Skip to content

Commit 2283a84

Browse files
committed
Merge branch 'master' of github.com:MicrosoftDocs/azure-docs-pr
2 parents d850835 + f1f5212 commit 2283a84

File tree

3,597 files changed

+44415
-28409
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,597 files changed

+44415
-28409
lines changed

.markdownlint.json

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
"MD007": false,
1010
"MD009": false,
1111
"MD010": false,
12+
"MD011": true,
1213
"MD012": false,
1314
"MD013": false,
1415
"MD014": false,
@@ -32,10 +33,28 @@
3233
"MD035": false,
3334
"MD036": false,
3435
"MD037": false,
36+
"MD038": true,
37+
"MD039": true,
3538
"MD040": false,
3639
"MD041": false,
3740
"MD042": false,
41+
"MD043": true,
42+
"MD044": {
43+
"code_blocks": false,
44+
"names": [
45+
".NET",
46+
"ASP.NET",
47+
"Azure",
48+
"JavaScript",
49+
"NuGet",
50+
"PowerShell",
51+
"macOS",
52+
"C#",
53+
"CLI"
54+
]
55+
},
3856
"MD045": false,
3957
"MD046": false,
40-
"MD047": false
58+
"MD047": false,
59+
"MD048": true
4160
}

.openpublishing.redirection.json

Lines changed: 1610 additions & 109 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/javascript-samples.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,11 @@ You can add your own JavaScript client-side code to your Azure Active Directory
2424
2525
## Prerequisites
2626

27-
Select a page layout for the user interface elements of your application. If you intend to use JavaScript, you need to define a page layout version for all of your content definitions in your custom policy.
27+
### Select a page layout
28+
29+
* [Select a page layout](page-layout.md) for the user interface elements of your application.
30+
31+
If you intend to use JavaScript, you need to [define a page layout version](page-layout.md#replace-datauri-values) for *all* of the content definitions in your custom policy.
2832

