Skip to content

Commit 309bece

Browse files
committed
2 parents 97ce776 + 21404b5 commit 309bece

File tree

724 files changed

+15306
-6575
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

724 files changed

+15306
-6575
lines changed

.github/workflows/stale.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ jobs:
2323
# start-date: '2021-03-19'
2424
stale-pr-message: >
2525
This pull request has been inactive for at least 14 days.
26-
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation?branch=main) for instructions.
26+
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.learn.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation?branch=main) for instructions.
2727
28-
[Get Help](https://review.docs.microsoft.com/help/contribute/help-options?branch=main)
28+
[Get Help](https://review.learn.microsoft.com/help/contribute/help-options?branch=main)
2929
3030
[Docs Support Teams Channel](https://teams.microsoft.com/l/channel/19%3a7ecffca1166a4a3986fed528cf0870ee%40thread.skype/General?groupId=de9ddba4-2574-4830-87ed-41668c07a1ca&tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47)
3131
32-
[Resolve Merge Conflict](https://review.docs.microsoft.com/help/contribute/resolve-merge-conflicts?branch=main)
32+
[Resolve Merge Conflict](https://review.learn.microsoft.com/help/contribute/resolve-merge-conflicts?branch=main)
3333

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -458,6 +458,12 @@
458458
"branch": "main",
459459
"branch_mapping": {}
460460
},
461+
{
462+
"path_to_root": "azureml-examples-v2samplesreorg",
463+
"url": "https://github.com/azure/azureml-examples",
464+
"branch": "v2samplesreorg",
465+
"branch_mapping": {}
466+
},
461467
{
462468
"path_to_root": "azureml-examples-sdk-preview",
463469
"url": "https://github.com/azure/azureml-examples",

.openpublishing.redirection.active-directory.json

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4178,12 +4178,12 @@
41784178
},
41794179
{
41804180
"source_path_from_root": "/articles/active-directory/active-directory-troubleshooting-support-howto.md",
4181-
"redirect_url": "/azure/active-directory/fundamentals/active-directory-troubleshooting-support-howto",
4181+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
41824182
"redirect_document_id": false
41834183
},
41844184
{
41854185
"source_path_from_root": "/articles/active-directory/b2b/get-support.md",
4186-
"redirect_url": "/azure/active-directory/fundamentals/active-directory-troubleshooting-support-howto",
4186+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
41874187
"redirect_document_id": false
41884188
},
41894189
{
@@ -10885,7 +10885,16 @@
1088510885
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/product-integrations.md",
1088610886
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management",
1088710887
"redirect_document_id": false
10888+
},
10889+
{
10890+
"source_path_from_root": "/articles/active-directory/fundamentals/active-directory-troubleshooting-support-howto.md",
10891+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
10892+
"redirect_document_id": false
10893+
},
10894+
{
10895+
"source_path_from_root": "/articles/active-directory/fundamentals/support-help-options.md",
10896+
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
10897+
"redirect_document_id": false
1088810898
}
10889-
1089010899
]
1089110900
}

.openpublishing.redirection.json

Lines changed: 5 additions & 610 deletions
Large diffs are not rendered by default.
75.4 KB
Loading

articles/active-directory-domain-services/network-considerations.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 06/20/2022
12+
ms.date: 09/21/2022
1313
ms.author: justinha
1414

1515
---
@@ -108,14 +108,21 @@ The following sections cover network security groups and Inbound and Outbound po
108108

109109
### Inbound connectivity
110110

111-
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
111+
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet for your managed domain.
112112

113113
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
114114
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
115115
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
116116
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
117117

118-
An Azure standard load balancer is created that requires these rules to be place. This network security group secures Azure AD DS and is required for the managed domain to work correctly. Don't delete this network security group. The load balancer won't work correctly without it.
118+
Azure AD DS also relies on the Default Security rules AllowVnetInBound and AllowAzureLoadBalancerInBound.
119+
120+
:::image type="content" border="true" source="./media/network-considerations/nsg.png" alt-text="Screenshot of network security group rules.":::
121+
122+
The AllowVnetInBound rule allows all traffic within the VNet which allows the DCs to properly communicate and replicate as well as allow domain join and other domain services to domain members. For more information about required ports for Windows, see [Service overview and network port requirements for Windows](/troubleshoot/windows-server/networking/service-overview-and-network-port-requirements).
123+
124+
125+
The AllowAzureLoadBalancerInBound rule is also required so that the service can properly communicate over the loadbalancer to manage the DCs. This network security group secures Azure AD DS and is required for the managed domain to work correctly. Don't delete this network security group. The load balancer won't work correctly without it.
119126

