Skip to content

Commit 1e6463e

Browse files
committed
Merge branch 'release-preview-dsvm' of https://github.com/microsoftdocs/azure-docs-pr into release-preview-dsvm
2 parents d1ccac2 + 191c778 commit 1e6463e

File tree

2,911 files changed

+35887
-21411
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,911 files changed

+35887
-21411
lines changed

.openpublishing.redirection.json

Lines changed: 1292 additions & 81 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/page-layout.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/04/2019
11+
ms.date: 12/18/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -42,9 +42,9 @@ In your custom policies, you may have [ContentDefinitions](contentdefinitions.md
4242
</ContentDefinition>
4343
```
4444

45-
To select a page layout, you change the **DataUri** values in your [ContentDefinitions](contentdefinitions.md) in your policies. By switching from the old **DataUri** values to the new values, you're selecting an immutable package. The benefit of using this package is that you’ll know it won't change and cause unexpected behavior on your page.
45+
To select a page layout, you change the **DataUri** values in your [ContentDefinitions](contentdefinitions.md) in your policies. By switching from the old **DataUri** values to the new values, you're selecting an immutable package. The benefit of using this package is that you know it won't change and cause unexpected behavior on your page.
4646

47-
To set up a page layout, use the following table to find **DataUri** values.
47+
To specify a page layout in your custom policies that use an old **DataUri** value, insert `contract` between `elements` and the page type (for example, `selfasserted`), and specify the version number. For example:
4848

4949
| Old DataUri value | New DataUri value |
5050
| ----------------- | ----------------- |
@@ -64,17 +64,23 @@ To set up a page layout, use the following table to find **DataUri** values.
6464

6565
Page layout packages are periodically updated to include fixes and improvements in their page elements. The following change log specifies the changes introduced in each version.
6666

67-
### 1.2.0
67+
### 2.0.0
68+
69+
- Self-asserted page (`selfasserted`)
70+
- Added support for [display controls](display-controls.md) in custom policies.
71+
72+
### 1.2.0
73+
6874
- All pages
6975
- Accessibility fixes
7076
- You can now add the `data-preload="true"` attribute in your HTML tags to control the load order for CSS and JavaScript. Scenarios include:
71-
- Use this on your CSS link to load the CSS at the same time as your HTML so that it doesn't 'flicker' between loading the files
72-
- This attribute allows you to control the order in which your Script tags are fetched and executed before the page load
77+
- Use this on your CSS link to load the CSS at the same time as your HTML so that it doesn't 'flicker' between loading the files
78+
- This attribute allows you to control the order in which your Script tags are fetched and executed before the page load
7379
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
7480
- Support for Chrome translate
7581
- Unified and self-asserted page
7682
- The username/email and password fields now use the form HTML element. This will now allow Edge and IE to properly save this information
77-
83+
7884
### 1.1.0
7985

8086
- Exception page (globalexception)

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The certificate you request or create must meet the following requirements. Your
6161

6262
* **Trusted issuer** - The certificate must be issued by an authority trusted by computers connecting to the managed domain using secure LDAP. This authority may be a public CA or an Enterprise CA trusted by these computers.
6363
* **Lifetime** - The certificate must be valid for at least the next 3-6 months. Secure LDAP access to your managed domain is disrupted when the certificate expires.
64-
* **Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named *aadds.contoso.com*, the certificate's subject name must be **aadds.contoso.com*.
64+
* **Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named *aadds.contoso.com*, the certificate's subject name must be **.aadds.contoso.com*.
6565
* The DNS name or subject alternate name of the certificate must be a wildcard certificate to ensure the secure LDAP works properly with the Azure AD Domain Services. Domain Controllers use random names and can be removed or added to ensure the service remains available.
6666
* **Key usage** - The certificate must be configured for *digital signatures* and *key encipherment*.
6767
* **Certificate purpose** - The certificate must be valid for SSL server authentication.

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ You can take one of two approaches for requiring two-step verification, both of
2626

2727
