Skip to content

Commit 3413789

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into data-platform
2 parents c36a311 + 9a47539 commit 3413789

File tree

307 files changed

+5391
-2189
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

307 files changed

+5391
-2189
lines changed

articles/active-directory-b2c/configure-authentication-in-azure-web-app-file-based.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App configuration file by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](/azure/app-service/configure-authentication-file-based) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [File-based configuration in Azure App Service authentication](../app-service/configure-authentication-file-based.md) article.
1919

2020
## Overview
2121

@@ -141,6 +141,5 @@ From your server code, the provider-specific tokens are injected into the reques
141141

142142
## Next steps
143143

144-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
145-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
146-
144+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
145+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory-b2c/configure-authentication-in-azure-web-app.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: "b2c-support"
1515

1616
# Configure authentication in an Azure Web App by using Azure AD B2C
1717

18-
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](/azure/app-service/configure-authentication-provider-openid-connect) article.
18+
This article explains how to add Azure Active Directory B2C (Azure AD B2C) authentication functionality to an Azure Web App. For more information, check out the [configure your App Service or Azure Functions app to login using an OpenID Connect provider](../app-service/configure-authentication-provider-openid-connect.md) article.
1919

2020
## Overview
2121

@@ -94,7 +94,7 @@ To register your application, follow these steps:
9494
1. For the **Client Secret** provide the Web App (client) secret from [step 2.2](#step-22-create-a-client-secret).
9595
9696
> [!TIP]
97-
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](/azure/app-service/app-service-key-vault-references) if you wish to manage the secret in Azure Key Vault.
97+
> Your client secret will be stored as an app setting to ensure secrets are stored in a secure fashion. You can update that setting later to use [Key Vault references](../app-service/app-service-key-vault-references.md) if you wish to manage the secret in Azure Key Vault.
9898
9999
1. Keep the rest of the settings with the default values.
100100
1. Press the **Add** button to finish setting up the identity provider.
@@ -119,6 +119,5 @@ From your server code, the provider-specific tokens are injected into the reques
119119
120120
## Next steps
121121
122-
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](/azure/app-service/configure-authentication-user-identities).
123-
* Lear how to [Work with OAuth tokens in Azure App Service authentication](/azure/app-service/configure-authentication-oauth-tokens).
124-
122+
* After successful authentication, you can show display name on the navigation bar. To view the claims that the Azure AD B2C token returns to your app, check out the [Work with user identities in Azure App Service authentication](../app-service/configure-authentication-user-identities.md).
123+
* Learn how to [Work with OAuth tokens in Azure App Service authentication](../app-service/configure-authentication-oauth-tokens.md).

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 11 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 07/14/2022
10+
ms.date: 07/15/2022
1111

1212

1313
ms.author: justinha
@@ -24,38 +24,21 @@ Microsoft Authenticator can be used to sign in to any Azure AD account without u
2424

2525
This authentication technology can be used on any device platform, including mobile. This technology can also be used with any app or website that integrates with Microsoft Authentication Libraries.
2626

27-
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app-next.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
27+
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
2828

2929
People who enabled phone sign-in from Microsoft Authenticator see a message that asks them to tap a number in their app. No username or password is asked for. To complete the sign-in process in the app, a user must next take the following actions:
3030

3131
1. Enter the number they see on the login screen into Microsoft Authenticator dialog.
3232
1. Choose **Approve**.
3333
1. Provide their PIN or biometric.
3434

35-
## Multiple accounts on iOS (preview)
36-
37-
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
38-
39-
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
40-
41-
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-in from one device.
42-
43-
>[!NOTE]
44-
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45-
4635
## Prerequisites
4736

4837
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
4938

5039
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
5140
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 6.0 or greater.
52-
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
53-
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
54-
55-
- [email protected] and bsandhu@wingtiptoys
56-
- For iOS, the option in Microsoft Authenticator to allow Microsoft to gather usage data must be enabled. It's not enabled by default. To enable it in Microsoft Authenticator, go to **Settings** > **Usage Data**.
57-
58-
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/telemetry.png" alt-text="Screenshot os Usage Data in Microsoft Authenticator.":::
41+
- The device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
5942

6043
To use passwordless authentication in Azure AD, first enable the combined registration experience, then enable users for the passwordless method.
6144

@@ -145,6 +128,14 @@ An end user can be enabled for multifactor authentication (MFA) through an on-pr
145128

146129
If the user attempts to upgrade multiple installations (5+) of Microsoft Authenticator with the passwordless phone sign-in credential, this change might result in an error.
147130

131+
### Device registration
132+
133+
Before you can create this new strong credential, there are prerequisites. One prerequisite is that the device on which Microsoft Authenticator is installed must be registered within the Azure AD tenant to an individual user.
134+
135+
Currently, a device can only be enabled for passwordless sign-in in a single tenant. This limit means that only one work or school account in Microsoft Authenticator can be enabled for phone sign-in.
136+
137+
> [!NOTE]
138+
> Device registration is not the same as device management or mobile device management (MDM). Device registration only associates a device ID and a user ID together, in the Azure AD directory.
148139
149140
## Next steps
150141

articles/active-directory/cloud-infrastructure-entitlement-management/faqs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ For information about permissions usage reports, see [Generate and download the
107107

