Skip to content

Commit 2d3a864

Browse files
Merge pull request #246404 from MicrosoftGuyJFlo/NameRemoval
[Microsoft Entra ID] Devices - update filenames
2 parents 455fb18 + 60fe518 commit 2d3a864

File tree

65 files changed

+135
-101
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+135
-101
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1320,6 +1320,41 @@
13201320
"redirect_url": "/azure/active-directory/privileged-identity-management/pim-configure",
13211321
"redirect_document_id": false
13221322
},
1323+
{
1324+
"source_path_from_root": "/articles/active-directory/devices/howto-hybrid-join-downlevel.md",
1325+
"redirect_url": "/azure/active-directory/devices/how-to-hybrid-join-downlevel",
1326+
"redirect_document_id": true
1327+
},
1328+
{
1329+
"source_path_from_root": "/articles/active-directory/devices/howto-hybrid-join-verify.md",
1330+
"redirect_url": "/azure/active-directory/devices/how-to-hybrid-join-verify",
1331+
"redirect_document_id": true
1332+
},
1333+
{
1334+
"source_path_from_root": "/articles/active-directory/devices/howto-hybrid-azure-ad-join.md",
1335+
"redirect_url": "/azure/active-directory/devices/how-to-hybrid-join",
1336+
"redirect_document_id": true
1337+
},
1338+
{
1339+
"source_path_from_root": "/articles/active-directory/devices/concept-azure-ad-join-hybrid.md",
1340+
"redirect_url": "/azure/active-directory/devices/concept-hybrid-join",
1341+
"redirect_document_id": true
1342+
},
1343+
{
1344+
"source_path_from_root": "/articles/active-directory/devices/azuread-joined-devices-frx.md",
1345+
"redirect_url": "/azure/active-directory/devices/device-join-out-of-box",
1346+
"redirect_document_id": true
1347+
},
1348+
{
1349+
"source_path_from_root": "/articles/active-directory/devices/azuread-join-sso.md",
1350+
"redirect_url": "/azure/active-directory/devices/device-sso-to-on-premises-resources",
1351+
"redirect_document_id": true
1352+
},
1353+
{
1354+
"source_path_from_root": "/articles/active-directory/devices/azureadjoin-plan.md",
1355+
"redirect_url": "/azure/active-directory/devices/device-join-plan",
1356+
"redirect_document_id": true
1357+
},
13231358
{
13241359
"source_path_from_root": "/articles/active-directory/devices/concept-azure-managed-workstation.md",
13251360
"redirect_url": "/security/compass/concept-azure-managed-workstation",

articles/active-directory/architecture/ops-guide-auth.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ Like a user in your organization, a device is a core identity you want to protec
117117

118118
- Avoiding friction, for example, with MFA, when the device is trusted
119119
- Blocking access from untrusted devices
120-
- For Windows 10 devices, provide [single sign-on to on-premises resources seamlessly](../devices/azuread-join-sso.md).
120+
- For Windows 10 devices, provide [single sign-on to on-premises resources seamlessly](../devices/device-sso-to-on-premises-resources.md).
121121

122122
You can carry out this goal by bringing device identities and managing them in Azure AD by using one of the following methods:
123123

articles/active-directory/architecture/protect-m365-from-on-premises-attacks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ Owners of groups that are used for access should be considered privileged identi
152152

153153
Use Azure AD capabilities to securely manage devices.
154154

155-
Deploy Azure AD joined Windows 10 workstations with mobile device management policies. Enable Windows Autopilot for a fully automated provisioning experience. See [Plan your Azure AD join implementation](../devices/azureadjoin-plan.md) and [Windows Autopilot](/mem/autopilot/windows-autopilot).
155+
Deploy Azure AD joined Windows 10 workstations with mobile device management policies. Enable Windows Autopilot for a fully automated provisioning experience. See [Plan your Azure AD join implementation](../devices/device-join-plan.md) and [Windows Autopilot](/mem/autopilot/windows-autopilot).
156156

157157
- **Use Windows 10 workstations**.
158158
- Deprecate machines that run Windows 8.1 and earlier.

articles/active-directory/architecture/resilience-with-device-states.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ When a PRT requests access to an application, its device, session, and MFA claim
2828

2929
## How do I implement device states?
3030

31-
* Enable [hybrid Azure AD Joined](../devices/hybrid-azuread-join-plan.md) and [Azure AD Join](../devices/azureadjoin-plan.md) for company-owned Windows devices and require they be joined, if possible. If not possible, require they be registered. If there are older versions of Windows in your organization, upgrade those devices to use Windows 10.
31+
* Enable [hybrid Azure AD Joined](../devices/hybrid-azuread-join-plan.md) and [Azure AD Join](../devices/device-join-plan.md) for company-owned Windows devices and require they be joined, if possible. If not possible, require they be registered. If there are older versions of Windows in your organization, upgrade those devices to use Windows 10.
3232
* Standardize user browser access to use either [Microsoft Edge](/deployedge/microsoft-edge-security-identity) or Google Chrome with [supported](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji) [extensions](https://chrome.google.com/webstore/detail/office/ndjpnladcallmjemlbaebfadecfhkepb) that enable seamless SSO to web applications using the PRT.
3333
* For personal or company-owned iOS and Android devices, deploy the [Microsoft Authenticator App](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc). In addition to MFA and password-less sign-in capabilities, the Microsoft Authenticator app enables single sign-on across native applications through [brokered authentication](../develop/msal-android-single-sign-on.md) with fewer authentication prompts for end users.
3434
* For personal or company-owned iOS and Android devices, use [mobile application management](/mem/intune/apps/app-management) to securely access company resources with fewer authentication requests.

