Skip to content

Commit 239e045

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into varund-novena
2 parents ad05515 + 6075e0f commit 239e045

File tree

422 files changed

+414
-15912
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

422 files changed

+414
-15912
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,11 @@
134134
"source_path_from_root": "/articles/active-directory/saas-apps/headerf5-tutorial.md",
135135
"redirect_url": "/azure/active-directory/saas-apps/f5-big-ip-headers-easy-button",
136136
"redirect_document_id": false
137+
},
138+
{
139+
"source_path_from_root": "/articles/active-directory/saas-apps/tripactions-tutorial.md",
140+
"redirect_url": "/azure/active-directory/saas-apps/navan-tutorial",
141+
"redirect_document_id": false
137142
},
138143
{
139144
"source_path_from_root": "/articles/active-directory/saas-apps/oracle-peoplesoft-protected-by-f5-big-ip-apm-tutorial.md",

articles/active-directory-b2c/billing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Your Azure AD B2C tenant must also be linked to the appropriate Azure pricing ti
6161
6262
## About Go-Local add-on
6363

64-
Azure AD B2C's [Go-Local add-on](data-residency.md#go-local-add-on) enables you to create Azure AD B2C tenant within the country you choose when you [create your Azure AD B2C](tutorial-create-tenant.md). *Go-Local* refers to Microsoft’s commitment to allow some customers to configure some services to store their data at rest in the Geo of the customer’s choice, typically a country. This feature isn't available in all countries.
64+
Azure AD B2C's [Go-Local add-on](data-residency.md#go-local-add-on) enables you to create Azure AD B2C tenant within the country/region you choose when you [create your Azure AD B2C](tutorial-create-tenant.md). *Go-Local* refers to Microsoft’s commitment to allow some customers to configure some services to store their data at rest in the Geo of the customer’s choice, typically a country/region. This feature isn't available in all countries/regions.
6565

6666
> [!NOTE]
6767
> If you enable Go-Local add-on , the 50,000 free MAUs per month given by your AD B2C subscription doesn't apply for Go-Local add-on . You'll incur a charge per MAU, on the Go-Local add-on from the first MAU. However, you'll continue to enjoy free 50,000 MAUs per month on the other features available on your Azure AD B2C [Premium P1 or P2 pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
177177

178178
| Feature | Status | Notes |
179179
| ------- | :--: | ----- |
180-
| [Go-Local add-on](data-residency.md#go-local-add-on) | Preview | Azure AD B2C's [Go-Local add-on](data-residency.md#go-local-add-on) enables you to create Azure AD B2C tenant within the country you choose when you [create your Azure AD B2C](tutorial-create-tenant.md). |
180+
| [Go-Local add-on](data-residency.md#go-local-add-on) | Preview | Azure AD B2C's [Go-Local add-on](data-residency.md#go-local-add-on) enables you to create Azure AD B2C tenant within the country/region you choose when you [create your Azure AD B2C](tutorial-create-tenant.md). |
181181

182182
## Responsibilities of custom policy feature-set developers
183183

articles/active-directory-b2c/data-residency.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Azure AD B2C is **generally available worldwide** with the option for **data res
2626

2727
[Region availability](#region-availability) refers to where a service is available for use. [Data residency](#data-residency) refers to where customer data is stored. For customers in the EU and EFTA, see [EU Data Boundary](#eu-data-boundary).
2828

29-
If you enable [Go-Local add-on](#go-local-add-on), you can store your data exclusively in a specific country.
29+
If you enable [Go-Local add-on](#go-local-add-on), you can store your data exclusively in a specific country/region.
3030

3131

3232
## Region availability
@@ -61,16 +61,16 @@ The following locations are in the process of being added to the list. For now,
6161

6262
> Argentina, Brazil, Chile, Colombia, Ecuador, Iraq, Paraguay, Peru, Uruguay, and Venezuela
6363
64-
To find the exact location where your data is located per region or country, refer to [where Azure Active Directory data is located](https://aka.ms/aaddatamap)service.
64+
To find the exact location where your data is located per country/country, refer to [where Azure Active Directory data is located](https://aka.ms/aaddatamap)service.
6565

