Skip to content

Commit 2924ad9

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into penote
2 parents b14965f + df36826 commit 2924ad9

File tree

314 files changed

+4765
-3191
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

314 files changed

+4765
-3191
lines changed

.openpublishing.publish.config.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -970,6 +970,7 @@
970970
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-old.json",
971971
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json",
972972
".openpublishing.redirection.baremetal-infrastructure.json",
973-
"articles/iot-dps/.openpublishing.redirection.iot-dps.json"
973+
"articles/iot-dps/.openpublishing.redirection.iot-dps.json",
974+
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json"
974975
]
975976
}

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,11 @@
4545
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
4646
"redirect_document_id": false
4747
},
48+
{
49+
"source_path_from_root": "/articles/active-directory/saas-apps/icertisicm-tutorial.md",
50+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
51+
"redirect_document_id": false
52+
},
4853
{
4954
"source_path_from_root": "/articles/active-directory/governance/tutorial-onboard-custom-workflow-graph.md",
5055
"redirect_url": "/graph/tutorial-lifecycle-workflows-onboard-custom-workflow",

.openpublishing.redirection.defender-for-iot.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/tutorial-getting-started-eiot-sensor.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/concept-enterprise",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-frequently-asked-questions.md",
510
"redirect_url": "/azure/defender-for-iot/organizations/faqs-general",

