Skip to content

Commit 29879d8

Browse files
committed
2 parents af3ca83 + 0460f76 commit 29879d8

File tree

194 files changed

+4598
-3940
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

194 files changed

+4598
-3940
lines changed

.openpublishing.redirection.json

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18120,6 +18120,11 @@
1812018120
"redirect_url": "/azure/virtual-machine-scale-sets/disk-encryption-powershell",
1812118121
"redirect_document_id": true
1812218122
},
18123+
{
18124+
"source_path": "articles/virtual-machines/linux/update-infrastructure-redhat.md",
18125+
"redirect_url": "/azure/virtual-machines/workloads/redhat/redhat-rhui",
18126+
"redirect_document_id": false
18127+
},
1812318128
{
1812418129
"source_path": "articles/virtual-machine-scale-sets/virtual-machine-scale-sets-advanced-autoscale.md",
1812518130
"redirect_url": "/azure/monitoring-and-diagnostics/insights-advanced-autoscale-virtual-machine-scale-sets",
@@ -23527,7 +23532,7 @@
2352723532
},
2352823533
{
2352923534
"source_path": "articles/virtual-machines/virtual-machines-linux-update-infrastructure-redhat.md",
23530-
"redirect_url": "/azure/virtual-machines/linux/update-infrastructure-redhat",
23535+
"redirect_url": "/azure/virtual-machines/workloads/redhat/redhat-rhui",
2353123536
"redirect_document_id": false
2353223537
},
2353323538
{
@@ -35545,6 +35550,11 @@
3554535550
"redirect_url": "/azure/iot-accelerators/iot-accelerators-device-simulation-advanced-device",
3554635551
"redirect_document_id": false
3554735552
},
35553+
{
35554+
"source_path": "articles/active-directory/conditional-access/app-based-mfa.md",
35555+
"redirect_url": "/azure/active-directory/authentication/tutorial-enable-azure-mfa",
35556+
"redirect_document_id": false
35557+
},
3554835558
{
3554935559
"source_path": "articles/active-directory/conditional-access/technical-reference.md",
3555035560
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-conditions",
@@ -48800,6 +48810,21 @@
4880048810
"source_path": "articles/terraform/terraform-vm-managed-identities-for-azure-resources.md",
4880148811
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
4880248812
"redirect_document_id": false
48813+
},
48814+
{
48815+
"source_path": "articles/cognitive-services/Speech-Service/speech-devices-sdk-android-quickstart.md",
48816+
"redirect_url": "/azure/cognitive-services/speech-service/speech-devices-sdk-quickstart?pivots=platform-android",
48817+
"redirect_document_id": false
48818+
},
48819+
{
48820+
"source_path": "articles/cognitive-services/Speech-Service/speech-devices-sdk-linux-quickstart.md",
48821+
"redirect_url": "/azure/cognitive-services/speech-service/speech-devices-sdk-quickstart?pivots=platform-linux",
48822+
"redirect_document_id": false
48823+
},
48824+
{
48825+
"source_path": "articles/cognitive-services/Speech-Service/speech-devices-sdk-windows-quickstart.md",
48826+
"redirect_url": "/azure/cognitive-services/speech-service/speech-devices-sdk-quickstart?pivots=platform-windows",
48827+
"redirect_document_id": false
4880348828
}
4880448829
]
4880548830
}

articles/active-directory/app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,10 +93,12 @@ Scoping filters are configured as part of the attribute mappings for each Azure
9393
i. **Greater_Than.** Clause returns "true" if the evaluated attribute is greater than the value. The value specified on the scoping filter must be an integer and the attribute on the user must be an integer [0,1,2,...].
9494

9595
j. **Greater_Than_OR_EQUALS.** Clause returns "true" if the evaluated attribute is greater than or equal to the value. The value specified on the scoping filter must be an integer and the attribute on the user must be an integer [0,1,2,...].
96+
97+
k. **Includes.** Clause returns "true" if the evaluated attribute contains the string value (case sensitive) as described [here](https://docs.microsoft.com/dotnet/api/system.string.contains?view=netframework-4.8).
9698

9799

98100
>[!IMPORTANT]
99-
> The Includes and IsMemberOf filters are not supported. They will soon be removed from the UI.
101+
> The IsMemberOf filter is not supported currently.
100102
101103
9. Optionally, repeat steps 7-8 to add more scoping clauses.
102104

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1450,12 +1450,13 @@ If you're building an application that will be used by more than one tenant, you
14501450
### Gallery onboarding checklist
14511451
Follow the checklist below to ensure that your application is onboarded quicky and customers have a smooth deployment experience. The information will be gathered from you when onboarding to the gallery.
14521452
> [!div class="checklist"]
1453-
> * [Support SCIM 2.0 ](https://tools.ietf.org/html/draft-wahl-scim-profile-00) (Required)
1453+
> * Support a [SCIM 2.0 ](https://docs.microsoft.com/azure/active-directory/app-provisioning/use-scim-to-provision-users-and-groups#step-2-understand-the-azure-ad-scim-implementation) user and group endpoint (Only one is required but both are recommended)
14541454
> * Support at least 25 requests per second per tenant (Required)
1455-
> * Support schema discovery (Recommended)
14561455
> * Support the OAuth authorization code grant or a long lived token as described below (Required)
1457-
> * Establish an engineering and support point of contact to support customer post gallery onboarding (Required)
1456+
> * Establish an engineering and support point of contact to support customers post gallery onboarding (Required)
1457+
> * Support updating multiple group memberships with a single PATCH (Recommended)
14581458
> * Document your SCIM endpoint publicly (Recommended)
1459+
> * [Support schema discovery](https://tools.ietf.org/html/rfc7643#section-6) (Recommended)
14591460
14601461

