Skip to content

Commit 2073f51

Browse files
authored
Merge pull request #247285 from MicrosoftDocs/main
8/3/2023 PM Publish
2 parents 0edcbed + 7704309 commit 2073f51

File tree

555 files changed

+3860
-2406
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

555 files changed

+3860
-2406
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@
1010
"redirect_url": "/azure/active-directory/develop/enterprise-app-role-management",
1111
"redirect_document_id": false
1212
},
13+
{
14+
"source_path_from_root": "/articles/active-directory/governance/tutorial-prepare-azure-ad-user-accounts.md",
15+
"redirect_url": "/azure/active-directory/governance/tutorial-prepare-user-accounts",
16+
"redirect_document_id": false
17+
},
1318
{
1419
"source_path_from_root": "/articles/active-directory/develop/active-directory-schema-extensions.md",
1520
"redirect_url": "/azure/active-directory/develop/schema-extensions",

.openpublishing.redirection.sentinel.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,11 @@
174174
"source_path": "articles/sentinel/data-connectors/zoom-reports-using-azure-function.md",
175175
"redirect_url": "/azure/sentinel/data-connectors/zoom-reports-using-azure-functions",
176176
"redirect_document_id": true
177+
},
178+
{
179+
"source_path": "articles/sentinel/store-logs-in-azure-data-explorer.md",
180+
"redirect_url": "/azure/azure-monitor/logs/data-retention-archive",
181+
"redirect_document_id": true
177182
}
178183
]
179184
}

articles/active-directory-b2c/enable-authentication-python-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ In the root folder of your web app, create the `templates` folder. In the templa
190190

191191
Add the following templates under the templates folder. These templates extend the `base.html` template:
192192

193-
- **index.html**: the home page of the web app. The templates use the following logic: if a user doesn't sign-in, it renders the sing-in button. If users sings-in, it renders the access token's claims, link to edit profile, and call a Graph API.
193+
- **index.html**: the home page of the web app. The templates use the following logic: if a user doesn't sign in, it renders the sign-in button. If a user signs in, it renders the access token's claims, link to edit profile, and call a Graph API.
194194

