Skip to content

Commit 32d1011

Browse files
committed
Merge branch 'main' into release-updatecenterv2-publicpreview
2 parents d46e7b1 + 0bf88ef commit 32d1011

File tree

137 files changed

+2278
-582
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+2278
-582
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -932,6 +932,12 @@
932932
"branch": "v3",
933933
"branch_mapping": {}
934934
},
935+
{
936+
"path_to_root": "azure-cosmos-db-table-dotnet-v12",
937+
"url": "https://github.com/Azure-Samples/cosmos-db-table-api-dotnet-samples",
938+
"branch": "v12",
939+
"branch_mapping": {}
940+
},
935941
{
936942
"path_to_root": "azure-cosmos-mongodb-dotnet",
937943
"url": "https://github.com/Azure-Samples/cosmos-db-mongodb-api-dotnet-samples",
@@ -956,6 +962,7 @@
956962
".openpublishing.redirection.json",
957963
".openpublishing.redirection.azure-arc-data.json",
958964
".openpublishing.redirection.active-directory.json",
965+
".openpublishing.redirection.azure-attestation.json",
959966
".openpublishing.redirection.azure-blob.json",
960967
"articles/data-factory/.openpublishing.redirection.data-factory.json",
961968
".openpublishing.redirection.defender-for-cloud.json",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/attestation/audit-logs.md",
5+
"redirect_url": "/azure/attestation/view-logs",
6+
"redirect_document_id": true
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/virtual-machines/linux/find-unattached-nics.md",
5+
"redirect_url": "/previous-versions/azure/virtual-machines/linux/find-unattached-nics",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/germany/germany-developer-guide.md",
510
"redirect_url": "/previous-versions/azure/germany/germany-developer-guide",

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 06/29/2022
9+
ms.date: 07/06/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -48,7 +48,7 @@ The sign-in frequency setting works with apps that have implemented OAuth2 or OI
4848
- Dynamics CRM Online
4949
- Azure portal
5050

51-
The sign-in frequency setting works with 3rd party SAML applications and apps that have implemented OAuth2 or OIDC protocols, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
51+
The sign-in frequency setting works with third-party SAML applications and apps that have implemented OAuth2 or OIDC protocols, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
5252

5353
### User sign-in frequency and multifactor authentication
5454

@@ -88,6 +88,9 @@ When administrators select **Every time**, it will require full reauthentication
8888
> [!NOTE]
8989
> An early preview version included the option to prompt for Secondary authentication methods only at reauthentication. This option is no longer supported and should not be used.
9090
91+
> [!WARNING]
92+
> Using require reauthentication every time with the sign-in risk grant control set to **No risk** isn’t supported and will result in poor user experience.
93+
9194
## Persistence of browsing sessions
9295

9396
A persistent browser session allows users to remain signed in after closing and reopening their browser window.
@@ -170,7 +173,7 @@ After administrators confirm your settings using [report-only mode](howto-condit
170173

171174
### Validation
172175

173-
Use the What-If tool to simulate a login from the user to the target application and other conditions based on how you configured your policy. The authentication session management controls show up in the result of the tool.
176+
Use the What-If tool to simulate a sign in from the user to the target application and other conditions based on how you configured your policy. The authentication session management controls show up in the result of the tool.
174177

175178
![Conditional Access What If tool results](media/howto-conditional-access-session-lifetime/conditional-access-what-if-tool-result.png)
176179

Loading

articles/active-directory/conditional-access/service-dependencies.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/14/2022
9+
ms.date: 07/06/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -57,7 +57,7 @@ The below table lists some more service dependencies, where the client apps must
5757
| | SharePoint | Late-bound |
5858
| Outlook groups | Exchange | Early-bound |
5959
| | SharePoint | Early-bound |
60-
| Power Apps | Microsoft Azure Management (portal and API) | Early-bound |
60+
| Power Apps | Microsoft Azure Management (portal and API) | Early-bound |
6161
| | Windows Azure Active Directory | Early-bound |
6262
| | SharePoint | Early-bound |
6363
| | Exchange | Early-bound |
@@ -68,6 +68,10 @@ The below table lists some more service dependencies, where the client apps must
6868
| | SharePoint | Early-bound |
6969
| Microsoft To-Do | Exchange | Early-bound |
7070

71+
## Troubleshooting service dependencies
72+
73+
The Azure Active Directory sign-ins log is a valuable source of information when troubleshooting why and how a Conditional Access policy applied in your environment. For more information about troubleshooting unexpected sign-in outcomes related to Conditional Access, see the article [Troubleshooting sign-in problems with Conditional Access](troubleshoot-conditional-access.md#service-dependencies).
74+
7175
## Next steps
7276

7377
To learn how to implement Conditional Access in your environment, see [Plan your Conditional Access deployment in Azure Active Directory](plan-conditional-access.md).

articles/active-directory/conditional-access/troubleshoot-conditional-access.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: troubleshooting
9-
ms.date: 03/15/2022
9+
ms.date: 07/06/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -72,15 +72,15 @@ To find out which Conditional Access policy or policies applied and why do the f
7272

7373
### Policy details
7474

75-
Selecting the ellipsis on the right side of the policy in a sign-in event brings up policy details. This gives administrators additional information about why a policy was successfully applied or not.
75+
Selecting the ellipsis on the right side of the policy in a sign-in event brings up policy details. This option gives administrators additional information about why a policy was successfully applied or not.
7676