14611462
### Authorization for provisioning connectors in the application gallery

articles/active-directory/conditional-access/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,14 @@
66
href: overview.md
77
- name: Quickstarts
88
items:
9-
- name: Require MFA for specific apps
10-
href: app-based-mfa.md
119
- name: Require terms of use to be accepted
1210
href: require-tou.md
1311
- name: Block access when a session risk is detected
1412
href: app-sign-in-risk.md
13+
- name: Tutorials
14+
items:
15+
- name: Require Azure Multi-Factor Authentication
16+
href: /authentication/tutorial-enable-azure-mfa.md?toc=/azure/conditional-access/toc.json&bc=/azure/conditional-access/breadcrumb/toc.json
1517
- name: Concepts
1618
expanded: false
1719
items:

articles/active-directory/conditional-access/app-based-mfa.md

Lines changed: 0 additions & 186 deletions
This file was deleted.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
- name: Azure
2+
tocHref: /azure/
3+
topicHref: /azure/index
4+
items:
5+
- name: Active Directory
6+
tocHref: /azure/active-directory/
7+
topicHref: /azure/active-directory/index
8+
items:
9+
- name: Conditional Access
10+
tocHref: /azure/active-directory/conditional-access/
11+
topicHref: /azure/active-directory/authentication/index

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/11/2020
9+
ms.date: 02/21/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -52,13 +52,17 @@ Selecting this checkbox will require users to perform Azure Multi-Factor Authent
5252

5353
Organizations who have deployed Microsoft Intune can use the information returned from their devices to identify devices that meet specific compliance requirements. This policy compliance information is forwarded from Intune to Azure AD where Conditional Access can make decisions to grant or block access to resources. For more information about compliance policies, see the article [Set rules on devices to allow access to resources in your organization using Intune](https://docs.microsoft.com/intune/protect/device-compliance-get-started).
5454

55+
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Third-party MDM systems for device OS types other than Windows 10 are not supported.
56+
57+
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in the article, [What is a device identity](../devices/overview.md).
58+
5559
### Require hybrid Azure AD joined device
5660

5761
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined using this checkbox. For more information about device identities, see the article [What is a device identity?](../devices/overview.md).
5862

5963
### Require approved client app
6064

61-
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app.
65+
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client aps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
6266

6367
This setting applies to the following client apps:
6468

@@ -99,9 +103,7 @@ This setting applies to the following client apps:
99103

100104
### Require app protection policy
101105

102-
In your Conditional Access policy, you can require an app protection policy be present on the client app before access is available to the selected cloud apps.
103-
104-
![Control access with app protection policy](./media/technical-reference/22.png)
106+
In your Conditional Access policy, you can require an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
105107

106108
This setting applies to the following client apps:
107109

@@ -116,6 +118,10 @@ This setting applies to the following client apps:
116118
- The **Require app protection policy** requirements:
117119
- Only supports the iOS and Android for device platform condition.
118120

121+
### Terms of use
122+
123+
If your organization has created terms of use, additional options may be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources protected by the policy. More information about terms of use can be found in the article, [Azure Active Directory terms of use](terms-of-use.md).
124+
119125
## Next steps
120126

121127
- [Conditional Access: Session controls](concept-conditional-access-session.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-compliant-device.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 12/12/2019
9+
ms.date: 02/20/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -24,7 +24,7 @@ Organizations who have deployed Microsoft Intune can use the information returne
2424
* Requiring a minimum or maximum operating system version
2525
* Requiring a device is not jailbroken or rooted
2626

27-
This policy compliance information is forwarded to Azure AD where Conditional Access can make decisions to grant or block access to resources.
27+
This policy compliance information is forwarded to Azure AD where Conditional Access can make decisions to grant or block access to resources. More information about device compliance policies can be found in the article, [Set rules on devices to allow access to resources in your organization using Intune](/intune/protect/device-compliance-get-started)
2828

2929
## Create a Conditional Access policy
3030

@@ -58,4 +58,4 @@ On Windows 7, iOS, Android, macOS, and some third-party web browsers Azure AD id
5858

5959
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
6060

61-
[Device compliance policies work with Azure AD](https://docs.microsoft.com/intune/device-compliance-get-started#device-compliance-policies-work-with-azure-ad)
61+
[Device compliance policies work with Azure AD](/intune/device-compliance-get-started#device-compliance-policies-work-with-azure-ad)

articles/active-directory/fundamentals/active-directory-licensing-whatis-azure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You must have one of the following licenses to use group-based licensing:
3030

3131
- Paid or trial subscription for Azure AD Premium P1 and above
3232

33-
- Paid or trial edition of Office 365 Enterprise E3 or Office 365 A3 or Office 365 GCC G3 and above
33+
- Paid or trial edition of Office 365 Enterprise E3 or Office 365 A3 or Office 365 GCC G3 or Office 365 E3 for GCCH or Office 365 E3 for DOD and above
3434

3535
### Required number of licenses
3636
For any groups assigned a license, you must also have a license for each unique member. While you don't have to assign each member of the group a license, you must have at least enough licenses to include all of the members. For example, if you have 1,000 unique members who are part of licensed groups in your tenant, you must have at least 1,000 licenses to meet the licensing agreement.
78.6 KB
Loading

0 commit comments

Comments
 (0)