Skip to content

Commit 2375a6a

Browse files
authored
Merge branch 'master' into alexbuckgit/docutune-autopr-20211118-155057-9378336
2 parents d55ebdb + dec6b77 commit 2375a6a

File tree

396 files changed

+4508
-2538
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

396 files changed

+4508
-2538
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 46 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,6 @@
7272
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/azure-api-for-fhir-additional-settings",
7373
"redirect_document_id": false
7474
},
75-
{
76-
"source_path_from_root": "/articles/healthcare-apis/configure-azure-rbac.md",
77-
"redirect_url": "/azure/healthcare-apis/fhir/configure-azure-rbac",
78-
"redirect_document_id": true
79-
},
8075
{
8176
"source_path_from_root": "/articles/healthcare-apis/configure-cross-origin-resource-sharing.md",
8277
"redirect_url": "/azure/healthcare-apis/fhir/configure-cross-origin-resource-sharing",
@@ -222,12 +217,7 @@
222217
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/access-fhir-postman-tutorial",
223218
"redirect_document_id": true
224219
},
225-
{
226-
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-azure-rbac.md",
227-
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/configure-azure-rbac",
228-
"redirect_document_id": true
229-
},
230-
{
220+
{
231221
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-database.md",
232222
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir/configure-database",
233223
"redirect_document_id": true
@@ -457,5 +447,50 @@
457447
"redirect_url": "/azure/healthcare-apis/security-controls-policy",
458448
"redirect_document_id": true
459449
},
450+
{
451+
"source_path_from_root": "/articles/healthcare-apis/fhir/azure-active-directory-identity-configuration.md",
452+
"redirect_url": "/azure/healthcare-apis/authentication-authorization",
453+
"redirect_document_id": true
454+
},
455+
{
456+
"source_path_from_root": "/articles/healthcare-apis/fhir/fhir-service-access-token-validation.md",
457+
"redirect_url": "/azure/healthcare-apis/get-access-token",
458+
"redirect_document_id": true
459+
},
460+
{
461+
"source_path_from_root": "/articles/healthcare-apis/fhir/get-healthcare-apis-access-token-cli.md",
462+
"redirect_url": "/azure/healthcare-apis/get-access-token",
463+
"redirect_document_id": false
464+
},
465+
{
466+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-get-access-token-azure-cli.md",
467+
"redirect_url": "/azure/healthcare-apis/get-access-token",
468+
"redirect_document_id": false
469+
},
470+
{
471+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-register-service-client-application.md",
472+
"redirect_url": "/azure/healthcare-apis/register-application",
473+
"redirect_document_id": true
474+
},
475+
{
476+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-register-public-application.md",
477+
"redirect_url": "/azure/healthcare-apis/register-application",
478+
"redirect_document_id": false
479+
},
480+
{
481+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-register-confidential-client-application.md",
482+
"redirect_url": "/azure/healthcare-apis/register-application",
483+
"redirect_document_id": false
484+
},
485+
{
486+
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-configure-azure-rbac.md",
487+
"redirect_url": "/azure/healthcare-apis/configure-azure-rbac",
488+
"redirect_document_id": true
489+
},
490+
{
491+
"source_path_from_root": "/articles/healthcare-apis/fhir/configure-azure-rbac-for-fhir.md",
492+
"redirect_url": "/azure/healthcare-apis/configure-azure-rbac",
493+
"redirect_document_id": false
494+
}
460495
]
461496
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44771,6 +44771,11 @@
4477144771
"redirect_url": "/azure/azure-monitor/essentials/tutorial-metrics",
4477244772
"redirect_document_id": false
4477344773
},
44774+
{
44775+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-vm-azure.md",
44776+
"redirect_url": "/azure/virtual-machines/monitor-vm",
44777+
"redirect_document_id": false
44778+
},
4477444779
{
4477544780
"source_path_from_root": "/articles/load-balancer/tutorial-load-balancer-standard-manage-portal.md",
4477644781
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-portal",

