6|
106+
|SocialAndLocalAccountsWithMfa| Local account sign-up with MFA|SignUpOrSignIn |10|
105107
|SocialAndLocalAccountsWithMfa| Federated account sign-in with MFA|SignUpOrSignIn| 8|
106108
|SocialAndLocalAccountsWithMfa| Federated account sign-up with MFA|SignUpOrSignIn |10|
107109

@@ -115,9 +117,9 @@ To obtain the token issuance rate per second for a particular user journey:
115117
Tokens/sec = 200/requests-consumed
116118
```
117119

118-
## Calculate the token issuance capability of your Custom Policy
120+
## Calculate the token issuance rate of your Custom Policy
119121

120-
When you create your own Custom Policy, the number of requests consumed at the dynamic endpoint depends on which features a user traverses through. The below table shows how many requests are consumed for each feature in your Custom Policy.
122+
You can craete your own Custom Policy to provide a unique authentication experience for your application. The number of requests consumed at the dynamic endpoint depends on which features a user traverses through your Custom Policy. The below table shows how many requests are consumed for each feature in a Custom Policy.
121123

122124
|Feature |Requests consumed|
123125
|-------------------------------------------------|-----------------|

articles/active-directory/app-provisioning/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ landingContent:
2222
links:
2323
- text: What is application provisioning?
2424
url: user-provisioning.md
25+
- text: What is HR-driven provisioning?
26+
url: what-is-hr-driven-provisioning.md
2527
- text: How provisioning works
2628
url: how-provisioning-works.md
2729
- linkListType: tutorial

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,10 @@ When a group is in scope and a member is out of scope, the group will be provisi
9191

9292
If a user and their manager are both in scope for provisioning, the service provisions the user and then updates the manager. If on day one the user is in scope and the manager is out of scope, we'll provision the user without the manager reference. When the manager comes into scope, the manager reference won't be updated until you restart provisioning and cause the service to reevaluate all the users again.
9393

94+
#### Global reader
95+
96+
The global reader role is unable to read the provisioning configuration. Please create a custom role with the `microsoft.directory/applications/synchronization/standard/read` permission in order to read the provisioning configuration from the Azure Portal.
97+
9498
## On-premises application provisioning
9599
The following information is a current list of known limitations with the Azure AD ECMA Connector Host and on-premises application provisioning.
96100

articles/active-directory/app-proxy/application-proxy-faq.yml

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ metadata:
99
ms.subservice: app-proxy
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/27/2021
12+
ms.date: 12/17/2021
1313
ms.author: kenwith
1414
ms.reviewer: ashishj
1515

@@ -270,11 +270,14 @@ sections:
270270
- name: WebSocket
271271
questions:
272272
- question: |
273-
Does WebSocket support work for applications other than QlikSense and Remote Desktop Web Client (HTML5)?
273+
Does Azure AD Application Proxy support the WebSocket protocol?
274274
answer: |
275-
Currently, WebSocket protocol support is still in public preview and it may not work for other applications. Some customers have had mixed success using WebSocket protocol with other applications.
276-
277-
Features (Eventlogs, PowerShell and Remote Desktop Services) in Windows Admin Center (WAC) do not work through Azure AD Application Proxy presently.
275+
Applications that use the WebSocket protocol, for example QlikSense and Remote Desktop Web Client (HTML5), are now supported. The following are known limitations:
276+
* Application proxy discards the cookie that is set on the server response while opening the WebSocket connection.
277+
* There is no SSO applied to the WebSocket request.
278+
* Features (Eventlogs, PowerShell and Remote Desktop Services) in the Windows Admin Center (WAC) do not work through Azure AD Application Proxy.
279+
280+
The WebSocket application doesn't have any unique publishing requirements, and can be [published](application-proxy-add-on-premises-application.md) the same way as all your other Application Proxy applications.
278281
279282
- name: Link translation
280283
questions:

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ manager: daveba
1414
ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
17-
ms.custom: has-adal-ref
17+
ms.custom:
1818
---
1919
# Resolve error messages from the NPS extension for Azure AD Multi-Factor Authentication
2020

@@ -26,7 +26,7 @@ If you encounter errors with the NPS extension for Azure AD Multi-Factor Authent
2626
| ---------- | --------------------- |
2727
| **CONTACT_SUPPORT** | [Contact support](#contact-microsoft-support), and mention the list of steps for collecting logs. Provide as much information as you can about what happened before the error, including tenant ID, and user principal name (UPN). |
2828
| **CLIENT_CERT_INSTALL_ERROR** | There may be an issue with how the client certificate was installed or associated with your tenant. Follow the instructions in [Troubleshooting the MFA NPS extension](howto-mfa-nps-extension.md#troubleshooting) to investigate client cert problems. |
29-
| **ESTS_TOKEN_ERROR** | Follow the instructions in [Troubleshooting the MFA NPS extension](howto-mfa-nps-extension.md#troubleshooting) to investigate client cert and ADAL token problems. |
29+
| **ESTS_TOKEN_ERROR** | Follow the instructions in [Troubleshooting the MFA NPS extension](howto-mfa-nps-extension.md#troubleshooting) to investigate client cert and security token problems. |
3030
| **HTTPS_COMMUNICATION_ERROR** | The NPS server is unable to receive responses from Azure AD MFA. Verify that your firewalls are open bidirectionally for traffic to and from https://adnotifications.windowsazure.com |
3131
| **HTTP_CONNECT_ERROR** | On the server that runs the NPS extension, verify that you can reach `https://adnotifications.windowsazure.com` and `https://login.microsoftonline.com/`. If those sites don't load, troubleshoot connectivity on that server. |
3232
| **NPS Extension for Azure AD MFA:** <br> NPS Extension for Azure AD MFA only performs Secondary Auth for Radius requests in AccessAccept State. Request received for User username with response state AccessReject, ignoring request. | This error usually reflects an authentication failure in AD or that the NPS server is unable to receive responses from Azure AD. Verify that your firewalls are open bidirectionally for traffic to and from `https://adnotifications.windowsazure.com` and `https://login.microsoftonline.com` using ports 80 and 443. It is also important to check that on the DIAL-IN tab of Network Access Permissions, the setting is set to "control access through NPS Network Policy". This error can also trigger if the user is not assigned a license. |
@@ -129,4 +129,4 @@ To collect debug logs for support diagnostics, use the following steps on the NP
129129
```
130130

131131
5. Open Registry Editor and browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa set **VERBOSE_LOG** to **FALSE**
132-
6. Zip the contents of the C:\NPS folder and attach the zipped file to the support case.
132+
6. Zip the contents of the C:\NPS folder and attach the zipped file to the support case.

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ manager: daveba
1414
ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
17-
ms.custom: has-adal-ref
17+
ms.custom:
1818
---
1919
# Integrate your existing Network Policy Server (NPS) infrastructure with Azure AD Multi-Factor Authentication
2020

@@ -361,7 +361,7 @@ After you run this command, go to the root of your *C:* drive, locate the file,
361361

362362
Check that your password hasn't expired. The NPS extension doesn't support changing passwords as part of the sign-in workflow. Contact your organization's IT Staff for further assistance.
363363

364-
### Why are my requests failing with ADAL token error?
364+
### Why are my requests failing with security token error?
365365

366366
This error could be due to one of several reasons. Use the following steps to troubleshoot:
367367

0 commit comments

Comments
 (0)