**Enabled by changing user state** - This is the traditional method for requiring two-step verification and is discussed in this article. It works with both Azure MFA in the cloud and Azure MFA Server. Using this method requires users to perform two-step verification **every time** they sign in and overrides Conditional Access policies.
2828

29-
Enabled by Conditional Access policy - This is the most flexible means to enable two-step verification for your users. Enabling using Conditional Access policy only works for Azure MFA in the cloud and is a premium feature of Azure AD. More information on this method can be found in [Deploy cloud-based Azure Multi-Factor Authentication](howto-mfa-getstarted.md).
29+
**Enabled by Conditional Access policy** - This is the most flexible means to enable two-step verification for your users. Enabling using Conditional Access policy only works for Azure MFA in the cloud and is a premium feature of Azure AD. More information on this method can be found in [Deploy cloud-based Azure Multi-Factor Authentication](howto-mfa-getstarted.md).
3030

31-
Enabled by Azure AD Identity Protection - This method uses the Azure AD Identity Protection risk policy to require two-step verification based only on sign-in risk for all cloud applications. This method requires Azure Active Directory P2 licensing. More information on this method can be found in [Azure Active Directory Identity Protection](../identity-protection/howto-sign-in-risk-policy.md)
31+
**Enabled by Azure AD Identity Protection** - This method uses the Azure AD Identity Protection risk policy to require two-step verification based only on sign-in risk for all cloud applications. This method requires Azure Active Directory P2 licensing. More information on this method can be found in [Azure Active Directory Identity Protection](../identity-protection/howto-sign-in-risk-policy.md)
3232

3333
> [!Note]
3434
> More information about licenses and pricing can be found on the [Azure AD](https://azure.microsoft.com/pricing/details/active-directory/

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before enabling the new experience, review the article [Combined security inform
3636
Complete these steps to enable combined registration:
3737

3838
1. Sign in to the Azure portal as a user administrator or global administrator.
39-
2. Go to **Azure Active Directory** > **User settings** > **Manage settings for access panel preview features**.
39+
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
4040
3. Under **Users can use preview features for registering and managing security info**, choose to enable for a **Selected** group of users or for **All** users.
4141

4242
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info-preview.png)
@@ -63,7 +63,7 @@ The following policy applies to all selected users, who attempt to register usin
6363

6464
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6565

66-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Conditional Access**
66+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
6767
1. Select **New policy**
6868
1. In Name, Enter a Name for this policy. For example, **Combined Security Info Registration on Trusted Networks**
6969
1. Under **Assignments**, click **Users and groups**, and select the users and groups you want this policy to apply to

articles/active-directory/b2b/tutorial-bulk-invite.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,8 @@ ms.collection: M365-identity-device-management
2626
| This article describes a public preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|
2727
| |
2828

29+
> [!NOTE]
30+
> As of 12/22/2019, the Bulk invite users (Preview) feature has been temporarily disabled.
2931
3032
If you use Azure Active Directory (Azure AD) B2B collaboration to work with external partners, you can invite multiple guest users to your organization at the same time. In this tutorial, you learn how to use the Azure portal to send bulk invitations to external users. Specifically, you do the following:
3133

articles/active-directory/cloud-provisioning/concept-attributes.md

Lines changed: 35 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: 'Understanding the Azure AD schema and custom expressions'
3-
description: This topic describes the Azure AD schema, the attributes that the provisioning agent flows and custom expressions.
2+
title: 'Understand the Azure AD schema and custom expressions'
3+
description: This article describes the Azure AD schema, the attributes that the provisioning agent flows, and custom expressions.
44
services: active-directory
55
documentationcenter: ''
66
author: billmath
@@ -19,41 +19,41 @@ ms.collection: M365-identity-device-management
1919
---
2020

2121

22-
# Understanding the Azure AD schema
23-
