Skip to content

Commit 1db1ed1

Browse files
authored
Merge branch 'MicrosoftDocs:main' into docs-editor/extend-sentinel-across-workspa-1679320204
2 parents eae57e9 + 6e85608 commit 1db1ed1

File tree

518 files changed

+28402
-28219
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

518 files changed

+28402
-28219
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,6 @@
11
{
22
"redirections": [
3-
{
4-
"source_path_from_root": "/articles/azure-monitor/snapshot-debugger/snapshot-debugger-troubleshoot.md",
5-
"redirect_url": "https://learn.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/snapshot-debugger-troubleshoot",
6-
"redirect_document_id": false
7-
},
8-
{
3+
{
94
"source_path_from_root": "/articles/azure-monitor/best-practices.md",
105
"redirect_url": "/azure/azure-monitor/getting-started",
116
"redirect_document_id": false

.openpublishing.redirection.deployment-environments.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,11 @@
1414
"source_path_from_root": "/articles/deployment-environments/tutorial-create-and-configure-projects.md",
1515
"redirect_url": "/azure/deployment-environments/quickstart-create-and-configure-projects",
1616
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/deployment-environments/how-to-configure-use-cli.md",
20+
"redirect_url": "https://aka.ms/CLI-reference",
21+
"redirect_document_id": false
1722
}
1823
]
1924
}

.openpublishing.redirection.dev-box.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,11 @@
99
"source_path_from_root": "/articles/dev-box/quickstart-configure-dev-box-project.md",
1010
"redirect_url": "/azure/dev-box/quickstart-configure-dev-box-service",
1111
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/dev-box/cli-reference-subset.md",
15+
"redirect_url": "https://aka.ms/CLI-reference",
16+
"redirect_document_id": false
1217
}
1318
]
1419
}

.openpublishing.redirection.json

Lines changed: 22461 additions & 22450 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/faq.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -261,6 +261,11 @@ sections:
261261
262262
1. Retrieve the `RefreshToken` again.
263263
264+
- question: |
265+
I use multiple tabs in a web browser to sign in to multiple applications that I registered in the same Azure AD B2C tenant. When I try to perform a single sign out, not all of the applications are signed out. Why does this happen?
266+
answer: |
267+
Currently, Azure AD B2C doesn't support single sign out for this specific scenario. It's caused by cookie contention as all the applications operates on the same cookie simultaneously.
268+
264269
- question: |
265270
How do I report issues with Azure AD B2C?
266271
answer: |

articles/active-directory-b2c/identity-provider-generic-openid-connect.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,7 @@ Define the OpenId Connect identity provider by adding it to the **ClaimsProvider
8181
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="email" />
8282
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" AlwaysUseDefaultValue="true" />
8383
<OutputClaim ClaimTypeReferenceId="identityProvider" PartnerClaimType="iss" />
84+
<OutputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="oid"/>
8485
</OutputClaims>
8586
<OutputClaimsTransformations>
8687
<OutputClaimsTransformation ReferenceId="CreateRandomUPNUserName"/>

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 17 additions & 17 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/scim-validator-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/17/2023
11+
ms.date: 03/20/2023
1212
ms.custom: template-tutorial
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/17/2023
11+
ms.date: 03/20/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -19,27 +19,13 @@ ms.collection: M365-identity-device-management
1919

2020
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both multifactor authentication and SSPR. We recommend this video on [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ)
2121

22-
> [!NOTE]
23-
> Effective Oct. 1st, 2022, we will begin to enable combined registration for all users in Azure AD tenants created before August 15th, 2020. Tenants created after this date are enabled with combined registration.
24-
25-
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
26-
27-
> [!div class="nextstepaction"]
28-
> [Enable combined security registration](howto-registration-mfa-sspr-combined.md)
2922

3023
![My Account showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defaults-registered.png)
3124

3225
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout.
3326

3427
Azure AD combined security information registration is available for Azure US Government but not Azure China 21Vianet.
3528

36-
> [!IMPORTANT]
37-
> Users that are enabled for both the original preview and the enhanced combined registration experience see the new behavior. Users that are enabled for both experiences see only the My Account experience. The *My Account* aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Account by going to [https://myaccount.microsoft.com](https://myaccount.microsoft.com).
38-
>
39-
> You can set **Require users to register when signing in** to **Yes** to require all users to register when signing in, ensuring that all users are protected.
40-
>
41-
> You might encounter an error message while trying to access the Security info option, such as, "Sorry, we can't sign you in". Confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
42-
4329
*My Account* pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.
4430

4531
If you want to force a specific language, you can add `?lng=<language>` to the end of the URL, where `<language>` is the code of the language you want to render.
@@ -131,6 +117,10 @@ Users can access manage mode by going to [https://aka.ms/mysecurityinfo](https:/
131117

132118
## Key usage scenarios
133119

120+
### Protect Security info registration with Conditional Access
121+
To secure when and how users register for Azure AD Multi-Factor Authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Azure AD Multi-Factor Authentication and SSPR from a central location, such as a trusted network location during HR onboarding. Learn more on how to configure [common Conditional Access policies for securing security info registration.](../conditional-access/howto-conditional-access-policy-registration.md)
122+
123+
134124
### Set up security info during sign-in
135125

136126
An admin has enforced registration.

0 commit comments

Comments
 (0)