Skip to content

Commit 1f1c15e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into alerts-metric-create-templates
2 parents 4ff8e2e + 38714fb commit 1f1c15e

File tree

1,015 files changed

+25531
-8014
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,015 files changed

+25531
-8014
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -287,19 +287,19 @@
287287
{
288288
"path_to_root": "azure-search-javascript-samples",
289289
"url": "https://github.com/Azure-Samples/azure-search-javascript-samples",
290-
"branch": "master",
290+
"branch": "main",
291291
"branch_mapping": {}
292292
},
293293
{
294294
"path_to_root": "azure-search-dotnet-samples",
295295
"url": "https://github.com/Azure-Samples/azure-search-dotnet-samples",
296-
"branch": "master",
296+
"branch": "main",
297297
"branch_mapping": {}
298298
},
299299
{
300300
"path_to_root": "azure-search-python-samples",
301301
"url": "https://github.com/Azure-Samples/azure-search-python-samples",
302-
"branch": "master",
302+
"branch": "main",
303303
"branch_mapping": {}
304304
},
305305
{
@@ -374,12 +374,6 @@
374374
"branch": "master",
375375
"branch_mapping": {}
376376
},
377-
{
378-
"path_to_root": "media-services-v3-dotnet-quickstarts",
379-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-quickstarts",
380-
"branch": "master",
381-
"branch_mapping": {}
382-
},
383377
{
384378
"path_to_root": "media-services-v3-dotnet-tutorials",
385379
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-tutorials",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,11 @@
55
"redirect_url": "/azure/availability-zones/migrate-api-mgt",
66
"redirect_document_id": false
77
},
8+
{
9+
"source_path": "articles/api-management/breaking-changes/rp-source-ip-address-change-mar2023.md",
10+
"redirect_url": "/azure/api-management/breaking-changes/rp-source-ip-address-change-mar-2023",
11+
"redirect_document_id": false
12+
},
813
{
914
"source_path": "articles/api-management/developer-portal-implement-widgets.md",
1015
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
@@ -34262,6 +34267,11 @@
3426234267
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
3426334268
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
3426434269
"redirect_document_id": false
34270+
},
34271+
{
34272+
"source_path_from_root": "/articles/web-application-firewall/afds/waf-front-door-rate-limit-powershell.md",
34273+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-rate-limit-configure",
34274+
"redirect_document_id": true
3426534275
}
3426634276
]
3426734277
}

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,11 @@ sections:
164164
How are Windows Updates applied in Azure AD Domain Services?
165165
answer: |
166166
Domain controllers in a managed domain automatically apply required Windows updates. There's nothing for you to configure or administer here. Make sure you don't create network security group rules that block outbound traffic to Windows Updates. For your own VMs joined to the managed domain, you are responsible for configuring and applying any required OS and application updates.
167+
168+
- question: |
169+
Why do my domain controllers change names?
170+
answer: |
171+
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
167172
168173
- name: Billing and availability
169174
questions:

articles/active-directory/authentication/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
href: tutorial-enable-sspr.md
1212
- name: Enable Azure AD Multi-Factor Authentication
1313
href: tutorial-enable-azure-mfa.md
14-
- name: Enable cloud sync password writeback (preview)
14+
- name: Enable cloud sync password writeback
1515
href: tutorial-enable-cloud-sync-sspr-writeback.md
1616
- name: Enable password writeback to on-premises
1717
href: tutorial-enable-sspr-writeback.md

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ manager: amycolannino
1414
ms.reviewer: annaba
1515

1616
ms.collection: M365-identity-device-management
17-
ms.custom: has-adal-ref
17+
1818
---
1919
# Get started with certificate-based authentication in Azure Active Directory with federation
2020

@@ -37,7 +37,7 @@ This topic:
3737

3838
To configure CBA with federation, the following statements must be true:
3939

40-
- CBA with federation is only supported for Federated environments for browser applications, native clients using modern authentication (ADAL), or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts. To configure Azure AD CBA without needing federation, see [How to configure Azure AD certificate-based authentication](how-to-certificate-based-authentication.md).
40+
- CBA with federation is only supported for Federated environments for browser applications, native clients using modern authentication, or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts. To configure Azure AD CBA without needing federation, see [How to configure Azure AD certificate-based authentication](how-to-certificate-based-authentication.md).
4141
- The root certificate authority and any intermediate certificate authorities must be configured in Azure Active Directory.
4242
- Each certificate authority must have a certificate revocation list (CRL) that can be referenced via an internet-facing URL.
4343
- You must have at least one certificate authority configured in Azure Active Directory. You can find related steps in the [Configure the certificate authorities](#step-2-configure-the-certificate-authorities) section.

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/17/2022
9+
ms.date: 09/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -21,7 +21,7 @@ ms.custom: contperf-fy20q4
2121

2222
Microsoft recommends passwordless authentication methods such as Windows Hello, FIDO2 security keys, and the Microsoft Authenticator app because they provide the most secure sign-in experience. Although a user can sign-in using other common methods such as a username and password, passwords should be replaced with more secure authentication methods.
2323

24-
![Table of the strengths and preferred authentication methods in Azure AD](media/concept-authentication-methods/authentication-methods.png)
24+
:::image type="content" border="true" source="media/concept-authentication-methods/authentication-methods.png" alt-text="Illustration of the strengths and preferred authentication methods in Azure AD." :::
2525

2626
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to an SMS or phone call.
2727

@@ -40,6 +40,7 @@ The following table outlines the security considerations for the available authe
4040
| Windows Hello for Business | High | High | High |
4141
| Microsoft Authenticator app | High | High | High |
4242
| FIDO2 security key | High | High | High |
43+
| Certificate-based authentication (preview)| High | High | High |
4344
| OATH hardware tokens (preview) | Medium | Medium | High |
4445
| OATH software tokens | Medium | Medium | High |
4546
| SMS | Medium | High | Medium |
@@ -65,13 +66,14 @@ The following table outlines when an authentication method can be used during a
6566
| Windows Hello for Business | Yes | MFA\* |
6667
| Microsoft Authenticator app | Yes | MFA and SSPR |
6768
| FIDO2 security key | Yes | MFA |
69+
| Certificate-based authentication (preview) | Yes | No |
6870
| OATH hardware tokens (preview) | No | MFA and SSPR |
6971
| OATH software tokens | No | MFA and SSPR |
7072
| SMS | Yes | MFA and SSPR |
7173
| Voice call | No | MFA and SSPR |
7274
| Password | Yes | |
7375

74-
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work sucessfully.
76+
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work successfully.
7577
7678
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
7779

@@ -80,6 +82,7 @@ To learn more about how each authentication method works, see the following sepa
8082
* [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
8183
* [Microsoft Authenticator app](concept-authentication-authenticator-app.md)
8284
* [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
85+
* [Certificate-based authentication](concept-certificate-based-authentication.md)
8386
* [OATH hardware tokens (preview)](concept-authentication-oath-tokens.md#oath-hardware-tokens-preview)
8487
* [OATH software tokens](concept-authentication-oath-tokens.md#oath-software-tokens)
8588
* [SMS sign-in](howto-authentication-sms-signin.md) and [verification](concept-authentication-phone-options.md#mobile-phone-verification)

articles/active-directory/authentication/concept-fido2-hardware-vendor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.date: 08/02/2021
55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
8-
author: knicholasa
9-
ms.author: nichola
8+
author: martincoetzer
9+
ms.author: martinco
1010
ms.topic: conceptual
1111
ms.collection: M365-identity-device-management
1212
---

0 commit comments

Comments
 (0)