7777
![Sign in event Conditional Access tab](./media/troubleshoot-conditional-access/image5.png)
7878

7979
![Policy details (preview)](./media/troubleshoot-conditional-access/policy-details.png)
8080

8181
The left side provides details collected at sign-in and the right side provides details of whether those details satisfy the requirements of the applied Conditional Access policies. Conditional Access policies only apply when all conditions are satisfied or not configured.
8282

83-
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get desired results, the sign-in diagnostic tool can be used. The sign-in diagnostic can be found under **Basic info** > **Troubleshoot Event**. For more information about the sign-in diagnostic, see the article [What is the sign-in diagnostic in Azure AD](../reports-monitoring/overview-sign-in-diagnostics.md).
83+
If the information in the event isn't enough to understand the sign-in results, or adjust the policy to get desired results, the sign-in diagnostic tool can be used. The sign-in diagnostic can be found under **Basic info** > **Troubleshoot Event**. For more information about the sign-in diagnostic, see the article [What is the sign-in diagnostic in Azure AD](../reports-monitoring/overview-sign-in-diagnostics.md).
8484

8585
If you need to submit a support incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information will allow Microsoft support to find the specific event you're concerned about.
8686

@@ -94,6 +94,14 @@ If you need to submit a support incident, provide the request ID and time and da
9494
| 53003 | BlockedByConditionalAccess |
9595
| 53004 | ProofUpBlockedDueToRisk |
9696

97+
## Service dependencies
98+
99+
In some specific scenarios, users are blocked because there are cloud apps with dependencies on resources that are blocked by Conditional Access policy.
100+
101+
To determine the service dependency, check the sign-ins log for the Application and Resource called by the sign-in. In the following screenshot, the application called is **Azure Portal** but the resource called is **Windows Azure Service Management API**. To target this scenario appropriately all the applications and resources should be similarly combined in Conditional Access policy.
102+
103+
:::image type="content" source="media/troubleshoot-conditional-access/service-dependency-example-sign-in.png" alt-text="Screenshot that shows an example sign-in log showing an Application calling a Resource. This scenario is also known as a service dependency." lightbox="media/troubleshoot-conditional-access/service-dependency-example-sign-in.png":::
104+
97105
## What to do if you're locked out of the Azure portal?
98106

99107
If you're locked out of the Azure portal due to an incorrect setting in a Conditional Access policy:

articles/active-directory/develop/active-directory-certificate-credentials.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To compute the assertion, you can use one of the many JWT libraries in the langu
3333
| --- | --- |
3434
| `alg` | Should be **RS256** |
3535
| `typ` | Should be **JWT** |
36-
| `x5t` | Base64url-encoded SHA-1 thumbprint of the X.509 certificate thumbprint. For example, given an X.509 certificate hash of `84E05C1D98BCE3A5421D225B140B36E86A3D5534` (Hex), the `x5t` claim would be `hOBcHZi846VCHSJbFAs26Go9VTQ=` (Base64url). |
36+
| `x5t` | Base64-encoded SHA-1 thumbprint of the X.509 certificate thumbprint. For example, given an X.509 certificate hash of `84E05C1D98BCE3A5421D225B140B36E86A3D5534` (Hex), the `x5t` claim would be `hOBcHZi846VCHSJbFAs26Go9VTQ=` (Base64). |
3737

3838
### Claims (payload)
3939

articles/active-directory/develop/reference-aadsts-error-codes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,7 @@ The `error` field has several possible values - review the protocol documentatio
9494
| AADSTS50001 | InvalidResource - The resource is disabled or doesn't exist. Check your app's code to ensure that you have specified the exact resource URL for the resource you're trying to access. |
9595
| AADSTS50002 | NotAllowedTenant - Sign-in failed because of a restricted proxy access on the tenant. If it's your own tenant policy, you can change your restricted tenant settings to fix this issue. |
9696
| AADSTS500021 | Access to '{tenant}' tenant is denied. AADSTS500021 indicates that the tenant restriction feature is configured and that the user is trying to access a tenant that isn't in the list of allowed tenants specified in the header `Restrict-Access-To-Tenant`. For more information, see [Use tenant restrictions to manage access to SaaS cloud applications](../manage-apps/tenant-restrictions.md).|
97+
| AADSTS500022 | Access to '{tenant}' tenant is denied. AADSTS500022 indicates that the tenant restriction feature is configured and that the user is trying to access a tenant that isn't in the list of allowed tenants specified in the header `Restrict-Access-To-Tenant`. For more information, see [Use tenant restrictions to manage access to SaaS cloud applications](../manage-apps/tenant-restrictions.md).|
9798
| AADSTS50003 | MissingSigningKey - Sign-in failed because of a missing signing key or certificate. This might be because there was no signing key configured in the app. To learn more, see the troubleshooting article for error [AADSTS50003](/troubleshoot/azure/active-directory/error-code-aadsts50003-cert-or-key-not-configured). If you still see issues, contact the app owner or an app admin. |
9899
| AADSTS50005 | DevicePolicyError - User tried to log in to a device from a platform that's currently not supported through Conditional Access policy. |
99100
| AADSTS50006 | InvalidSignature - Signature verification failed because of an invalid signature. |
161 KB
Loading

0 commit comments

Comments
 (0)