.openpublishing.redirection.json

Lines changed: 13 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -9,21 +9,21 @@
99
"source_path_from_root": "/articles/api-management/developer-portal-use-community-widgets.md",
1010
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
1111
"redirect_document_id": false
12-
},
12+
},
1313
{
1414
"source_path": "articles/sentinel/whats-new-archive.md",
1515
"redirect_url": "/azure/sentinel/whats-new",
16-
"redirect_document_id": false
16+
"redirect_document_id": false
1717
},
1818
{
1919
"source_path": "articles/backup/sap-hana-db-manage.md",
2020
"redirect_url": "/azure/backup/sap-hana-database-manage",
21-
"redirect_document_id": false
21+
"redirect_document_id": false
2222
},
2323
{
2424
"source_path": "articles/backup/sap-hana-db-restore.md",
2525
"redirect_url": "/azure/backup/sap-hana-database-restore",
26-
"redirect_document_id": false
26+
"redirect_document_id": false
2727
},
2828
{
2929
"source_path": "articles/backup/sap-hana-db-about.md",
@@ -93,32 +93,32 @@
9393
{
9494
"source_path": "articles/site-recovery/switch-replication-appliance-preview.md",
9595
"redirect_url": "/azure/site-recovery/switch-replication-appliance-modernized",
96-
"redirect_document_id": false
96+
"redirect_document_id": false
9797
},
9898
{
9999
"source_path": "articles/site-recovery/upgrade-mobility-service-preview.md",
100100
"redirect_url": "/azure/site-recovery/upgrade-mobility-service-modernized",
101-
"redirect_document_id": false
101+
"redirect_document_id": false
102102
},
103103
{
104104
"source_path": "articles/site-recovery/vmware-azure-set-up-replication-tutorial-preview.md",
105105
"redirect_url": "/azure/site-recovery/vmware-azure-set-up-replication-tutorial-modernized",
106-
"redirect_document_id": false
106+
"redirect_document_id": false
107107
},
108108
{
109109
"source_path": "articles/site-recovery/vmware-azure-architecture-preview.md",
110110
"redirect_url": "/azure/site-recovery/vmware-azure-architecture-modernized",
111-
"redirect_document_id": false
111+
"redirect_document_id": false
112112
},
113113
{
114114
"source_path": "articles/physical-server-azure-architecture-preview.md",
115115
"redirect_url": "/azure/physical-server-azure-architecture-modernized",
116-
"redirect_document_id": false
116+
"redirect_document_id": false
117117
},
118118
{
119119
"source_path": "articles/vmware-azure-tutorial-failover-failback-preview.md",
120120
"redirect_url": "/azure/vmware-azure-tutorial-failover-failback-modernized",
121-
"redirect_document_id": false
121+
"redirect_document_id": false
122122
},
123123
{
124124
"source_path": "articles/automanage/automanage-virtual-machines.md",
@@ -6353,12 +6353,12 @@
63536353
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63546354
"redirect_document_id": false
63556355
},
6356-
{
6356+
{
63576357
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-client.md",
63586358
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
63596359
"redirect_document_id": false
63606360
},
6361-
{
6361+
{
63626362
"source_path_from_root": "/articles/storage/common/storage-auth-abac-attributes.md",
63636363
"redirect_url": "/azure/storage/blobs/storage-auth-abac-attributes",
63646364
"redirect_document_id": false
@@ -10493,21 +10493,6 @@
1049310493
"redirect_url": "/azure/cloud-services/diagnostics-performance-counters",
1049410494
"redirect_document_id": false
1049510495
},
10496-
{
10497-
"source_path_from_root": "/articles/cloud-shell/features-powershell.md",
10498-
"redirect_url": "/azure/cloud-shell/features",
10499-
"redirect_document_id": false
10500-
},
10501-
{
10502-
"source_path_from_root": "/articles/cloud-shell/index.md",
10503-
"redirect_url": "/azure/cloud-shell/overview",
10504-
"redirect_document_id": false
10505-
},
10506-
{
10507-
"source_path_from_root": "/articles/cloud-shell/persisting-shell-storage-powershell.md",
10508-
"redirect_url": "/azure/cloud-shell/persisting-shell-storage",
10509-
"redirect_document_id": false
10510-
},
1051110496
{
1051210497
"source_path_from_root": "/articles/jenkins/azure-container-agents-plugin-run-container-as-an-agent.md",
1051310498
"redirect_url": "/azure/container-instances/container-instances-jenkins",
@@ -25437,7 +25422,7 @@
2543725422
"source_path_from_root": "/articles/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription.md",
2543825423
"redirect_url": "/previous-versions/azure/virtual-machines/scripts/virtual-machines-cli-sample-copy-managed-disks-to-same-or-different-subscription",
2543925424
"redirect_document_id": false
25440-
},
25425+
},
2544125426
{
2544225427
"source_path_from_root": "/articles/virtual-machines/disks-cross-tenant-cmk.md",
2544325428
"redirect_url": "/azure/virtual-machines/disks-cross-tenant-customer-managed-keys",
@@ -29494,11 +29479,6 @@
2949429479
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6-powershell",
2949529480
"redirect_document_id": false
2949629481
},
29497-
{
29498-
"source_path_from_root": "/articles/cloud-shell/example-terraform-bash.md",
29499-
"redirect_url": "/azure/developer/terraform/quickstart-configure",
29500-
"redirect_document_id": false
29501-
},
2950229482
{
2950329483
"source_path_from_root": "/articles/aks/managed-cluster-snapshot.md",
2950429484
"redirect_url": "/azure/aks/intro-kubernetes",

.openpublishing.redirection.security-benchmark.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -386,11 +386,6 @@
386386
"redirect_url": "/security/benchmark/azure/baselines/batch-security-baseline",
387387
"redirect_document_id": false
388388
},
389-
{
390-
"source_path_from_root": "/articles/cloud-shell/security-baseline.md",
391-
"redirect_url": "/security/benchmark/azure/baselines/cloud-shell-security-baseline",
392-
"redirect_document_id": false
393-
},
394389
{
395390
"source_path_from_root": "/articles/cognitive-services/security-baseline.md",
396391
"redirect_url": "/security/benchmark/azure/baselines/cognitive-services-security-baseline",