120127
If needed, you can [create the required network security group and rules using Azure PowerShell](powershell-create-instance.md#create-a-network-security-group).
121128

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Extending this scenario:
216216

217217
### Mapping employment status to account status
218218

219-
By default, the Azure AD SuccessFactors connector uses the `activeEmploymentsCount` field of the `PersonEmpTerminationInfo` object to set account status. There is a known SAP SuccessFactors issue documented in [knowledge base article 3047486](https://userapps.support.sap.com/sap/support/knowledge/en/3047486) that at times this may disable the account of a terminated worker one day prior to the termination on the last day of work.
219+
By default, the Azure AD SuccessFactors connector uses the `activeEmploymentsCount` field of the `PersonEmpTerminationInfo` object to set account status. There is a known SAP SuccessFactors issue documented in [knowledge base article 3047486](https://launchpad.support.sap.com/#/notes/3047486) that at times this may disable the account of a terminated worker one day prior to the termination on the last day of work.
220220

221221
If you are running into this issue or prefer mapping employment status to account status, you can update the mapping to expand the `emplStatus` field and use the employment status code present in the field `emplStatus.externalCode`. Based on [SAP support note 2505526](https://launchpad.support.sap.com/#/notes/2505526), here is a list of employment status codes that you can retrieve in the provisioning app.
222222
* A = Active

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ Now that you've prepared your environment and installed a connector, you're read
214214
| **Name** | The name of the application that will appear on My Apps and in the Azure portal. |
215215
| **Internal URL** | The URL for accessing the application from inside your private network. You can provide a specific path on the backend server to publish, while the rest of the server is unpublished. In this way, you can publish different sites on the same server as different apps, and give each one its own name and access rules.<br><br>If you publish a path, make sure that it includes all the necessary images, scripts, and style sheets for your application. For example, if your app is at `https://yourapp/app` and uses images located at `https://yourapp/media`, then you should publish `https://yourapp/` as the path. This internal URL doesn't have to be the landing page your users see. For more information, see [Set a custom home page for published apps](application-proxy-configure-custom-home-page.md). |
216216
| **External URL** | The address for users to access the app from outside your network. If you don't want to use the default Application Proxy domain, read about [custom domains in Azure AD Application Proxy](./application-proxy-configure-custom-domain.md). |
217-
| **Pre Authentication** | How Application Proxy verifies users before giving them access to your application.<br><br>**Azure Active Directory** - Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default so that you can take advantage of Azure AD security features like Conditional Access and Multi-Factor Authentication. **Azure Active Directory** is required for monitoring the application with Microsoft Cloud Application Security.<br><br>**Passthrough** - Users don't have to authenticate against Azure AD to access the application. You can still set up authentication requirements on the backend. |
217+
| **Pre Authentication** | How Application Proxy verifies users before giving them access to your application.<br><br>**Azure Active Directory** - Application Proxy redirects users to sign in with Azure AD, which authenticates their permissions for the directory and application. We recommend keeping this option as the default so that you can take advantage of Azure AD security features like Conditional Access and Multi-Factor Authentication. **Azure Active Directory** is required for monitoring the application with Microsoft Defender for Cloud Apps.<br><br>**Passthrough** - Users don't have to authenticate against Azure AD to access the application. You can still set up authentication requirements on the backend. |
218218
| **Connector Group** | Connectors process the remote access to your application, and connector groups help you organize connectors and apps by region, network, or purpose. If you don't have any connector groups created yet, your app is assigned to **Default**.<br><br>If your application uses WebSockets to connect, all connectors in the group must be version 1.5.612.0 or later. |
219219
220220
6. If necessary, configure **Additional settings**. For most applications, you should keep these settings in their default states.

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use additional context in Microsoft Authenticator notifications - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 09/15/2022
7+
ms.date: 09/22/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in Microsoft Authenticator notifications - Authentication methods policy
14+
# How to use additional context in Microsoft Authenticator notifications (Preview) - Authentication methods policy
1515

1616
This topic covers how to improve the security of user sign-in by adding the application name and geographic location of the sign-in to Microsoft Authenticator passwordless and push notifications.
1717

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use number matching in multifactor authentication (MFA) notifications - Azure Active Directory
2+
title: Use number matching in multifactor authentication (MFA) notifications (Preview) - Azure Active Directory
33
description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 09/15/2022
7+
ms.date: 09/22/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use number matching in multifactor authentication (MFA) notifications - Authentication methods policy
14+
# How to use number matching in multifactor authentication (MFA) notifications (Preview) - Authentication methods policy
1515

1616
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
1717

0 commit comments

Comments
 (0)