.vscode/settings.json

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"markdownlint.config": {
3+
"MD028": false,
4+
"MD025": {
5+
"front_matter_title": ""
6+
}
7+
}
8+
}

articles/active-directory-b2c/error-codes.md

Lines changed: 93 additions & 93 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/extensions-app.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: Extensions app in Azure Active Directory B2C
3+
titleSuffix: Azure AD B2C
34
description: Restoring the b2c-extensions-app.
45
services: active-directory-b2c
56
author: kengaderdus
@@ -13,7 +14,7 @@ ms.author: kengaderdus
1314
ms.subservice: B2C
1415
---
1516

16-
# Azure AD B2C: Extensions app
17+
# Extensions app in Azure AD B2C
1718

1819
When an Azure AD B2C directory is created, an app called **b2c-extensions-app** is automatically created inside the new directory. This app is visible in *App registrations*. It is used by the Azure AD B2C service to store information about users and custom attributes. If the app is deleted, Azure AD B2C will not function correctly and your production environment will be affected.
1920

articles/active-directory-b2c/identity-provider-id-me.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ zone_pivot_groups: b2c-policy-type
3535

3636
## Create an ID.me application
3737

38-
To enable sign-in for users with an ID.me account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [ID.me Developer Resources for API & SDK](https://developers.id.me/). For more information, see [OAuth Integration Guide](https://developers.id.me/documentation/oauth/overview/kyc). If you don't already have an ID.me developer account, you can sign up at [https://developers.id.me/registration/new](https://developers.id.me/registration/new).
38+
To enable sign-in for users with an ID.me account in Azure Active Directory B2C (Azure AD B2C), you need to create an application in [ID.me Developer Resources for API & SDK](https://developers.id.me/). For more information, see [OAuth Integration Guide](https://developers.id.me/documentation/). If you don't already have an ID.me developer account, you can sign up at [https://developers.id.me/registration/new](https://developers.id.me/registration/new).
3939

4040
1. Sign in to the [ID.me Developer Resources for API & SDK](https://developers.id.me/) with your ID.me account credentials.
4141
1. Select **View My Applications**, and select **Continue**.
@@ -169,4 +169,4 @@ Next, you need a claims transformation to create the displayName claim. Add the
169169

170170
If the sign-in process is successful, your browser is redirected to `https://jwt.ms`, which displays the contents of the token returned by Azure AD B2C.
171171

172-
::: zone-end
172+
::: zone-end

articles/active-directory-b2c/saml-service-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -427,7 +427,7 @@ The following SAML application scenarios are supported via your own metadata end
427427
* Specify multiple logout URLs or POST binding for the logout URL in the application or service principal object.
428428
* Specify a signing key to verify relying party requests in the application or service principal object.
429429
* Specify a token encryption key in the application or service principal object.
430-
* Specify IdP-initiated sign-on, where the identity provider is Azure AD B2C.
430+
* [Specify IdP-initiated sign-on, where the identity provider is Azure AD B2C](saml-service-provider-options.md#configure-idp-initiated-flow).
431431

432432
## Next steps
433433

articles/active-directory-b2c/threat-management.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,12 @@ ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
1616

17-
# Mitigate credential attacks in Azure AD B2C
17+
# Mitigate credential attacks in Azure AD B2C with smart lockout
1818

1919
Credential attacks lead to unauthorized access to resources. Passwords that are set by users are required to be reasonably complex. Azure AD B2C has mitigation techniques in place for credential attacks. Mitigation includes detection of brute-force credential attacks and dictionary credential attacks. By using various signals, Azure Active Directory B2C (Azure AD B2C) analyzes the integrity of requests. Azure AD B2C is designed to intelligently differentiate intended users from hackers and botnets.
2020

