Skip to content

Commit 32dc562

Browse files
committed
Merge branch 'main' into release-ga-virtual-network-manager
2 parents c2b96a9 + 420a915 commit 32dc562

File tree

159 files changed

+2917
-1024
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

159 files changed

+2917
-1024
lines changed

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,8 @@ When a user signs in, the authentication process checks which authentication met
103103
1. [Telephony](concept-authentication-phone-options.md)<sup>2</sup>
104104

105105
<sup>1</sup> Includes hardware or software TOTP from Microsoft Authenticator, Authenticator Lite, or third-party applications.
106-
<sup>2</sup> Includes SMS and voice calls.
107106

107+
<sup>2</sup> Includes SMS and voice calls.
108108

109109
### How does system-preferred MFA affect AD FS or NPS extension?
110110

@@ -113,6 +113,7 @@ System-preferred MFA doesn't affect users who sign in by using Active Directory
113113
### What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?
114114

115115
The system-preferred MFA also applies for users who are enabled for MFA in the legacy MFA policy.
116+
116117
:::image type="content" border="true" source="./media/how-to-mfa-number-match/legacy-settings.png" alt-text="Screenshot of legacy MFA settings.":::
117118

118119
## Next steps

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 4 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -17,40 +17,15 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable combined security information registration in Azure Active Directory
1919

20-
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Azure AD Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure AD Multi-Factor Authentication and SSPR.
20+
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. Users were confused that similar methods were used for Azure AD Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure AD Multi-Factor Authentication and SSPR.
2121

2222
> [!NOTE]
23-
> Effective Oct. 1st, 2022, we will begin to enable combined registration for all users in Azure AD tenants created before August 15th, 2020. Tenants created after this date are enabled with combined registration.
23+
> Effective Mar. 14th, 2023 combined registration is now the default MFA and SSPR registration experience for all organizations.
2424
25-
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
25+
To help you understand the functionality and effects of the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
2626

2727
![Combined security information registration enhanced experience](media/howto-registration-mfa-sspr-combined/combined-security-info-more-required.png)
2828

29-
## Enable combined registration
30-
31-
To enable combined registration, complete these steps:
32-
33-
1. Sign in to the Azure portal as a user administrator or global administrator.
34-
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature settings**.
35-
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
36-
37-
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)
38-
39-
> [!IMPORTANT]
40-
> If your Azure tenant has already been enabled for combined registration, you might not see the configuration option for **Users can use the combined security information registration experience** or even see it grayed out.
41-
42-
> [!NOTE]
43-
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure AD Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure AD Multi-Factor Authentication and SSPR policies.
44-
>
45-
> If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` are required to perform multi-factor authentication before they can access the page.
46-
47-
If you have configured the *Site to Zone Assignment List* in Internet Explorer, the following sites have to be in the same zone:
48-
49-
* *[https://login.microsoftonline.com](https://login.microsoftonline.com)*
50-
* *[https://Login.windows.net](https://login.windows.net)*
51-
* *[https://mysignins.microsoft.com](https://mysignins.microsoft.com)*
52-
* *[https://account.activedirectory.windowsazure.com](https://account.activedirectory.windowsazure.com)*
53-
5429
## Conditional Access policies for combined registration
5530

5631
To secure when and how users register for Azure AD Multi-Factor Authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Azure AD Multi-Factor Authentication and SSPR from a central location, such as a trusted network location during HR onboarding.
@@ -91,6 +66,6 @@ Complete the following steps to create a policy that applies to all selected use
9166

9267
If you need help, see [troubleshoot combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md) or learn [What is the location condition in Azure AD Conditional Access?](../conditional-access/location-condition.md)
9368

94-
Once users are enabled for combined registration, you can then [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
69+
Review how you can [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md) in your tenant.
9570

9671
If needed, learn how to [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).

articles/active-directory/cloud-sync/tutorial-pilot-aadc-aadccp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following are prerequisites required for completing this tutorial
5757
As a minimum, you should have [Azure AD connect](https://www.microsoft.com/download/details.aspx?id=47594) 1.4.32.0. To update Azure AD Connect sync, complete the steps in [Azure AD Connect: Upgrade to the latest version](../hybrid/how-to-upgrade-previous-version.md).
5858

5959
## Back up your Azure AD Connect configuration
60-
Before making any changes, you should back up your Azure AD Connect configuration. This way, you can role-back. See [Import and export Azure AD Connect configuration settings](../hybrid/how-to-connect-import-export-config.md) for more information.
60+
Before making any changes, you should back up your Azure AD Connect configuration. This way, you can roll back to your previous configuration. See [Import and export Azure AD Connect configuration settings](../hybrid/how-to-connect-import-export-config.md) for more information.
6161

