Skip to content

Commit 32d3013

Browse files
committed
Updated 2301 release notes with 'Issues fixed' and 'Known issues' sections_2
2 parents 028db54 + f801a02 commit 32d3013

File tree

175 files changed

+2477
-5357
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+2477
-5357
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3867,6 +3867,21 @@
38673867
"redirect_url": "/azure/azure-monitor/alerts/alerts-metric-create-templates",
38683868
"redirect_document_id": false
38693869
},
3870+
{
3871+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-metric-create-templates.md",
3872+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
3873+
"redirect_document_id": false
3874+
},
3875+
{
3876+
"source_path_from_root": "/articles/azure-monitor/alerts/action-groups-create-resource-manager-template.md",
3877+
"redirect_url": "/azure/azure-monitor/alerts/action-groups",
3878+
"redirect_document_id": false
3879+
},
3880+
{
3881+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-log-create-templates.md",
3882+
"redirect_url": "/azure/azure-monitor/alerts/alerts-create-new-alert-rule",
3883+
"redirect_document_id": false
3884+
},
38703885
{
38713886
"source_path_from_root": "/articles/azure-monitor/platform/alerts-metric-logs.md",
38723887
"redirect_url": "/azure/azure-monitor/alerts/alerts-metric-logs",

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ This article discusses known issues to be aware of when you work with app provis
4141

4242
An external user from the source (home) tenant can't be provisioned into another tenant. Internal guest users from the source tenant can't be provisioned into another tenant. Only internal member users from the source tenant can be provisioned into the target tenant. For more information, see [Properties of an Azure Active Directory B2B collaboration user](../external-identities/user-properties.md).
4343

44+
In addition, users that are enabled for SMS sign-in cannot be synchronized through cross-tenant synchronization.
45+
4446
### Provisioning manager attributes
4547

4648
Provisioning manager attributes isn't supported.

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ The following process is used when a user signs in with a FIDO2 security key:
107107

108108
### FIDO2 security key providers
109109

110-
The following providers offer FIDO2 security keys of different form factors that are known to be compatible with the passwordless experience. We encourage you to evaluate the security properties of these keys by contacting the vendor as well as FIDO Alliance.
110+
The following providers offer FIDO2 security keys of different form factors that are known to be compatible with the passwordless experience. We encourage you to evaluate the security properties of these keys by contacting the vendor as well as the [FIDO Alliance](https://fidoalliance.org/).
111111

112112
| Provider | Biometric | USB | NFC | BLE | FIPS Certified | Contact |
113113
|---------------------------|:-----------------:|:---:|:---:|:---:|:--------------:|-----------------------------------------------------------------------------------------------------|

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 58 additions & 25 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ There are some optional settings on the **Configure** tab to help manage how sec
6161
![Screenshot of FIDO2 security key options](media/howto-authentication-passwordless-security-key/optional-settings.png)
6262

6363
- **Allow self-service set up** should remain set to **Yes**. If set to no, your users won't be able to register a FIDO key through the MySecurityInfo portal, even if enabled by Authentication Methods policy.
64-
- **Enforce attestation** setting to **Yes** requires the FIDO security key metadata to be published and verified with the FIDO Alliance Metadata Service, and also pass Microsoft’s additional set of validation testing. For more information, see [What is a Microsoft-compatible security key?](/windows/security/identity-protection/hello-for-business/microsoft-compatible-security-key)
64+
- **Enforce attestation** setting to **Yes** requires the FIDO security key metadata to be published and verified with the FIDO Alliance Metadata Service, and also pass Microsoft’s additional set of validation testing. For more information, see [What is a Microsoft-compatible security key?](concept-authentication-passwordless.md#fido2-security-key-providers)
6565

6666
**Key Restriction Policy**
6767

articles/active-directory/authentication/howto-sspr-customization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 02/01/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -58,7 +58,7 @@ If your organization doesn't want to notify administrators about password reset
5858

5959
## Customize the sign-in page and access panel
6060

61-
You can customize the sign-in page, such as to add a logo that appears along with the image that fits your company branding. For more information on how to configure company branding, see [Add company branding to your sign-in page in Azure AD](../fundamentals/customize-branding.md).
61+
You can customize the sign-in page, such as to add a logo that appears along with the image that fits your company branding. For more information on how to configure company branding, see [Add company branding to your sign-in page in Azure AD](../fundamentals/how-to-customize-branding.md).
6262

6363
The graphics you choose are shown in the following circumstances:
6464

10.3 KB
Loading

articles/active-directory/cloud-sync/how-to-install.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,8 +86,7 @@ For reference, your code should look like the following snippet:
8686
</configuration>
8787
```
8888

89-
For more information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://blogs.technet.microsoft.com/enterprisemobility/2014/06/28/aad-password-sync-encryption-and-fips-compliance/).
90-
89+
For information about security and FIPS, see [Azure AD password hash sync, encryption, and FIPS compliance](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/aad-password-sync-encryption-and-fips-compliance/ba-p/243709).
9190

9291
## Next steps
9392

articles/active-directory/develop/v2-protocols-oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ The following table describes error codes that can be returned in the `error` pa
207207

208208
Receiving an ID token in your app might not always be sufficient to fully authenticate the user. You might also need to validate the ID token's signature and verify its claims per your app's requirements. Like all OpenID providers, the Microsoft identity platform's ID tokens are [JSON Web Tokens (JWTs)](https://tools.ietf.org/html/rfc7519) signed by using public key cryptography.
209209

210-
Web apps and web APIs that use ID tokens for authorization must validate them because such applications gate access to data. Other types of application might not benefit from ID token validation, however. Native and single-page apps (SPAs), for example, rarely benefit from ID token validation because any entity with physical access to the device or browser can potentially bypass the validation.
210+
Web apps and web APIs that use ID tokens for authorization must validate them because such applications get access to data. Other types of application might not benefit from ID token validation, however. Native and single-page apps (SPAs), for example, rarely benefit from ID token validation because any entity with physical access to the device or browser can potentially bypass the validation.
211211

212212
Two examples of token validation bypass are:
213213

0 commit comments

Comments
 (0)