21+
## How smart lockout works
22+
2123
Azure AD B2C uses a sophisticated strategy to lock accounts. The accounts are locked based on the IP of the request and the passwords entered. The duration of the lockout also increases based on the likelihood that it's an attack. After a password is tried 10 times unsuccessfully (the default attempt threshold), a one-minute lockout occurs. The next time a login is unsuccessful after the account is unlocked (that is, after the account has been automatically unlocked by the service once the lockout period expires), another one-minute lockout occurs and continues for each unsuccessful login. Entering the same, or similar password repeatedly doesn't count as multiple unsuccessful logins.
2224

2325
> [!NOTE]
@@ -27,16 +29,16 @@ Azure AD B2C uses a sophisticated strategy to lock accounts. The accounts are lo
2729

2830
The first 10 lockout periods are one minute long. The next 10 lockout periods are slightly longer and increase in duration after every 10 lockout periods. The lockout counter resets to zero after a successful login when the account isn’t locked. Lockout periods can last up to five hours. Users must wait for the lockout duration to expire. However, the user can unlock by using self-service [password user flow](add-password-reset-policy.md).
2931

30-
## Manage password protection settings
32+
## Manage smart lockout settings
3133

32-
To manage password protection settings, including the lockout threshold:
34+
To manage smart lockout settings, including the lockout threshold:
3335

3436
1. Sign in to the [Azure portal](https://portal.azure.com)
3537
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
3638
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
3739
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
3840
1. Under **Security**, select **Authentication methods (Preview)**, then select **Password protection**.
39-
1. Under **Custom smart lockout**, enter your desired password protection settings:
41+
1. Under **Custom smart lockout**, enter your desired smart lockout settings:
4042

4143
- **Lockout threshold**: The number of failed sign-in tries that are allowed before the account is first locked out. If the first sign-in after a lockout also fails, the account locks again.
4244
- **Lockout duration in seconds**: The minimum duration of each lockout in seconds. If an account locks repeatedly, this duration increases.
@@ -46,7 +48,7 @@ To manage password protection settings, including the lockout threshold:
4648

4749
1. Select **Save**.
4850

49-
## Testing the password protection settings
51+
## Testing smart lockout
5052

5153
The smart lockout feature uses many factors to determine when an account should be locked, but the primary factor is the password pattern. The smart lockout feature considers slight variations of a password as a set, and they’re counted as a single try. For example:
5254

articles/active-directory-domain-services/concepts-resource-forest.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,11 @@ A *forest* is a logical construct used by Active Directory Domain Services (AD D
2727

2828
In an Azure AD DS managed domain, the forest only contains one domain. On-premises AD DS forests often contain many domains. In large organizations, especially after mergers and acquisitions, you may end up with multiple on-premises forests that each then contain multiple domains.
2929

30-
By default, a managed domain is created as a *user* forest. This type of forest synchronizes all objects from Azure AD, including any user accounts created in an on-premises AD DS environment. User accounts can directly authenticate against the managed domain, such as to sign in to a domain-joined VM. A user forest works when the password hashes can be synchronized and users aren't using exclusive sign-in methods like smart card authentication.
30+
By default, a managed domain is created as a *user* forest. This type of forest synchronizes all objects from Azure AD, including any user accounts created in an on-premises AD DS environment. User accounts can directly authenticate against the managed domain, such as to sign in to a domain-joined VM. A user forest works when the password hashes can be synchronized, and users aren't using exclusive sign-in methods like smart card authentication.
3131

3232
In a managed domain *resource* forest, users authenticate over a one-way forest *trust* from their on-premises AD DS. With this approach, the user objects and password hashes aren't synchronized to the managed domain. The user objects and credentials only exist in the on-premises AD DS. This approach lets enterprises host resources and application platforms in Azure that depend on classic authentication such LDAPS, Kerberos, or NTLM, but any authentication issues or concerns are removed.
3333

