Skip to content

Commit 2e2666d

Browse files
authored
Merge pull request #253885 from MicrosoftDocs/main
10/05 AM Publishing
2 parents 0d6fd5e + 16cb1f9 commit 2e2666d

File tree

37 files changed

+244
-73
lines changed

37 files changed

+244
-73
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1100,6 +1100,12 @@
11001100
"branch": "main",
11011101
"branch_mapping": {}
11021102
},
1103+
{
1104+
"path_to_root": "playwright-testing-service",
1105+
"url": "https://github.com/microsoft/playwright-testing-service",
1106+
"branch": "main",
1107+
"branch_mapping": {}
1108+
},
11031109
{
11041110
"path_to_root": "microsoft-graph",
11051111
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs-contrib",

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 09/23/2023
14+
ms.date: 10/05/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Microsoft Entra Domain Services
1717
summary: This page answers frequently asked questions about Microsoft Entra Domain Services.
@@ -159,7 +159,10 @@ sections:
159159
How are Windows Updates applied in Microsoft Entra Domain Services?
160160
answer: |
161161
Domain controllers in a managed domain automatically apply required Windows updates. There's nothing for you to configure or administer here. Make sure you don't create network security group rules that block outbound traffic to Windows Updates. For your own VMs joined to the managed domain, you are responsible for configuring and applying any required OS and application updates.
162-
162+
- question: |
163+
How is patching performed on domain controllers that are part of a managed domain?
164+
answer: |
165+
Patches are installed as soon as they become available (every second Tuesday). They are installed in phases during the week they become available, starting on Tuesdays.
163166
- question: |
164167
Why do my domain controllers change names?
165168
answer: |

articles/active-directory-domain-services/troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.custom: has-azure-ad-ps-ref
1313
ms.topic: troubleshooting
14-
ms.date: 09/15/2023
14+
ms.date: 10/05/2023
1515
ms.author: justinha
1616
---
1717
# Common errors and troubleshooting steps for Microsoft Entra Domain Services
@@ -138,7 +138,7 @@ If one or more users in your Microsoft Entra tenant can't sign in to the managed
138138
* You've deployed, or updated to, the [latest recommended release of Microsoft Entra Connect](https://www.microsoft.com/download/details.aspx?id=47594).
139139
* You've configured Microsoft Entra Connect to [perform a full synchronization][hybrid-phs].
140140
* Depending on the size of your directory, it may take a while for user accounts and credential hashes to be available in the managed domain. Make sure you wait long enough before trying to authenticate against the managed domain.
141-
* If the issue persists after verifying the previous steps, try restarting the *Microsoft Entra ID Sync Service*. From your Microsoft Entra Connect server, open a command prompt, then run the following commands:
141+
* If the issue persists after verifying the previous steps, try restarting the *Azure AD Sync Service*. From your Microsoft Entra Connect server, open a command prompt, then run the following commands:
142142

143143
```console
144144
net stop 'Microsoft Azure AD Sync'

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,10 +72,22 @@ Tenant admins can use the following steps to update certificate user IDs for a u
7272

7373
Authorized callers can run Microsoft Graph queries to find all the users with a given certificateUserId value. On the Microsoft Graph [user](/graph/api/resources/user) object, the collection of certificateUserIds is stored in the **authorizationInfo** property.
7474

75-
To retrieve all user objects that have the value '[email protected]' in certificateUserIds:
75+
To retrieve certificateUserIds of all user objects:
7676

7777
```msgraph-interactive
78-
GET https://graph.microsoft.com/v1.0/users?$filter=authorizationInfo/certificateUserIds/any(x:x eq '[email protected]')&$count=true
78+
GET https://graph.microsoft.com/v1.0/users?$select=authorizationinfo
79+
ConsistencyLevel: eventual
80+
```
81+
To retrieve certificateUserIds for a given user by user's ObjectId:
82+
83+
```msgraph-interactive
84+
GET https://graph.microsoft.com/v1.0/users/{user-object-id}?$select=authorizationinfo
85+
ConsistencyLevel: eventual
86+
```
87+
To retrieve the user object with a specific value in certificateUserIds:
88+
89+
```msgraph-interactive
90+
GET https://graph.microsoft.com/v1.0/users?$select=authorizationinfo&$filter=authorizationInfo/certificateUserIds/any(x:x eq 'x509:<PN>[email protected]')&$count=true
7991
ConsistencyLevel: eventual
8092
```
8193

@@ -88,7 +100,7 @@ Run a PATCH request to update the certificateUserIds for a given user.
88100
#### Request body:
89101

90102
```http
91-
PATCH https://graph.microsoft.com/v1.0/users/{id}
103+
PATCH https://graph.microsoft.com/v1.0/users/{user-object-id}
92104
Content-Type: application/json
93105
{
94106
"authorizationInfo": {

articles/active-directory/authentication/fido2-compatibility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The following tables show which transports are supported for each platform. Supp
9898
| Chrome | &#10060; | &#10060; | &#10060; |
9999
| Firefox | &#10060; | &#10060; | &#10060; |
100100