An object in Azure AD, like any directory, is a programmatic high-level data construct that represents such things as users, groups, and contacts. When you create a new user or contact in Azure AD, you are creating a new instance of that object. These instances can be differentiated based on their properties.
22+
# Understand the Azure AD schema
23+
An object in Azure Active Directory (Azure AD), like any directory, is a programmatic high-level data construct that represents such things as users, groups, and contacts. When you create a new user or contact in Azure AD, you're creating a new instance of that object. These instances can be differentiated based on their properties.
2424

25-
Properties, in Azure AD are the elements responsible for storing information about an instance of an object in Azure AD.
25+
Properties in Azure AD are the elements responsible for storing information about an instance of an object in Azure AD.
2626

27-
The Azure AD schema defines the rules for which properties may be used in an entry, the kinds of values that those properties may have, and how users may interact with those values.
27+
The Azure AD schema defines the rules for which properties might be used in an entry, the kinds of values that those properties might have, and how users might interact with those values.
2828

29-
Azure AD has two types of properties. The properties are:
30-
- **Built in properties**Properties that are pre-defined by the Azure AD schema. These properties provide different uses and may or may not be accessible.
31-
- **Directory extensions**Properties that are provided so that you can customize Azure AD for your own use. For example, if you have extended your on-premises Active Directory with a certain attribute and want to flow that attribute, you can use one of the custom properties that are provided.
29+
Azure AD has two types of properties:
30+
- **Built-in properties**: Properties that are predefined by the Azure AD schema. These properties provide different uses and might or might not be accessible.
31+
- **Directory extensions**: Properties that are provided so that you can customize Azure AD for your own use. For example, if you've extended your on-premises Active Directory with a certain attribute and want to flow that attribute, you can use one of the custom properties that's provided.
3232

3333
## Attributes and expressions
34-
When an object, such as a user is provisioned to Azure AD, a new instance of the user object is created. This creation includes the properties of that object, which are also known as attributes. Initially, the newly created object will have its attributes set to values that are determined by the synchronization rules. These attributes are then kept up to date via the cloud provisioning agent.
34+
When an object such as a user is provisioned to Azure AD, a new instance of the user object is created. This creation includes the properties of that object, which are also known as attributes. Initially, the newly created object has its attributes set to values that are determined by the synchronization rules. These attributes are then kept up to date via the cloud provisioning agent.
3535

36-
![](media/concept-attributes/attribute1.png)
36+
![Object provisioning](media/concept-attributes/attribute1.png)
3737

38-
For example, if a user is part of the Marketing department, their Azure AD department attribute will initially be created when they are provisioned and then the value would be set to Marketing. But then, six months later, they change to Sales. Their on-premises AD department attribute is changed to Sales. This change will then synchronize to Azure AD and be reflected on their Azure AD user object.
38+
For example, a user might be part of a Marketing department. Their Azure AD department attribute is initially created when they're provisioned, and the value is set to Marketing. Six months later if they change to Sales, their on-premises Active Directory department attribute is changed to Sales. This change synchronizes to Azure AD and is reflected in their Azure AD user object.
3939

40-
Attribute synchronization may be either direct, where the value in Azure AD is directly set to the value of the on-premises attribute. Or, there may be a programmatic expression that handles this synchronization. A programmatic expression would be needed in cases where some logic or a determination needed to be made in order to populate the value.
40+
Attribute synchronization might be direct, where the value in Azure AD is directly set to the value of the on-premises attribute. Or, a programmatic expression might handle the synchronization. A programmatic expression is needed in cases where some logic or a determination must be made to populate the value.
4141

42-
For example, if I had my mail attribute ("[email protected]") and I needed to strip out the "@contoso.com" portion and flow just the value "john.smith" I would use something like this:
42+
For example, if you had the mail attribute "[email protected]" and needed to strip out the "@contoso.com" portion and flow only the value "john.smith," you'd use something like this:
4343

4444
`Replace([mail], "@contoso.com", , ,"", ,)`
4545

46-
**Sample input / output:** <br>
46+
**Sample input/output:** <br>
4747

4848
* **INPUT** (mail): "[email protected]"
49-
* **OUTPUT**: "john.smith"
49+
* **OUTPUT**: "john.smith"
5050

51-
For additional information, on writing custom expressions, and the syntax see [Writing Expressions for Attribute Mappings in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/functions-for-customizing-application-data).
51+
For more information on how to write custom expressions and the syntax, see [Writing expressions for attribute mappings in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/manage-apps/functions-for-customizing-application-data).
5252

53-
The following list are common attributes and how they are synchronized to Azure AD.
53+
The following table lists common attributes and how they're synchronized to Azure AD.
5454

5555

56-
|On-premises Active Directory|Mapping Type|Azure AD|
56+
|On-premises Active Directory|Mapping type|Azure AD|
5757
|-----|-----|-----|
5858
|cn|Direct|commonName
5959
|countryCode|Direct|countryCode|
@@ -63,14 +63,14 @@ The following list are common attributes and how they are synchronized to Azure
6363
|userprincipalName|Direct|userPrincipalName|
6464
|ProxyAdress|Direct|ProxyAddress|
6565

66-
## Viewing the schema
67-
In order to view the schema and verify it, do the following steps:
66+
## View the schema
67+
To view the schema and verify it, follow these steps.
6868

69-
1. Navigate to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
70-
2. Sign in with your global administrator account
71-
3. On the left, click **modify permissions** and ensure that **Directory.ReadWrite.All** is Consented.
72-
4. Run the following query: https://graph.microsoft.com/beta/serviceprincipals/. This query will return a list of service principals.
73-
5. Locate "appDisplayName": "Active Directory to Azure Active Directory Provisioning" and note the "id:" value.
69+
1. Go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
70+
1. Sign in with your global administrator account.
71+
1. On the left, select **modify permissions** and ensure that **Directory.ReadWrite.All** is *Consented*.
72+
1. Run the query https://graph.microsoft.com/beta/serviceprincipals/. This query returns a list of service principals.
73+
1. Locate `"appDisplayName": "Active Directory to Azure Active Directory Provisioning"` and note the value for `"id"`.
7474
```
7575
"value": [
7676
{
@@ -143,8 +143,8 @@ In order to view the schema and verify it, do the following steps:
143143
"passwordCredentials": []
144144
},
145145
```
146-
6. Replace the {Service Principal id} with your value and run the following query: `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal id}/synchronization/jobs/`
147-
7. Locate the "id": "AD2AADProvisioning.fd1c9b9e8077402c8bc03a7186c8f976" section and note the "id:".
146+
1. Replace `{Service Principal id}` with your value, and run the query `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal id}/synchronization/jobs/`.
147+
1. Locate `"id": "AD2AADProvisioning.fd1c9b9e8077402c8bc03a7186c8f976"` and note the value for `"id"`.
148148
```
149149
{
150150
"id": "AD2AADProvisioning.fd1c9b9e8077402c8bc03a7186c8f976",
@@ -235,16 +235,17 @@ In order to view the schema and verify it, do the following steps:
235235
]
236236
}
237237
```
238-
8. Now run the following query: `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal Id}/synchronization/jobs/{AD2AAD Provisioning id}/schema`
238+
1. Now run the query `https://graph.microsoft.com/beta/serviceprincipals/{Service Principal Id}/synchronization/jobs/{AD2AAD Provisioning id}/schema`.
239239
240-
Example: https://graph.microsoft.com/beta/serviceprincipals/653c0018-51f4-4736-a3a3-94da5dcb6862/synchronization/jobs/AD2AADProvisioning.e9287a7367e444c88dc67a531c36d8ec/schema
240+
Example: https://graph.microsoft.com/beta/serviceprincipals/653c0018-51f4-4736-a3a3-94da5dcb6862/synchronization/jobs/AD2AADProvisioning.e9287a7367e444c88dc67a531c36d8ec/schema
241241
242-
Replace the {Service Principal Id} and {AD2ADD Provisioning Id} with your values.
242+
Replace `{Service Principal Id}` and `{AD2ADD Provisioning Id}` with your values.
243243
244-
9. This query will return the schema.
245-
![](media/concept-attributes/schema1.png)
244+
1. This query returns the schema.
245+
246+
![Returned schema](media/concept-attributes/schema1.png)
246247
247-
## Next steps
248+
## Next steps
248249
249250
- [What is provisioning?](what-is-provisioning.md)
250251
- [What is Azure AD Connect cloud provisioning?](what-is-cloud-provisioning.md)

0 commit comments

Comments
 (0)