6666

6767
### Go-Local add-on
6868

69-
*Go-Local* refers to Microsoft’s commitment to allow some customers to configure some services to store their data at rest in the Geo of the customer’s choice, typically a country. Go-Local is as way fulfilling corporate policies and compliance requirements. You choose the country where you want to store your data when you [create your Azure AD B2C](tutorial-create-tenant.md).
69+
*Go-Local* refers to Microsoft’s commitment to allow some customers to configure some services to store their data at rest in the Geo of the customer’s choice, typically a country/region. Go-Local is as way fulfilling corporate policies and compliance requirements. You choose the country/region where you want to store your data when you [create your Azure AD B2C](tutorial-create-tenant.md).
7070

7171
The Go-Local add-on is a paid add-on, but it's optional. If you choose to use it, you'll incur an extra charge in addition to your Azure AD B2C Premium P1 or P2 licenses. See more information in [Billing model](billing.md).
7272

73-
At the moment, the following countries have the local data residence option:
73+
At the moment, the following countries/regions have the local data residence option:
7474

7575
- Japan
7676

articles/active-directory-b2c/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ sections:
164164
If the TOTP authenticator app codes aren't working with your Android or iPhone mobile phone or device, your device's clock time might be incorrect. In your device's settings, select the option to use the network-provided time or to set the time automatically.
165165
166166
- question: |
167-
How do I know that the Go-Local add-on available in my country?
167+
How do I know that the Go-Local add-on available in my country/region?
168168
answer: |
169169
While [creating your Azure AD B2C tenant](tutorial-create-tenant.md), if the Go-Local add-on is available in your country, you're asked to enable it if you need it.
170170

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Before you create your Azure AD B2C tenant, you need to take the following consi
7777

7878
- For **Organization name**, enter a name for your Azure AD B2C tenant.
7979
- For **Initial domain name**, enter a domain name for your Azure AD B2C tenant.
80-
- For **Location**, select your country from the list. If the country you select has a [Go-Local add-on](data-residency.md#go-local-add-on) option, such as Japan or Australia, and you want to store your data exclusively within that country, select the **Store Azure AD Core Store data, components and service data in the location selected above** checkbox. Go-Local add-on is a paid add-on whose charge is added to your Azure AD B2C Premium P1 or P2 licenses charges, see [Billing model](billing.md#about-go-local-add-on). You can't change the data residency region after you create your Azure AD B2C tenant.
80+
- For **Location**, select your country/region from the list. If the country/region you select has a [Go-Local add-on](data-residency.md#go-local-add-on) option, such as Japan or Australia, and you want to store your data exclusively within that country/region, select the **Store Azure AD Core Store data, components and service data in the location selected above** checkbox. Go-Local add-on is a paid add-on whose charge is added to your Azure AD B2C Premium P1 or P2 licenses charges, see [Billing model](billing.md#about-go-local-add-on). You can't change the data residency region after you create your Azure AD B2C tenant.
8181
- For **Subscription**, select your subscription from the list.
8282
- For **Resource group**, select or search for the resource group that will contain the tenant.
8383

articles/active-directory/conditional-access/howto-conditional-access-policy-authentication-strength-external.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 10/12/2022
9+
ms.date: 04/03/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -65,7 +65,7 @@ Use the following steps to create a Conditional Access policy that applies an au
6565

6666
<!---![Screenshot showing where to select guest and external user types.](media/howto-conditional-access-policy-authentication-strength-external/assignments-external-user-types.png)--->
6767

68-
1. Select the types of [guest or external users](../external-identities/authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types-preview) you want to apply the policy to.
68+
1. Select the types of [guest or external users](../external-identities/authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types) you want to apply the policy to.
6969

7070
1. Under **Exclude**, select **Users and groups** and choose your organization's emergency access or break-glass accounts.
7171
1. Under **Cloud apps or actions**, under **Include** or **Exclude**, select any applications you want to include in or exclude from the authentication strength requirements.

articles/active-directory/conditional-access/location-condition.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Using networks and countries in Azure Active Directory
2+
title: Using networks and countries/regions in Azure Active Directory
33
description: Use GPS locations and public IPv4 and IPv6 networks in Conditional Access policy to make access decisions.
44

55
services: active-directory
@@ -170,7 +170,7 @@ The IP address used in policy evaluation is the public IPv4 or IPv6 address of t
170170