101-
<sup>1</sup>Security key biometrics or PIN for user verficiation isn't currently supported on Android by Google. Microsoft Entra ID requires user verification for all FIDO2 authentications.
101+
<sup>1</sup>Security key biometrics or PIN for user verficiation are currently supported on Android by Google. Microsoft Entra ID requires user verification for all FIDO2 authentications.
102102

103103
## Minimum browser version
104104

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: authentication
99
ms.custom: has-azure-ad-ps-ref
1010
ms.topic: how-to
11-
ms.date: 09/13/2023
11+
ms.date: 10/05/2023
1212

1313

1414
ms.author: justinha
@@ -61,7 +61,7 @@ To use passwordless authentication in Microsoft Entra ID, first enable the combi
6161
Microsoft Entra ID lets you choose which authentication methods can be used during the sign-in process. Users then register for the methods they'd like to use. The **Microsoft Authenticator** authentication method policy manages both the traditional push MFA method and the passwordless authentication method.
6262

6363
> [!NOTE]
64-
> If you enabled Microsoft Authenticator passwordless sign-in using Azure AD PowerShell, it was enabled for your entire directory. If you enable using this new method, it supersedes the PowerShell policy. We recommend you enable for all users in your tenant via the new **Authentication Methods** menu, otherwise users who aren't in the new policy can't sign in without a password.
64+
> If you enabled Microsoft Authenticator passwordless sign-in using PowerShell, it was enabled for your entire directory. If you enable using this new method, it supersedes the PowerShell policy. We recommend you enable for all users in your tenant via the new **Authentication Methods** menu, otherwise users who aren't in the new policy can't sign in without a password.
6565
6666
To enable the authentication method for passwordless phone sign-in, complete the following steps:
6767

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -193,6 +193,7 @@ HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\Credential Provide
193193

194194
- To enable verbose logging, create a `REG_DWORD: "EnableLogging"`, and set it to 1.
195195
- To disable verbose logging, change the `REG_DWORD: "EnableLogging"` to 0.
196+
- Review the debug logging in the Application event log under source AADPasswordResetCredentialProvider.
196197

197198
## What do users see
198199

articles/active-directory/authentication/troubleshoot-sspr-writeback.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: troubleshooting
9-
ms.date: 01/29/2023
9+
ms.date: 10/05/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -73,7 +73,7 @@ To resolve connectivity issues or other transient problems with the service, com
7373

7474
1. As an administrator on the server that runs Microsoft Entra Connect, select **Start**.
7575
1. Enter *services.msc* in the search field and select **Enter**.
76-
1. Look for the *Microsoft Entra ID Sync* entry.
76+
1. Look for the *Azure AD Sync* entry.
7777
1. Right-click the service entry, select **Restart**, and wait for the operation to finish.
7878

7979
:::image type="content" source="./media/troubleshoot-sspr-writeback/service-restart.png" alt-text="Restart the Azure AD Sync service using the GUI" border="false":::

articles/active-directory/develop/apple-sso-plugin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Use the following information to enable the SSO plug-in by using MDM.
6161

6262
If you use Microsoft Intune as your MDM service, you can use built-in configuration profile settings to enable the Microsoft Enterprise SSO plug-in:
6363

64-
1. Configure the [SSO app extension](/mem/intune/configuration/device-features-configure#single-sign-on-app-extension) settings of a configuration profile.
64+
1. Configure the [SSO app plug-in](/mem/intune/configuration/use-enterprise-sso-plug-in-ios-ipados-with-intune) settings of a configuration profile.
6565
1. If the profile isn't already assigned, [assign the profile to a user or device group](/mem/intune/configuration/device-profile-assign).
6666

6767
The profile settings that enable the SSO plug-in are automatically applied to the group's devices the next time each device checks in with Intune.

articles/ai-services/speech-service/includes/quickstarts/stt-diarization/cpp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,12 +66,12 @@ Follow these steps to create a new console application and install the Speech SD
6666
std::promise<void> recognitionEnd;
6767
6868
// Subscribes to events.
69-
conversationTranscriber->Transcribing.Connect([](const SpeechRecognitionEventArgs& e)
69+
conversationTranscriber->Transcribing.Connect([](const ConversationTranscriptionEventArgs& e)
7070
{
7171
std::cout << "TRANSCRIBING:" << e.Result->Text << std::endl;
7272
});
7373
74-
conversationTranscriber->Transcribed.Connect([](const SpeechRecognitionEventArgs& e)
74+
conversationTranscriber->Transcribed.Connect([](const ConversationTranscriptionEventArgs& e)
7575
{
7676
if (e.Result->Reason == ResultReason::RecognizedSpeech)
7777
{
@@ -84,7 +84,7 @@ Follow these steps to create a new console application and install the Speech SD
8484
}
8585
});
8686
87-
conversationTranscriber->Canceled.Connect([&recognitionEnd](const SpeechRecognitionCanceledEventArgs& e)
87+
conversationTranscriber->Canceled.Connect([&recognitionEnd](const ConversationTranscriptionCanceledEventArgs& e)
8888
{
8989
auto cancellation = CancellationDetails::FromResult(e.Result);
9090
std::cout << "CANCELED: Reason=" << (int)cancellation->Reason << std::endl;

0 commit comments

Comments
 (0)