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2022
9+
ms.date: 11/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -57,8 +57,24 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
5757
>
5858
> When two methods are required, users can reset using either a notification or verification code in addition to any other enabled methods.
5959
60+
61+
## FIPS 140 compliant for Azure AD authentication
62+
63+
Beginning with version 6.6.8, Microsoft Authenticator for iOS is compliant with [Federal Information Processing Standard (FIPS) 140](https://csrc.nist.gov/publications/detail/fips/140/3/final?azure-portal=true) for all Azure AD authentications using push multi-factor authentications (MFA), passwordless Phone Sign-In (PSI), and time-based one-time passcodes (TOTP).  
64+
65+
Consistent with the guidelines outlined in [NIST SP 800-63B](https://pages.nist.gov/800-63-3/sp800-63b.html?azure-portal=true), authenticators are required to use FIPS 140 validated cryptography. This helps federal agencies meet the requirements of [Executive Order (EO) 14028](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/?azure-portal=true) and healthcare organizations working with [Electronic Prescriptions for Controlled Substances (EPCS)](/azure/compliance/offerings/offering-epcs-us)
66+
67+
FIPS 140 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140 standard is maintained by the [Cryptographic Module Validation Program (CMVP)](https://csrc.nist.gov/Projects/cryptographic-module-validation-program?azure-portal=true).
68+
69+
No changes in configurations are required in Microsoft Authenticator or the Azure portal to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default.
70+
71+
Authenticator leverages the native Apple cryptography to achieve FIPS 140, Security Level 1 compliance on Apple iOS devices beginning with Microsoft Authenticator version 6.6.8. For more information about the certifications being used, see the [Apple CoreCrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web?azure-portal=true)
72+
73+
FIPS 140 compliance for Microsoft Authenticator on Android is in progress and will follow soon.
74+
6075
## Next steps
6176

6277
- To get started with passwordless sign-in, see [Enable passwordless sign-in with the Microsoft Authenticator](howto-authentication-passwordless-phone.md).
6378

6479
- Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
80+

articles/active-directory/develop/v2-overview.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,16 @@
22
title: Microsoft identity platform overview
33
description: Learn about the components of the Microsoft identity platform and how they can help you build identity and access management (IAM) support into your applications.
44
services: active-directory
5-
author: rwike77
5+
author: CelesteDG
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: overview
1111
ms.workload: identity
12-
ms.date: 10/18/2022
13-
ms.author: ryanwi
14-
ms.reviewer: agirling, saeeda, benv
15-
ms.custom: identityplatformtop40, contperf-fy21q2, engagement-fy23
12+
ms.date: 11/16/2022
13+
ms.author: celested
14+
ms.reviewer: saeeda
1615
# Customer intent: As an application developer, I want a quick introduction to the Microsoft identity platform so I can decide if this platform meets my application development requirements.
1716
---
1817

@@ -72,8 +71,6 @@ Learn how core authentication and Azure AD concepts apply to the Microsoft ident
7271

7372
[Azure AD B2B](../external-identities/what-is-b2b.md) - Invite external users into your Azure AD tenant as "guest" users, and assign permissions for authorization while they use their existing credentials for authentication.
7473

75-
[Azure Active Directory for developers (v1.0)](../azuread-dev/v1-overview.md) - Exclusively for developers with existing apps that use the older v1.0 endpoint. **Do not** use v1.0 for new projects.
76-
7774
## Next steps
7875

7976
If you have an Azure account, then you have access to an Azure Active Directory tenant. However, most Microsoft identity platform developers need their own Azure AD tenant for use while developing applications, known as a *dev tenant*.

articles/active-directory/hybrid/plan-connect-topologies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The most common topology is a single on-premises forest, with one or multiple do
4646
### Single forest, multiple sync servers to one Azure AD tenant
4747
![Unsupported, filtered topology for a single forest](./media/plan-connect-topologies/singleforestfilteredunsupported.png)
4848

49-
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers.
49+
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers. (No errors occur when a new Azure AD Sync Server is configured for a new Azure AD forest and a new verified child domain.)
5050

5151
## Multiple forests, single Azure AD tenant
5252
![Topology for multiple forests and a single tenant](./media/plan-connect-topologies/multiforestsingledirectory.png)
@@ -78,7 +78,7 @@ You can find more details in [Understanding the default configuration](concept-a
7878