2933
## Add the ScriptExecution element
3034

articles/active-directory-b2c/page-layout.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/04/2019
11+
ms.date: 12/18/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -42,9 +42,9 @@ In your custom policies, you may have [ContentDefinitions](contentdefinitions.md
4242
</ContentDefinition>
4343
```
4444

45-
To select a page layout, you change the **DataUri** values in your [ContentDefinitions](contentdefinitions.md) in your policies. By switching from the old **DataUri** values to the new values, you're selecting an immutable package. The benefit of using this package is that you’ll know it won't change and cause unexpected behavior on your page.
45+
To select a page layout, you change the **DataUri** values in your [ContentDefinitions](contentdefinitions.md) in your policies. By switching from the old **DataUri** values to the new values, you're selecting an immutable package. The benefit of using this package is that you know it won't change and cause unexpected behavior on your page.
4646

47-
To set up a page layout, use the following table to find **DataUri** values.
47+
To specify a page layout in your custom policies that use an old **DataUri** value, insert `contract` between `elements` and the page type (for example, `selfasserted`), and specify the version number. For example:
4848

4949
| Old DataUri value | New DataUri value |
5050
| ----------------- | ----------------- |
@@ -64,17 +64,23 @@ To set up a page layout, use the following table to find **DataUri** values.
6464

6565
Page layout packages are periodically updated to include fixes and improvements in their page elements. The following change log specifies the changes introduced in each version.
6666

67-
### 1.2.0
67+
### 2.0.0
68+
69+
- Self-asserted page (`selfasserted`)
70+
- Added support for [display controls](display-controls.md) in custom policies.
71+
72+
### 1.2.0
73+
6874
- All pages
6975
- Accessibility fixes
7076
- You can now add the `data-preload="true"` attribute in your HTML tags to control the load order for CSS and JavaScript. Scenarios include:
71-
- Use this on your CSS link to load the CSS at the same time as your HTML so that it doesn't 'flicker' between loading the files
72-
- This attribute allows you to control the order in which your Script tags are fetched and executed before the page load
77+
- Use this on your CSS link to load the CSS at the same time as your HTML so that it doesn't 'flicker' between loading the files
78+
- This attribute allows you to control the order in which your Script tags are fetched and executed before the page load
7379
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
7480
- Support for Chrome translate
7581
- Unified and self-asserted page
7682
- The username/email and password fields now use the form HTML element. This will now allow Edge and IE to properly save this information
77-
83+
7884
### 1.1.0
7985

8086
- Exception page (globalexception)

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The certificate you request or create must meet the following requirements. Your
6161

6262
* **Trusted issuer** - The certificate must be issued by an authority trusted by computers connecting to the managed domain using secure LDAP. This authority may be a public CA or an Enterprise CA trusted by these computers.
6363
* **Lifetime** - The certificate must be valid for at least the next 3-6 months. Secure LDAP access to your managed domain is disrupted when the certificate expires.
64-
* **Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named *aadds.contoso.com*, the certificate's subject name must be **aadds.contoso.com*.
64+
* **Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named *aadds.contoso.com*, the certificate's subject name must be **.aadds.contoso.com*.
6565
* The DNS name or subject alternate name of the certificate must be a wildcard certificate to ensure the secure LDAP works properly with the Azure AD Domain Services. Domain Controllers use random names and can be removed or added to ensure the service remains available.
6666
* **Key usage** - The certificate must be configured for *digital signatures* and *key encipherment*.
6767
* **Certificate purpose** - The certificate must be valid for SSL server authentication.

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ You can take one of two approaches for requiring two-step verification, both of
2626

2727
**Enabled by changing user state** - This is the traditional method for requiring two-step verification and is discussed in this article. It works with both Azure MFA in the cloud and Azure MFA Server. Using this method requires users to perform two-step verification **every time** they sign in and overrides Conditional Access policies.
2828

29-
Enabled by Conditional Access policy - This is the most flexible means to enable two-step verification for your users. Enabling using Conditional Access policy only works for Azure MFA in the cloud and is a premium feature of Azure AD. More information on this method can be found in [Deploy cloud-based Azure Multi-Factor Authentication](howto-mfa-getstarted.md).
29+
**Enabled by Conditional Access policy** - This is the most flexible means to enable two-step verification for your users. Enabling using Conditional Access policy only works for Azure MFA in the cloud and is a premium feature of Azure AD. More information on this method can be found in [Deploy cloud-based Azure Multi-Factor Authentication](howto-mfa-getstarted.md).
3030

31-
Enabled by Azure AD Identity Protection - This method uses the Azure AD Identity Protection risk policy to require two-step verification based only on sign-in risk for all cloud applications. This method requires Azure Active Directory P2 licensing. More information on this method can be found in [Azure Active Directory Identity Protection](../identity-protection/howto-sign-in-risk-policy.md)
31+
**Enabled by Azure AD Identity Protection** - This method uses the Azure AD Identity Protection risk policy to require two-step verification based only on sign-in risk for all cloud applications. This method requires Azure Active Directory P2 licensing. More information on this method can be found in [Azure Active Directory Identity Protection](../identity-protection/howto-sign-in-risk-policy.md)
3232

3333
> [!Note]
3434
> More information about licenses and pricing can be found on the [Azure AD](https://azure.microsoft.com/pricing/details/active-directory/

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,6 @@ This page covers a new installation of the server and setting it up with on-prem
2828
2929
## Plan your deployment
3030

31-
> [!WARNING]
32-
> Starting in March of 2019 MFA Server downloads will only be available to paid tenants. Free/trial tenants will no longer be able to download or generate and use activation credentials.