195195
```html
196196
{% extends "base.html" %}

articles/active-directory/app-provisioning/on-premises-sap-connector-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer: arvinh
1414
---
1515

1616
# Configuring Azure AD to provision users into SAP ECC 7.0
17-
The following documentation provides configuration and tutorial information demonstrating how to provision users from Azure AD into SAP ERP Central Component (SAP ECC) 7.0.
17+
The following documentation provides configuration and tutorial information demonstrating how to provision users from Azure AD into SAP ERP Central Component (SAP ECC) 7.0. If you are using other versions such as SAP R/3, you can still use the guides provided in the [download center](https://www.microsoft.com/download/details.aspx?id=51495) as a reference to build your own template and configure provisioning.
1818

1919

2020
[!INCLUDE [app-provisioning-sap.md](../../../includes/app-provisioning-sap.md)]

articles/active-directory/architecture/5-secure-access-b2b.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Some organizations have a blocklist of bad-actor domains from a managed security
7676

7777
You can control inbound and outbound access using cross tenant access settings. In addition, you can trust multi-factor authentication (MFA), a compliant device, and hybrid Azure Active Directory joined device (HAAJD) claims from external Azure AD tenants. When you configure an organizational policy, it applies to the Azure AD tenant and applies to users in that tenant, regardless of domain suffix.
7878

79-
You can enable collaboration across Microsoft clouds, such as Microsoft Azure operated by 21Vianet (Azure China) or Azure Government. Determine if your collaboration partners reside in a different Microsoft cloud.
79+
You can enable collaboration across Microsoft clouds, such as Microsoft Azure operated by 21Vianet or Azure Government. Determine if your collaboration partners reside in a different Microsoft cloud.
8080

8181
Learn more:
8282

articles/active-directory/architecture/backup-authentication-system.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,15 +84,15 @@ In addition to user authentication, the backup authentication system provides re
8484

8585
## Cloud environments that support the backup authentication system
8686

87-
The backup authentication system is supported in all cloud environments except Azure China 21vianet. The types of identities supported vary by cloud, as described in the following table.
87+
The backup authentication system is supported in all cloud environments except Microsoft Azure operated by 21Vianet. The types of identities supported vary by cloud, as described in the following table.
8888

8989
| Azure environment | Identities protected |
9090
| --- | --- |
9191
| Azure Commercial | Users, managed identities |
9292
| Azure Government | Users, managed identities |
9393
| Azure Government Secret | managed identities |
9494
| Azure Government Top Secret | managed identities |
95-
| Azure China | Not available |
95+
| Azure operated by 21Vianet | Not available |
9696

9797
## Appendix
9898

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ The following table shows the location for service logs for sovereign clouds.
115115

116116
| Sovereign cloud | Sign-in logs | Multifactor authentication activity report | Multifactor authentication service logs |
117117
|--------------------------------------|--------------------------------------|--------------------------------------------|-----------------------------------------|
118-
| Azure China 21Vianet | China | United States | United States |
118+
| Microsoft Azure operated by 21Vianet | China | United States | United States |
119119
| Microsoft Government Cloud | United States | United States | United States |
120120

121121
## Next steps

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Before combined registration, users registered authentication methods for Azure
2424

2525
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout.
2626

27-
Azure AD combined security information registration is available for Azure US Government but not Azure China 21Vianet.
27+
Azure AD combined security information registration is available for Azure US Government but not Microsoft Azure operated by 21Vianet.
2828

2929
*My Account* pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.
3030

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -113,14 +113,14 @@ The NPS server must be able to communicate with the following URLs over TCP port
113113

114114
* `https://login.microsoftonline.com`
115115
* `https://login.microsoftonline.us (Azure Government)`
116-
* `https://login.chinacloudapi.cn (Azure China 21Vianet)`
116+
* `https://login.chinacloudapi.cn (Microsoft Azure operated by 21Vianet)`
117117
* `https://credentials.azure.com`
118118
* `https://strongauthenticationservice.auth.microsoft.com`
119119
* `https://strongauthenticationservice.auth.microsoft.us (Azure Government)`
120-
* `https://strongauthenticationservice.auth.microsoft.cn (Azure China 21Vianet)`
120+
* `https://strongauthenticationservice.auth.microsoft.cn (Microsoft Azure operated by 21Vianet)`
121121
* `https://adnotifications.windowsazure.com`
122122
* `https://adnotifications.windowsazure.us (Azure Government)`
123-
* `https://adnotifications.windowsazure.cn (Azure China 21Vianet)`
123+
* `https://adnotifications.windowsazure.cn (Microsoft Azure operated by 21Vianet)`
124124

125125
Additionally, connectivity to the following URLs is required to complete the [setup of the adapter using the provided PowerShell script](#run-the-powershell-script):
126126

@@ -246,7 +246,7 @@ To provide load-balancing capabilities or for redundancy, repeat these steps on
246246
`[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12`
247247

248248
> [!IMPORTANT]
249-
> For customers that use the Azure Government or Azure China 21Vianet clouds, first edit the `Connect-MsolService` cmdlets in the *AzureMfaNpsExtnConfigSetup.ps1* script to include the *AzureEnvironment* parameters for the required cloud. For example, specify *-AzureEnvironment USGovernment* or *-AzureEnvironment AzureChinaCloud*.
249+
> For customers that use the Azure Government or Microsoft Azure operated by 21Vianet clouds, first edit the `Connect-MsolService` cmdlets in the *AzureMfaNpsExtnConfigSetup.ps1* script to include the *AzureEnvironment* parameters for the required cloud. For example, specify *-AzureEnvironment USGovernment* or *-AzureEnvironment AzureChinaCloud*.
250250
>
251251
> For more information, see [Connect-MsolService parameter reference](/powershell/module/msonline/connect-msolservice#parameters).
252252
@@ -263,14 +263,14 @@ If your previous computer certificate has expired, and a new certificate has bee
263263
> [!NOTE]
264264
> If you use your own certificates instead of generating certificates with the PowerShell script, make sure that they align to the NPS naming convention. The subject name must be **CN=\<TenantID\>,OU=Microsoft NPS Extension**.
265265
266-
### Microsoft Azure Government or Azure China 21Vianet additional steps
266+
### Microsoft Azure Government or Microsoft Azure operated by 21Vianet additional steps
267267

268-
For customers that use the Azure Government or Azure China 21Vianet clouds, the following additional configuration steps are required on each NPS server.
268+
For customers that use the Azure Government or Azure operated by 21Vianet clouds, the following additional configuration steps are required on each NPS server.
269269

270270
> [!IMPORTANT]
271-
> Only configure these registry settings if you're an Azure Government or Azure China 21Vianet customer.
271+
> Only configure these registry settings if you're an Azure Government or Azure operated by 21Vianet customer.
272272
273-
1. If you're an Azure Government or Azure China 21Vianet customer, open **Registry Editor** on the NPS server.
273+
1. If you're an Azure Government or Azure operated by 21Vianet customer, open **Registry Editor** on the NPS server.
274274
1. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa`.
275275
1. For Azure Government customers, set the following key values.:
276276

@@ -280,7 +280,7 @@ For customers that use the Azure Government or Azure China 21Vianet clouds, the
280280
| AZURE_MFA_RESOURCE_HOSTNAME | adnotifications.windowsazure.us |
281281
| STS_URL | https://login.microsoftonline.us/ |
282282

283-
1. For Azure China 21Vianet customers, set the following key values:
283+
1. For Microsoft Azure operated by 21Vianet customers, set the following key values:
284284

285285
| Registry key | Value |
286286
|--------------------|-----------------------------------|

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Smart lockout helps lock out bad actors that try to guess your users' passwords
2121

2222
## How smart lockout works
2323

24-
By default, smart lockout locks the account from sign-in attempts for one minute after 10 failed attempts for Azure Public and Azure China 21Vianet tenants and 3 for Azure US Government tenants. The account locks again after each subsequent failed sign-in attempt, for one minute at first and longer in subsequent attempts. To minimize the ways an attacker could work around this behavior, we don't disclose the rate at which the lockout period grows over additional unsuccessful sign-in attempts.
24+
By default, smart lockout locks the account from sign-in attempts for one minute after 10 failed attempts for Azure Public and Microsoft Azure operated by 21Vianet tenants and 3 for Azure US Government tenants. The account locks again after each subsequent failed sign-in attempt, for one minute at first and longer in subsequent attempts. To minimize the ways an attacker could work around this behavior, we don't disclose the rate at which the lockout period grows over additional unsuccessful sign-in attempts.
2525

2626
Smart lockout tracks the last three bad password hashes to avoid incrementing the lockout counter for the same password. If someone enters the same bad password multiple times, this behavior won't cause the account to lock out.
2727

@@ -62,7 +62,7 @@ To verify your on-premises AD DS account lockout policy, complete the following
6262

6363
## Manage Azure AD smart lockout values
6464

65-
Based on your organizational requirements, you can customize the Azure AD smart lockout values. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users. Customization of the smart lockout settings is not available for Azure China 21Vianet tenants.
65+
Based on your organizational requirements, you can customize the Azure AD smart lockout values. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users. Customization of the smart lockout settings is not available for Microsoft Azure operated by 21Vianet tenants.
6666

6767
To check or modify the smart lockout values for your organization, complete the following steps:
6868

0 commit comments

Comments
 (0)