171171
A policy that uses the location condition to block access is considered restrictive, and should be done with care after thorough testing. Some instances of using the location condition to block authentication may include:
172172

173-
- Blocking countries where your organization never does business.
173+
- Blocking countries/regions where your organization never does business.
174174
- Blocking specific IP ranges like:
175175
- Known malicious IPs before a firewall policy can be changed.
176176
- For highly sensitive or privileged actions and cloud applications.

articles/active-directory/develop/v2-oauth2-device-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: OAuth 2.0 device code flow
2+
title: OAuth 2.0 device authorization grant
33
description: Sign in users without a browser. Build embedded and browser-less authentication flows using the device authorization grant.
44
services: active-directory
55
author: OwenRichards1

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 10/12/2022
9+
ms.date: 04/03/2023
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -72,10 +72,7 @@ The following diagram illustrates the flow when email one-time passcode authenti
7272

7373
Organizations can enforce [Conditional Access](../conditional-access/overview.md) policies for external B2B collaboration and B2B direct connect users in the same way that they’re enabled for full-time employees and members of the organization. With the introduction of cross-tenant access settings, you can also trust MFA and device claims from external Azure AD organizations. This section describes important considerations for applying Conditional Access to users outside of your organization.
7474

75-
### Assigning Conditional Access policies to external user types (preview)
76-
77-
> [!NOTE]
78-
> This section describes a preview feature of Azure Active Directory. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
75+
### Assigning Conditional Access policies to external user types
7976

8077
When configuring a Conditional Access policy, you have granular control over the types of external users you want to apply the policy to. External users are categorized based on how they authenticate (internally or externally) and their relationship to your organization (guest or member).
8178

@@ -86,6 +83,9 @@ When configuring a Conditional Access policy, you have granular control over the
8683
- **Service provider users** - Organizations that serve as cloud service providers for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true).
8784
- **Other external users** - Applies to any users who don't fall into the categories above, but who are not considered internal members of your organization, meaning they don't authenticate internally via Azure AD, and the user object created in the resource Azure AD directory does not have a UserType of Member.
8885

86+
>[!NOTE]
87+
> The "All guest and external users" selection has now been replaced with "Guest and external users" and all its sub types. For customers who previously had a Condtional Access policy with "All guest and external users" selected will now see "Guest and external users" along with all sub types being selected. This change in UX does not have any functional impact on how policy is evaluated by Conditional Access backend. The new selection provides customers the needed granularity to choose specifc types of guest and external users to include/exclude from user scope when creating their Conditional Access policy.
88+
8989
Learn more about [Conditional Access user assignments](../conditional-access/concept-conditional-access-users-groups.md).
9090

9191
### Comparing External Identities Conditional Access policies
@@ -171,7 +171,7 @@ The following PowerShell cmdlets are available to *proof up* or request MFA regi
171171

172172
[Authentication strength](https://aka.ms/b2b-auth-strengths) is a Conditional Access control that lets you define a specific combination of multifactor authentication (MFA) methods that an external user must complete to access your resources. This control is especially useful for restricting external access to sensitive apps in your organization because you can enforce specific authentication methods, such as a phishing-resistant method, for external users.
173173

174-
You also have the ability to apply authentication strength to the different types of [guest or external users](#assigning-conditional-access-policies-to-external-user-types-preview) that you collaborate or connect with. This means you can enforce authentication strength requirements that are unique to your B2B collaboration, B2B direct connect, and other external access scenarios.
174+
You also have the ability to apply authentication strength to the different types of [guest or external users](#assigning-conditional-access-policies-to-external-user-types) that you collaborate or connect with. This means you can enforce authentication strength requirements that are unique to your B2B collaboration, B2B direct connect, and other external access scenarios.
175175

176176
Azure AD provides three [built-in authentication strengths](https://aka.ms/b2b-auth-strengths):
177177

@@ -282,4 +282,4 @@ For more information, see the following articles:
282282
- [What is Azure AD B2B collaboration?](./what-is-b2b.md)
283283
- [Identity Protection and B2B users](../identity-protection/concept-identity-protection-b2b.md)
284284
- [External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/)
285-
- [Frequently Asked Questions (FAQs)](./faq.yml)
285+
- [Frequently Asked Questions (FAQs)](./faq.yml)

0 commit comments

Comments
 (0)