Skip to content

Commit 21c7a52

Browse files
authored
Merge pull request #25 from MicrosoftDocs/master
update fork
2 parents b41ca78 + 0da97cb commit 21c7a52

File tree

1,513 files changed

+14702
-10653
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,513 files changed

+14702
-10653
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@
194194
{
195195
"path_to_root": "samples-cognitive-services-speech-sdk",
196196
"url": "https://github.com/Azure-Samples/cognitive-services-speech-sdk",
197-
"branch": "rhurey/quickstart.refactor"
197+
"branch": "release-ignite-cogserv-speech-service"
198198
},
199199
{
200200
"path_to_root": "media-services-v3-dotnet-quickstarts",

.openpublishing.redirection.json

Lines changed: 90 additions & 69 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-tutorials-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Update the settings in the Web.config file to work with your user flow:
9090
1. In the **TaskWebApp** project, open the **Web.config** file.
9191
1. Update the value of `ida:Tenant` and `ida:AadInstance` with the name of the Azure AD B2C tenant that you created. For example, replace `fabrikamb2c` with `contoso`.
9292
1. Replace the value of `ida:ClientId` with the application ID that you recorded.
93-
1. Replace the value of `ida:ClientSecret` with the key that you recorded. You must XML-encode the client secret before adding it to your Web.config.
93+
1. Replace the value of `ida:ClientSecret` with the key that you recorded. If the client secret contains any predefined XML entities, for example less than (`<`), greater than (`>`), ampersand (`&`), or double quote (`"`), you must escape those characters by XML-encoding the client secret before adding it to your Web.config.
9494
1. Replace the value of `ida:SignUpSignInPolicyId` with `b2c_1_signupsignin1`.
9595
1. Replace the value of `ida:EditProfilePolicyId` with `b2c_1_profileediting1`.
9696
1. Replace the value of `ida:ResetPasswordPolicyId` with `b2c_1_passwordreset1`.

articles/active-directory-b2c/b2clogin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migr
8989

9090
If you're using [MSAL.NET][msal-dotnet] v2 or earlier, set the **ValidateAuthority** property to `false` on client instantiation to allow redirects to *b2clogin.com*. This setting is not required for MSAL.NET v3 and above.
9191

92-
```CSharp
92+
```csharp
9393
ConfidentialClientApplication client = new ConfidentialClientApplication(...); // Can also be PublicClientApplication
9494
client.ValidateAuthority = false; // MSAL.NET v2 and earlier **ONLY**
9595
```

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ This flowchart describes which methods are shown to a user when interrupted to r
105105

106106
If you have both Multi-Factor Authentication and SSPR enabled, we recommend that you enforce Multi-Factor Authentication registration.
107107

108-
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up-to-date, or they can make changes if they need to.
108+
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up-to-date, or they can make changes if they need to. Users must perform multi-factor authentication when accessing this page.
109109

110110
### Manage mode
111111

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,15 +50,15 @@ The two-gate policy requires two pieces of authentication data, such as an **ema
5050
* Privileged Authentication administrator
5151

5252
* If 30 days have elapsed in a trial subscription; or
53-
* A vanity domain is present, such as contoso.com; or
53+
* A custom domain has been configured for your Azure AD tenant, such as *contoso.com*; or
5454
* Azure AD Connect is synchronizing identities from your on-premises directory
5555

5656
### Exceptions
5757

5858
A one-gate policy requires one piece of authentication data, such as an email address *or* phone number. A one-gate policy applies in the following circumstances:
5959

6060
* It's within the first 30 days of a trial subscription; or
61-
* A vanity domain isn't present (*.onmicrosoft.com); and
61+
* A custom domain hasn't been configured for your Azure AD tenant so is using the default **.onmicrosoft.com*. Note that the default **.onmicrosoft.com* domain isn't recommended for production use; and
6262
* Azure AD Connect isn't synchronizing identities
6363

6464
## UserPrincipalName policies that apply to all user accounts

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,10 @@ If you encounter one of these errors, we recommend that you [contact support](#c
9393

9494
If your users are [Having trouble with two-step verification](../user-help/multi-factor-authentication-end-user-troubleshoot.md), help them self-diagnose problems.
9595

96+
### Health check script
97+
98+
The [Azure MFA NPS Extension health check script](https://gallery.technet.microsoft.com/Azure-MFA-NPS-Extension-648de6bb) is available on the TechNet Gallery to perform a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
99+
96100
### Contact Microsoft support
97101

98102
If you need additional help, contact a support professional through [Azure Multi-Factor Authentication Server support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, the ID of the user who saw the error, and debug logs.

articles/active-directory/authentication/howto-mfa-nps-extension-rdg.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,11 +117,11 @@ This section provides instructions for configuring RDS infrastructure to use Azu
117117
As part of the configuration of the NPS extension, you need to supply admin credentials and the Azure AD ID for your Azure AD tenant. The following steps show you how to get the tenant ID.
118118

119119
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
120-
1. In the left navigation, select the **Azure Active Directory** icon.
120+
1. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
121121
1. Select **Properties**.
122122
1. In the Properties blade, beside the Directory ID, click the **Copy** icon, as shown below, to copy the ID to clipboard.
123123

124-
![Getting the Directory ID from the Azure portal](./media/howto-mfa-nps-extension-rdg/image1.png)
124+
![Getting the Directory ID from the Azure portal](./media/howto-mfa-nps-extension-rdg/azure-active-directory-id-in-azure-portal.png)
125125

126126
### Install the NPS extension
127127

articles/active-directory/authentication/howto-mfa-nps-extension-vpn.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -323,13 +323,13 @@ As part of the configuration of the NPS extension, you must supply administrator
323323

324324
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator of the Azure tenant.
325325

326-
2. In the left pane, select the **Azure Active Directory** button.
326+
2. In the Azure portal menu, select **Azure Active Directory**, or search for and select **Azure Active Directory** from any page.
327327

328328
3. Select **Properties**.
329329

330330
4. To copy your Azure AD ID, select the **Copy** button.
331331

332-
![Azure AD Directory ID in the Azure portal](./media/howto-mfa-nps-extension-vpn/image35.png)
332+
![Azure AD Directory ID in the Azure portal](./media/howto-mfa-nps-extension-vpn/azure-active-directory-id-in-azure-portal.png)
333333

334334
### Install the NPS extension
335335

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,16 @@ Identify users who have not registered for MFA using the PowerShell that follows
131131

132132
```Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods.Count -eq 0} | Select-Object -Property UserPrincipalName```
133133

134+
Identify users and output methods registered.
135+
136+
```PowerShell
137+
Get-MsolUser -All | Select-Object @{N='UserPrincipalName';E={$_.UserPrincipalName}},
138+
139+
@{N='MFA Status';E={if ($_.StrongAuthenticationRequirements.State){$_.StrongAuthenticationRequirements.State} else {"Disabled"}}},
140+
141+
@{N='MFA Methods';E={$_.StrongAuthenticationMethods.methodtype}} | Export-Csv -Path c:\MFA_Report.csv -NoTypeInformation
142+
```
143+
134144
## Possible results in activity reports
135145

136146
The following table may be used to troubleshoot multi-factor authentication using the downloaded version of the multi-factor authentication activity report. They will not appear directly in the Azure portal.

0 commit comments

Comments
 (0)