6262
## Stop the scheduler
6363

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@ A Conditional Access policy must include a user, group, or workload identity ass
2121

2222
> [!VIDEO https://www.youtube.com/embed/5DsW1hB3Jqs]
2323
24-
> [!NOTE]
25-
> Some Conditional Access features are currently in public preview and might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
26-
2724
## Include users
2825

2926
This list of users typically includes all of the users an organization is targeting in a Conditional Access policy.
@@ -35,7 +32,7 @@ The following options are available to include when creating a Conditional Acces
3532
- All users
3633
- All users that exist in the directory including B2B guests.
3734
- Select users and groups
38-
- Guest or external users (preview)
35+
- Guest or external users
3936
- This selection provides several choices that can be used to target Conditional Access policies to specific guest or external user types and specific tenants containing those types of users. There are [several different types of guest or external users that can be selected](../external-identities/authentication-conditional-access.md#conditional-access-for-external-users), and multiple selections can be made:
4037
- B2B collaboration guest users
4138
- B2B collaboration member users

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,8 @@ A persistent browser session allows users to remain signed in after closing and
111111

112112
The Azure AD default for browser session persistence allows users on personal devices to choose whether to persist the session by showing a “Stay signed in?” prompt after successful authentication. If browser persistence is configured in AD FS using the guidance in the article [AD FS single sign-on settings](/windows-server/identity/ad-fs/operations/ad-fs-single-sign-on-settings#enable-psso-for-office-365-users-to-access-sharepoint-online), we'll comply with that policy and persist the Azure AD session as well. You can also configure whether users in your tenant see the “Stay signed in?” prompt by changing the appropriate setting in the [company branding pane](../fundamentals/customize-branding.md).
113113

114+
In persistent browsers, cookies stay stored in the user’s device even after a user closes the browser. These cookies could have access to Azure Active Directory artifacts, and those artifacts are useable until token expiry regardless of the Conditional Access policies placed on the resource environment. So, token caching can be in direct violation of desired security policies for authentication. While it may seem convenient to store tokens beyond the current session, doing so can create a security vulnerability by allowing unauthorized access to Azure Active Directory artifacts.
115+
114116
## Configuring authentication session controls
115117

116118
Conditional Access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about Conditional Access, see [What is Conditional Access in Azure Active Directory?](overview.md#license-requirements)
@@ -196,4 +198,4 @@ We factor for five minutes of clock skew, so that we don’t prompt users more o
196198

197199
## Next steps
198200

199-
* If you're ready to configure Conditional Access policies for your environment, see the article [Plan a Conditional Access deployment](plan-conditional-access.md).
201+
* If you're ready to configure Conditional Access policies for your environment, see the article [Plan a Conditional Access deployment](plan-conditional-access.md).

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Create a location based Conditional Access policy that applies to service princi
4747
1. Select **New policy**.
4848
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
4949
1. Under **Assignments**, select **Users or workload identities**.
50-
1. Under **What does this policy apply to?**, select **Workload identities (Preview)**.
50+
1. Under **What does this policy apply to?**, select **Workload identities**.
5151
1. Under **Include**, choose **Select service principals**, and select the appropriate service principals from the list.
5252
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
5353
1. Under **Conditions** > **Locations**, include **Any location** and exclude **Selected locations** where you want to allow access.
@@ -66,10 +66,10 @@ Create a risk-based Conditional Access policy that applies to service principals
6666
1. Select **New policy**.
6767
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
6868
1. Under **Assignments**, select **Users or workload identities**.
69-
1. Under **What does this policy apply to?**, select **Workload identities (Preview)**.
69+
1. Under **What does this policy apply to?**, select **Workload identities**.
7070
1. Under **Include**, choose **Select service principals**, and select the appropriate service principals from the list.
7171
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
72-
1. Under **Conditions** > **Service principal risk (Preview)**
72+
1. Under **Conditions** > **Service principal risk**
7373
1. Set the **Configure** toggle to **Yes**.
7474
1. Select the levels of risk where you want this policy to trigger.
7575
1. Select **Done**.

articles/active-directory/hybrid/tutorial-password-hash-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ Before you install Windows Server AD, run a script that installs prerequisites:
113113
$ipprefix = "24"
114114
$ipgw = "10.0.1.1"
115115
$ipdns = "10.0.1.117"
116-
$ipdns2 = "8.8.8.8"
116+
$ipdns2 = "4.2.2.2"
117117
$ipif = (Get-NetAdapter).ifIndex
118118
$featureLogPath = "c:\poshlog\featurelog.txt"
119119
$newname = "DC1"

articles/active-directory/roles/delegate-app-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ By default in Azure AD, all users can register applications and manage all aspec
4343

