Skip to content

Commit 2bab139

Browse files
PRMerger Fixes
1 parent 630598c commit 2bab139

File tree

4 files changed

+13
-13
lines changed

4 files changed

+13
-13
lines changed

.openpublishing.redirection.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35211,13 +35211,13 @@
3521135211
"redirect_document_id": false
3521235212
},
3521335213
{
35214-
"source_path": "articles/active-directory/active-directory/conditional-access/technical-reference.md",
35215-
"redirect_url": "/azure/active-directory/active-directory/conditional-access/concept-conditional-access-conditions",
35214+
"source_path": "articles/active-directory/conditional-access/technical-reference.md",
35215+
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-conditions",
3521635216
"redirect_document_id": false
3521735217
},
3521835218
{
35219-
"source_path": "articles/active-directory/active-directory/conditional-access/conditions.md",
35220-
"redirect_url": "/azure/active-directory/active-directory/conditional-access/concept-conditional-access-conditions",
35219+
"source_path": "articles/active-directory/conditional-access/conditions.md",
35220+
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-conditions",
3522135221
"redirect_document_id": true
3522235222
},
3522335223
{

articles/active-directory/devices/faq.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ For more information, see [Require managed devices for cloud app access with Con
5353

5454
---
5555

56-
### Q: Why do my users see an error message saying "Your organization has deleted the device" or "Your organization has disabled the device" on their Windows 10 devices ?
56+
### Q: Why do my users see an error message saying "Your organization has deleted the device" or "Your organization has disabled the device" on their Windows 10 devices?
5757

58-
**A:** On Windows 10 devices joined or registered with Azure AD, users are issued a [Primary refresh token (PRT)](concept-primary-refresh-token.md) which enables single sign on. The validity of the PRT is based on the validaity of the device itself. Users see this message if the device is either deleted or disabled in Azure AD without initiating the action from the device itself. A device can be deleted or disabled in Azure AD one of the following scenarios:
58+
**A:** On Windows 10 devices joined or registered with Azure AD, users are issued a [Primary refresh token (PRT)](concept-primary-refresh-token.md) which enables single sign on. The validity of the PRT is based on the validity of the device itself. Users see this message if the device is either deleted or disabled in Azure AD without initiating the action from the device itself. A device can be deleted or disabled in Azure AD one of the following scenarios:
5959

6060
- User disables the device from the My Apps portal.
6161
- An administrator (or user) deletes or disables the device in the Azure portal or by using PowerShell
@@ -69,7 +69,7 @@ See below on how these actions can be rectified.
6969

7070
### Q: I disabled or deleted my device in the Azure portal or by using Windows PowerShell. But the local state on the device says it's still registered. What should I do?
7171

72-
**A:** This operation is by design. In this case, the device doesn't have access to resources in the cloud. Administrators can perform this action for stale, lost or stolen devices to prevent unauthorized access. If this action was performed unintentionally, you'll need to re-enable or re-register the device as described below
72+
**A:** This operation is by design. In this case, the device doesn't have access to resources in the cloud. Administrators can perform this action for stale, lost, or stolen devices to prevent unauthorized access. If this action was performed unintentionally, you'll need to re-enable or re-register the device as described below
7373

7474
- If the device was disabled in Azure AD, an administrator with sufficient privileges can enable it from the Azure AD portal
7575
> [!NOTE]
@@ -117,7 +117,7 @@ See below on how these actions can be rectified.
117117

118118
### Q: Does Windows 10 device registration in Azure AD support TPMs in FIPS mode?
119119

120-
**A:** Windows 10 device registration only supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join or Hybrid Azure AD join. Note that Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.
120+
**A:** Windows 10 device registration only supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join or Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Contact your hardware OEM for support.
121121

122122
---
123123

@@ -289,13 +289,13 @@ If a password is changed outside the corporate network (for example, by using Az
289289
**A:**
290290
- For Windows 10 Azure AD registered devices, Go to **Settings** > **Accounts** > **Access Work or School**. Select your account and select **Disconnect**. Device registration is per user profile on Windows 10.
291291
- For iOS and Android, you can use the Microsoft Authenticator application **Settings** > **Device Registration** and select **Unregister device**.
292-
- For macOS, you can use the Microsoft Intune Company Portal application to un-enroll the device from management and remove any registration.
292+
- For macOS, you can use the Microsoft Intune Company Portal application to unenroll the device from management and remove any registration.
293293