articles/active-directory/architecture/secure-fundamentals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ Some legacy scenarios required a human identity to be used in *non-human* scenar
8989

9090
* **Device objects** represent devices that are associated with an Azure AD tenant. Device objects contain attributes that have the required information about the device. This includes the operating system, associated user, compliance state, and the nature of the association with the Azure AD tenant. This association can take multiple forms depending on the nature of the interaction and trust level of the device.
9191

92-
* **Hybrid Domain Joined**. Devices that are owned by the organization and [joined](../devices/concept-azure-ad-join-hybrid.md) to both the on-premises Active Directory and Azure AD. Typically a device purchased and managed by an organization and managed by System Center Configuration Manager.
92+
* **Hybrid Domain Joined**. Devices that are owned by the organization and [joined](../devices/concept-hybrid-join.md) to both the on-premises Active Directory and Azure AD. Typically a device purchased and managed by an organization and managed by System Center Configuration Manager.
9393

9494
* **Azure AD Domain Joined**. Devices that are owned by the organization and joined to the organization's Azure AD tenant. Typically a device purchased and managed by an organization that is joined to Azure AD and managed by a service such as [Microsoft Intune](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/microsoft-intune).
9595

articles/active-directory/architecture/security-operations-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Devices aren't commonly targeted in identity-based attacks, but *can* be used to
2424

2525
* [Azure AD joined](../devices/concept-azure-ad-join.md)
2626

27-
* [Hybrid Azure AD joined](../devices/concept-azure-ad-join-hybrid.md)
27+
* [Hybrid Azure AD joined](../devices/concept-hybrid-join.md)
2828

2929
Registered and joined devices are issued a [Primary Refresh Token (PRT),](../devices/concept-primary-refresh-token.md) which can be used as a primary authentication artifact, and in some cases as a multifactor authentication artifact. Attackers may try to register their own devices, use PRTs on legitimate devices to access business data, steal PRT-based tokens from legitimate user devices, or find misconfigurations in device-based controls in Azure Active Directory. With Hybrid Azure AD joined devices, the join process is initiated and controlled by administrators, reducing the available attack methods.
3030

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ The following table summarizes the recommendations based on licenses:
131131

132132
| | Azure AD Free and Microsoft 365 apps | Azure AD Premium |
133133
|------------------------------|-----------------------------------|------------------|
134-
| **SSO** | [Azure AD join](../devices/concept-azure-ad-join.md) or [Hybrid Azure AD join](../devices/concept-azure-ad-join-hybrid.md), or [Seamless SSO](../hybrid/how-to-connect-sso.md) for unmanaged devices. | Azure AD join<br />Hybrid Azure AD join |
134+
| **SSO** | [Azure AD join](../devices/concept-azure-ad-join.md) or [Hybrid Azure AD join](../devices/concept-hybrid-join.md), or [Seamless SSO](../hybrid/how-to-connect-sso.md) for unmanaged devices. | Azure AD join<br />Hybrid Azure AD join |
135135
| **Reauthentication settings** | Remain signed-in | Use Conditional Access policies for sign-in frequency and persistent browser session |
136136

137137
## Next steps

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This document focuses on enabling FIDO2 security key based passwordless authenti
2828
| Compatible [FIDO2 security keys](concept-authentication-passwordless.md#fido2-security-keys) | X | X |
2929
| WebAuthN requires Windows 10 version 1903 or higher | X | X |
3030
| [Azure AD joined devices](../devices/concept-azure-ad-join.md) require Windows 10 version 1909 or higher | X | |
31-
| [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md) require Windows 10 version 2004 or higher | | X |
31+
| [Hybrid Azure AD joined devices](../devices/concept-hybrid-join.md) require Windows 10 version 2004 or higher | | X |
3232
| Fully patched Windows Server 2016/2019 Domain Controllers. | | X |
3333
| [Azure AD Hybrid Authentication Management module](https://www.powershellgallery.com/packages/AzureADHybridAuthenticationManagement/2.1.1.0) | | X |
3434
| [Microsoft Intune](/intune/fundamentals/what-is-intune) (Optional) | X | X |

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ In the current preview state, the following limitations apply to email as an alt
6060
* When a user is signed-in with a non-UPN email, they cannot change their password. Azure AD self-service password reset (SSPR) should work as expected. During SSPR, the user may see their UPN if they verify their identity using a non-UPN email.
6161

6262
* **Unsupported scenarios** - The following scenarios are not supported. Sign-in with non-UPN email for:
63-
* [Hybrid Azure AD joined devices](../devices/concept-azure-ad-join-hybrid.md)
63+
* [Hybrid Azure AD joined devices](../devices/concept-hybrid-join.md)
6464
* [Azure AD joined devices](../devices/concept-azure-ad-join.md)
6565
* [Azure AD registered devices](../devices/concept-azure-ad-register.md)
6666
* [Resource Owner Password Credentials (ROPC)](../develop/v2-oauth-ropc.md)

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Administrators can choose to enforce one or more controls when granting access.
3333
- [Require multifactor authentication (Azure AD Multifactor Authentication)](../authentication/concept-mfa-howitworks.md)
3434
- [Require authentication strength](#require-authentication-strength)
3535
- [Require device to be marked as compliant (Microsoft Intune)](/intune/protect/device-compliance-get-started)
36-
- [Require hybrid Azure AD joined device](../devices/concept-azure-ad-join-hybrid.md)
36+
- [Require hybrid Azure AD joined device](../devices/concept-hybrid-join.md)
3737
- [Require approved client app](app-based-conditional-access.md)
3838
- [Require app protection policy](app-protection-based-conditional-access.md)
3939
- [Require password change](#require-password-change)

0 commit comments

Comments
 (0)