4444
### Grant individual permissions to create and consent to applications when the default ability is disabled
4545

46-
Assign the Application Developer role to grant the ability to create application registrations when the **Users can register applications** setting is set to No. This role also grants permission to consent on one's own behalf when the **Users can consent to apps accessing company data on their behalf** setting is set to No.
46+
Assign the [Application Developer role](../roles/permissions-reference.md#application-developer) to grant the ability to create application registrations when the **Users can register applications** setting is set to No. This role also grants permission to consent on one's own behalf when the **Users can consent to apps accessing company data on their behalf** setting is set to No.
4747

4848
## Assign application owners
4949

articles/active-directory/roles/permissions-reference.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -931,7 +931,7 @@ This administrator manages federation between Azure AD organizations and externa
931931
932932
## Global Administrator
933933

934-
Users with this role have access to all administrative features in Azure Active Directory, as well as services that use Azure Active Directory identities like the Microsoft 365 Defender portal, the Microsoft Purview compliance portal, Exchange Online, SharePoint Online, and Skype for Business Online. Furthermore, Global Administrators can [elevate their access](../../role-based-access-control/elevate-access-global-admin.md) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Azure AD Tenant. The person who signs up for the Azure AD organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
934+
Users with this role have access to all administrative features in Azure Active Directory, as well as services that use Azure Active Directory identities like the Microsoft 365 Defender portal, the Microsoft Purview compliance portal, Exchange Online, SharePoint Online, and Skype for Business Online. Global Administrators can view Directory Activity logs. Furthermore, Global Administrators can [elevate their access](../../role-based-access-control/elevate-access-global-admin.md) to manage all Azure subscriptions and management groups. This allows Global Administrators to get full access to all Azure resources using the respective Azure AD Tenant. The person who signs up for the Azure AD organization becomes a Global Administrator. There can be more than one Global Administrator at your company. Global Administrators can reset the password for any user and all other administrators. A Global Administrator cannot remove their own Global Administrator assignment. This is to prevent a situation where an organization has zero Global Administrators.
935935

936936
> [!NOTE]
937937
> As a best practice, Microsoft recommends that you assign the Global Administrator role to fewer than five people in your organization. For more information, see [Best practices for Azure AD roles](best-practices.md).
@@ -1465,7 +1465,7 @@ Users with this role have global permissions to manage settings within Microsoft
14651465
14661466
## Knowledge Administrator
14671467

1468-
Users in this role have full access to all knowledge, learning and intelligent features settings in the Microsoft 365 admin center. They have a general understanding of the suite of products, licensing details and has responsibility to control access. Knowledge Administrator can create and manage content, like topics, acronyms and learning resources. Additionally, these users can create content centers, monitor service health, and create service requests.
1468+
Users in this role have full access to all knowledge, learning and intelligent features settings in the Microsoft 365 admin center. They have a general understanding of the suite of products, licensing details and have responsibility to control access. Knowledge Administrator can create and manage content, like topics, acronyms and learning resources. Additionally, these users can create content centers, monitor service health, and create service requests.
14691469

14701470
> [!div class="mx-tableFixed"]
14711471
> | Actions | Description |
@@ -2403,7 +2403,7 @@ Users with this role **cannot** do the following:
24032403
Users with this role can do the following tasks:
24042404

24052405
- Manage and configure all aspects of Virtual Visits in Bookings in the Microsoft 365 admin center, and in the Teams EHR connector
2406-
- View usage reports for Virtual Visits in the Teams admin center, Microsoft 365 admin center, and PowerBI
2406+
- View usage reports for Virtual Visits in the Teams admin center, Microsoft 365 admin center, and Power BI
24072407
- View features and settings in the Microsoft 365 admin center, but can't edit any settings
24082408

24092409
Virtual Visits are a simple way to schedule and manage online and video appointments for staff and attendees. For example, usage reporting can show how sending SMS text messages before appointments can reduce the number of people who don't show up for appointments.

articles/active-directory/verifiable-credentials/presentation-request-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ Authorization: Bearer <token>
5252
{
5353
    "includeQRCode": true,
5454
"callback": {
55-
      "url": "https://www.contoso.com/api/verifier/presentationCallbac",
55+
      "url": "https://www.contoso.com/api/verifier/presentationCallback",
5656
      "state": "11111111-2222-2222-2222-333333333333",
5757
      "headers": {
5858
        "api-key": "an-api-key-can-go-here"

0 commit comments

Comments
 (0)