34-
Resource forests also provide the capability to lift-and-shift your applications one component at a time. Many legacy on-premises applications are multi-tiered, often using a web server or front end and many database-related components. These tiers make it hard to lift-and-shift the entire application to the cloud in one step. With resource forests, you can lift your application to the cloud in phased approach, which makes it easier to move your application to Azure.
34+
Resource forests also provide the capability to lift-and-shift your applications one component at a time. Many legacy on-premises applications are multi-tiered, often using a web server or front end and many database-related components. These tiers make it hard to lift-and-shift the entire application to the cloud in one step. With resource forests, you can lift your application to the cloud in a phased approach, which makes it easier to move your application to Azure.
3535

3636
## What are trusts?
3737

@@ -49,7 +49,7 @@ Trusts are also be configured to handle additional trust relationships in one of
4949
* **Nontransitive** - The trust exists only between the two trust partner domains.
5050
* **Transitive** - Trust automatically extends to any other domains that either of the partners trusts.
5151

52-
In some cases, trust relationships are automatically established when domains are created. Other times, you must choose a type of trust and explicitly establish the appropriate relationships. The specific types of trusts used and the structure of those trust relationships depend on how the AD DS directory is organized, and whether different versions of Windows coexist on the network.
52+
In some cases, trust relationships are automatically established when domains are created. Other times, you must choose a type of trust and explicitly establish the appropriate relationships. The specific types of trusts used and the structure of those trust relationships depend on how the AD DS directory is organized and whether different versions of Windows coexist on the network.
5353

5454
## Trusts between two forests
5555

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: app-provisioning
1010
ms.workload: identity
1111
ms.topic: troubleshooting
12-
ms.date: 07/07/2021
12+
ms.date: 11/18/2021
1313
ms.reviewer: arvinh
1414
---
1515

@@ -116,8 +116,8 @@ The following attributes and objects aren't supported:
116116
- Reference attributes (for example, manager).
117117
- Groups.
118118
- Complex anchors (for example, ObjectTypeName+UserName).
119-
- On-premises applications are sometimes not federated with Azure AD and require local passwords. The on-premises provisioning preview *doesn't support provisioning one-time passwords or synchronizing passwords* between Azure AD and third-party applications.
120-
- The **export_password** virtual attribute, **SetPassword**, and **ChangePassword** operations aren't supported.
119+
- Binary attributes.
120+
- On-premises applications are sometimes not federated with Azure AD and require local passwords. The on-premises provisioning preview does not support password synchronization. Provisioning one-time passwords is supported. Please ensure that you are using the [Redact](https://docs.microsoft.com/azure/active-directory/app-provisioning/functions-for-customizing-application-data#redact) function to redact the passwords from the logs. The passwords are not exported on the initial call to the application, but rather a second call with set password.
121121

122122
#### SSL certificates
123123
The Azure AD ECMA Connector Host currently requires either an SSL certificate to be trusted by Azure or the provisioning agent to be used. The certificate subject must match the host name the Azure AD ECMA Connector Host is installed on.
@@ -128,5 +128,9 @@ The following attributes and objects aren't supported:
128128
#### Attribute discovery and mapping
129129
The attributes that the target application supports are discovered and surfaced in the Azure portal in **Attribute Mappings**. Newly added attributes will continue to be discovered. If an attribute type has changed, for example, string to Boolean, and the attribute is part of the mappings, the type won't change automatically in the Azure portal. Customers will need to go into advanced settings in mappings and manually update the attribute type.
130130

131+
#### Provisioning agent
132+
- The agent does not currently support auto update for the on-prem application provisioning scenario. We are actively working to close this gap and ensure that auto update is enabled by default and required for all customers.
133+
- The same provisioning agent cannot be used for on-prem app provisioning and cloud sync / HR- driven provisioning.
134+
131135
## Next steps
132136
[How provisioning works](how-provisioning-works.md)

0 commit comments

Comments
 (0)