294294
---
295295
### Q: How can I block users from adding additional work accounts (Azure AD registered) on my corporate Windows 10 devices?
296296

297297
**A:**
298-
Enable the following registry to block your users from adding additional work accounts to your corporate domain joined, Azure AD joined or hybrid Azure AD joined Windows 10 devices. This policy can also be used to block domain joined machines from inadvertently getting Azure AD registered with the same user account.
298+
Enable the following registry to block your users from adding additional work accounts to your corporate domain joined, Azure AD joined, or hybrid Azure AD joined Windows 10 devices. This policy can also be used to block domain joined machines from inadvertently getting Azure AD registered with the same user account.
299299

300300
`HKLM\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin, "BlockAADWorkplaceJoin"=dword:00000001`
301301

articles/active-directory/hybrid/how-to-connect-pta-security-deep-dive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ These are the key security aspects of this feature:
3737
- Only standard ports (80 and 443) are used for outbound communication from the Authentication Agents to Azure AD. You don't need to open inbound ports on your firewall.
3838
- Port 443 is used for all authenticated outbound communication.
3939
- Port 80 is used only for downloading the Certificate Revocation Lists (CRLs) to ensure that none of the certificates used by this feature have been revoked.
40-
- For the complete list of the network requirements, see [Azure Active Directory Pass-through Authentication: Quick start](how-to-connect-pta-quick-start.md#step-1-check-the-prerequisites).
40+
- For the complete list of the network requirements, see [Azure Active Directory Pass-through Authentication: Quickstart](how-to-connect-pta-quick-start.md#step-1-check-the-prerequisites).
4141
- Passwords that users provide during sign-in are encrypted in the cloud before the on-premises Authentication Agents accept them for validation against Active Directory.
4242
- The HTTPS channel between Azure AD and the on-premises Authentication Agent is secured by using mutual authentication.
4343
- Protects your user accounts by working seamlessly with [Azure AD Conditional Access policies](../active-directory-conditional-access-azure-portal.md), including Multi-Factor Authentication (MFA), [blocking legacy authentication](../conditional-access/concept-conditional-access-conditions.md) and by [filtering out brute force password attacks](../authentication/howto-password-smart-lockout.md).
@@ -208,7 +208,7 @@ To auto-update an Authentication Agent:
208208

209209
## Next steps
210210
- [Current limitations](how-to-connect-pta-current-limitations.md): Learn which scenarios are supported and which ones are not.
211-
- [Quick start](how-to-connect-pta-quick-start.md): Get up and running on Azure AD Pass-through Authentication.
211+
- [Quickstart](how-to-connect-pta-quick-start.md): Get up and running on Azure AD Pass-through Authentication.
212212
- [Migrate from AD FS to Pass-through Authentication](https://aka.ms/adfstoptadpdownload) - A detailed guide to migrate from AD FS (or other federation technologies) to Pass-through Authentication.
213213
- [Smart Lockout](../authentication/howto-password-smart-lockout.md): Configure the Smart Lockout capability on your tenant to protect user accounts.
214214
- [How it works](how-to-connect-pta-how-it-works.md): Learn the basics of how Azure AD Pass-through Authentication works.

articles/active-directory/hybrid/how-to-connect-pta.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ You can combine Pass-through Authentication with the [Seamless Single Sign-On](h
6565

6666
## Next steps
6767

68-
- [Quick Start](how-to-connect-pta-quick-start.md) - Get up and running Azure AD Pass-through Authentication.
68+
- [Quickstart](how-to-connect-pta-quick-start.md) - Get up and running Azure AD Pass-through Authentication.
6969
- [Migrate from AD FS to Pass-through Authentication](https://github.com/Identity-Deployment-Guides/Identity-Deployment-Guides/blob/master/Authentication/Migrating%20from%20Federated%20Authentication%20to%20Pass-through%20Authentication.docx?raw=true) - A detailed guide to migrate from AD FS (or other federation technologies) to Pass-through Authentication.
7070
- [Smart Lockout](../authentication/howto-password-smart-lockout.md) - Configure Smart Lockout capability on your tenant to protect user accounts.
7171
- [Current limitations](how-to-connect-pta-current-limitations.md) - Learn which scenarios are supported and which ones are not.

0 commit comments

Comments
 (0)