7979
Having more than one Azure AD Connect sync server connected to a single Azure AD tenant is not supported. The exception is the use of a [staging server](#staging-server).
8080

81-
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported.
81+
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported. (While not supported, this still works.)
8282

8383
### Multiple forests, single sync server, users are represented in only one directory
8484
![Option for representing users only once across all directories](./media/plan-connect-topologies/multiforestusersonce.png)
@@ -142,8 +142,8 @@ We recommend having a single tenant in Azure AD for an organization. Before you
142142

143143
This topology implements the following use cases:
144144

145-
* AADConnect can synchronize the same users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial.
146-
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant)
145+
* AADConnect can synchronize the users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial. For more details on options, see https://docs.microsoft.com/azure/azure-government/documentation-government-plan-identity.
146+
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant). (The verified domain can't be the same in two tenants. More details are needed to enable the same object to have two UPNs.)
147147
* You will need to deploy an AADConnect server for every Azure AD tenant you want to synchronize to - one AADConnect server cannot synchronize to more than one Azure AD tenant.
148148
* It is supported to have different sync scopes and different sync rules for different tenants.
149149
* Only one Azure AD tenant sync can be configured to write back to Active Directory for the same object. This includes device and group writeback as well as Hybrid Exchange configurations – these features can only be configured in one tenant. The only exception here is Password Writeback – see below.

articles/active-directory/identity-protection/concept-identity-protection-policies.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 10/04/2022
9+
ms.date: 11/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -51,13 +51,10 @@ If risks are detected on a sign-in, users can perform the required access contro
5151
Identity Protection analyzes signals about user accounts and calculates a risk score based on the probability that the user has been compromised. If a user has risky sign-in behavior, or their credentials have been leaked, Identity Protection will use these signals to calculate the user risk level. Administrators can configure user risk-based Conditional Access policies to enforce access controls based on user risk, including requirements such as:
5252

5353
- Block access
54-
- Allow access but require a secure password change using [Azure AD self-service password reset](../authentication/howto-sspr-deployment.md).
54+
- Allow access but require a secure password change.
5555

5656
A secure password change will remediate the user risk and close the risky user event to prevent unnecessary noise for administrators.
5757

58-
> [!NOTE]
59-
> Users must have previously registered for self-service password reset before triggering the user risk policy.
60-
6158
## Identity Protection policies
6259

6360
While Identity Protection also offers a user interface for creating user risk policy and sign-in risk policy, we highly recommend that you [use Azure AD Conditional Access to create risk-based policies](howto-identity-protection-configure-risk-policies.md) for the following benefits:

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: identity-protection
88
ms.topic: conceptual
9-
ms.date: 08/16/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -85,7 +85,8 @@ Premium detections are visible only to Azure AD Premium P2 customers. Customers
8585
| Risk detection | Detection type | Description |
8686
| --- | --- | --- |
8787
| Possible attempt to access Primary Refresh Token (PRT) | Offline | This risk detection type is detected by Microsoft Defender for Endpoint (MDE). A Primary Refresh Token (PRT) is a key artifact of Azure AD authentication on Windows 10, Windows Server 2016, and later versions, iOS, and Android devices. A PRT is a JSON Web Token (JWT) that's specially issued to Microsoft first-party token brokers to enable single sign-on (SSO) across the applications used on those devices. Attackers can attempt to access this resource to move laterally into an organization or perform credential theft. This detection will move users to high risk and will only fire in organizations that have deployed MDE. This detection is low-volume and will be seen infrequently by most organizations. However, when it does occur it's high risk and users should be remediated. |
88-
| Anomalous user activity | Offline | This risk detection indicates that suspicious patterns of activity have been identified for an authenticated user. The post-authentication behavior of users is assessed for anomalies. This behavior is based on actions occurring for the account, along with any sign-in risk detected. |
88+
| Anomalous user activity | Offline | This risk detection baselines normal administrative user behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrator making the change or the object that was changed. |
89+
8990

9091
#### Nonpremium user risk detections
9192

0 commit comments

Comments
 (0)