33-
3431
Before you download the Azure Multi-Factor Authentication Server, think about what your load and high availability requirements are. Use this information to decide how and where to deploy.
3532

3633
A good guideline for the amount of memory you need is the number of users you expect to authenticate on a regular basis.
@@ -93,9 +90,6 @@ If you aren't using the Event Confirmation feature, and your users aren't using
9390

9491
## Download the MFA Server
9592

96-
> [!WARNING]
97-
> Starting in March of 2019 MFA Server downloads will only be available to paid tenants. Free/trial tenants will no longer be able to download or generate and use activation credentials.
98-
9993
Follow these steps to download the Azure Multi-Factor Authentication Server from the Azure portal:
10094

10195
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -126,11 +126,13 @@ There are two required installers for Azure AD password protection. They're avai
126126
The result should show a **Status** of "Running."
127127
128128
1. Register the proxy.
129-
* After step 3 is completed, the proxy service is running on the machine. But the service doesn't yet have the necessary credentials to communicate with Azure AD. Registration with Azure AD is required:
129+
* After step 3 is completed, the proxy service is running on the machine, but does not yet have the necessary credentials to communicate with Azure AD. Registration with Azure AD is required:
130130
131131
`Register-AzureADPasswordProtectionProxy`
132132
133-
This cmdlet requires global administrator credentials for your Azure tenant. You also need on-premises Active Directory domain administrator privileges in the forest root domain. After this command succeeds once for a proxy service, additional invocations of it will succeed but are unnecessary.
133+
This cmdlet requires global administrator credentials for your Azure tenant. You also need on-premises Active Directory domain administrator privileges in the forest root domain. You must also run this cmdlet using an account with local administrator privileges.
134+
135+
After this command succeeds once for a proxy service, additional invocations of it will succeed but are unnecessary.
134136
135137
The `Register-AzureADPasswordProtectionProxy` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. Please see comments below for more details.
136138
@@ -174,7 +176,9 @@ There are two required installers for Azure AD password protection. They're avai
174176
> There might be a noticeable delay before completion the first time that this cmdlet is run for a specific Azure tenant. Unless a failure is reported, don't worry about this delay.
175177
176178
1. Register the forest.
177-
* You must initialize the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet. The cmdlet requires global administrator credentials for your Azure tenant. It also requires on-premises Active Directory Enterprise Administrator privileges. This step is run once per forest.
179+
* You must initialize the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet.
180+
181+
The cmdlet requires global administrator credentials for your Azure tenant. You must also run this cmdlet using an account with local administrator privileges. It also requires on-premises Active Directory Enterprise Administrator privileges. This step is run once per forest.
178182
179183
The `Register-AzureADPasswordProtectionForest` cmdlet supports the following three authentication modes. The first two modes support Azure Multi-Factor Authentication but the third mode does not. Please see comments below for more details.
180184

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before enabling the new experience, review the article [Combined security inform
3636
Complete these steps to enable combined registration:
3737

3838
1. Sign in to the Azure portal as a user administrator or global administrator.
39-
2. Go to **Azure Active Directory** > **User settings** > **Manage settings for access panel preview features**.
39+
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
4040
3. Under **Users can use preview features for registering and managing security info**, choose to enable for a **Selected** group of users or for **All** users.
4141

4242
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info-preview.png)
@@ -63,7 +63,7 @@ The following policy applies to all selected users, who attempt to register usin
6363

6464
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6565

66-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Conditional Access**
66+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
6767
1. Select **New policy**
6868
1. In Name, Enter a Name for this policy. For example, **Combined Security Info Registration on Trusted Networks**
6969
1. Under **Assignments**, click **Users and groups**, and select the users and groups you want this policy to apply to

articles/active-directory/authentication/quickstart-sspr.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ ms.collection: M365-identity-device-management
2121
In this quickstart, you configure Azure Active Directory (AD) self-service password reset (SSPR) to enable users to reset their passwords or unlock their accounts. With SSPR, users can reset their own credentials without helpdesk or administrator assistance. This ability lets users regain access to their account without waiting for additional support.
2222

2323
> [!IMPORTANT]
24-
> This quickstart shows an administrator how to enable self-service password reset. If your IT team hasn't already enabled the ability to reset your own password, reach out to your helpdesk for additional assistance.
24+
> This quickstart shows an administrator how to enable self-service password reset. If you're an end user already registered for self-service password reset and need to get back into your account, go to https://aka.ms/sspr.
2525
>
26-
> If your IT team has enabled password reset, once you're [registered for self-service password reset][register-sspr] you can then [reset your work or school password][reset-password]. If you're not already registered for self-service password reset, reach out to your helpdesk for additional assistance.
26+
> If your IT team hasn't enabled the ability to reset your own password, reach out to your helpdesk for additional assistance.
2727
2828
## Prerequisites
2929

@@ -82,4 +82,4 @@ In this quickstart, you learned how to configure self-service password reset for
8282

8383
<!-- INTERNAL LINKS -->
8484
[register-sspr]: ../user-help/active-directory-passwords-reset-register.md
85-
[reset-password]: ../user-help/active-directory-passwords-update-your-own-password.md
85+
[reset-password]: ../user-help/active-directory-passwords-update-your-own-password.md

0 commit comments

Comments
 (0)