108108
## Does Permissions Management integrate with third-party ITSM (Information Technology Service Management) tools?
109109

110-
Permissions Management integrates with ServiceNow.
110+
Integration with ITMS tools, such as ServiceNow, is in the future roadmap.
111111

112112
## How is Permissions Management being deployed?
113113

@@ -169,10 +169,10 @@ Where xx-XX is one of the following available language parameters: 'cs-CZ', 'de-
169169
- [Permissions Management web page](https://microsoft.com/security/business/identity-access-management/permissions-management)
170170
- For more information about Microsoft's privacy and security terms, see [Commercial Licensing Terms](https://www.microsoft.com/licensing/terms/product/ForallOnlineServices/all).
171171
- For more information about Microsoft's data processing and security terms when you subscribe to a product, see [Microsoft Products and Services Data Protection Addendum (DPA)](https://www.microsoft.com/licensing/docs/view/Microsoft-Products-and-Services-Data-Protection-Addendum-DPA).
172-
- For more information about Microsoft’s policy and practices for Data Subject Requests for GDPR and CCPA: [https://docs.microsoft.com/en-us/compliance/regulatory/gdpr-dsr-azure](https://docs.microsoft.com/compliance/regulatory/gdpr-dsr-azure).
172+
- For more information about Microsoft’s policy and practices for Data Subject Requests for GDPR and CCPA: [https://docs.microsoft.com/en-us/compliance/regulatory/gdpr-dsr-azure](/compliance/regulatory/gdpr-dsr-azure).
173173

174174

175175
## Next steps
176176

177177
- For an overview of Permissions Management, see [What's Permissions Management?](overview.md).
178-
- For information on how to onboard Permissions Management in your organization, see [Enable Permissions Management in your organization](onboard-enable-tenant.md).
178+
- For information on how to onboard Permissions Management in your organization, see [Enable Permissions Management in your organization](onboard-enable-tenant.md).

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,12 @@ To enable Permissions Management in your organization:
2727

2828
> [!NOTE]
2929
> During public preview, Permissions Management doesn't perform a license check.
30+
> The public preview environment will only be available until October 7th, 2022. You will be no longer be able view or access your configuration and data in the public preview environment after that date.
31+
> Once you complete all the steps and confirm to use Microsoft Entra Permissions Management, access to the public preview environment will be lost. You can take a note of your configuration before you start.
32+
> To start using generally available Microsoft Entra Permissions Management, you must purchase a license or begin a trial. From the public preview console, initiate the workflow by selecting Start.
33+
34+
35+
3036

3137
## How to enable Permissions Management on your Azure AD tenant
3238

articles/active-directory/enterprise-users/clean-up-unmanaged-azure-ad-accounts.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Azure Active Directory (Azure AD) supports self-service sign-up for
2020
email-verified users. Users can create Azure AD accounts if they can
2121
verify email ownership. To learn more, see, [What is self-service
2222
sign-up for Azure Active
23-
Directory?](https://docs.microsoft.com/azure/active-directory/enterprise-users/directory-self-service-signup)
23+
Directory?](./directory-self-service-signup.md)
2424

2525
However, if a user creates an account, and the domain isn't verified in
2626
an Azure AD tenant, the user is created in an unmanaged, or viral
@@ -34,7 +34,7 @@ You can remove unmanaged Azure AD accounts from your Azure AD tenants
3434
and prevent these types of accounts from redeeming future invitations.
3535

3636
1. Enable [email one-time
37-
passcode](https://docs.microsoft.com/azure/active-directory/external-identities/one-time-passcode#enable-email-one-time-passcode)
37+
passcode](../external-identities/one-time-passcode.md#enable-email-one-time-passcode)
3838
(OTP).
3939

4040
2. Use the sample application in [Azure-samples/Remove-unmanaged-guests](https://github.com/Azure-Samples/Remove-Unmanaged-Guests) or
@@ -43,13 +43,13 @@ and prevent these types of accounts from redeeming future invitations.
4343
PowerShell module to identify viral users in an Azure AD tenant and
4444
reset user redemption status.
4545

46-
Once the above steps are complete, when users with unmanaged Azure AD accounts try to access your tenant, they'll re-redeem their invitations. However, because Email OTP is enabled, Azure AD will prevent users from redeeming with an existing unmanaged Azure AD account and they’ll redeem with another account type. Google Federation and SAML/WS-Fed aren't enabled by default. So by default, these users will redeem with either an MSA or Email OTP, with MSA taking precedence. For a full explanation on the B2B redemption precedence, refer to the [redemption precedence flow chart](https://docs.microsoft.com/azure/active-directory/external-identities/redemption-experience#invitation-redemption-flow).
46+
Once the above steps are complete, when users with unmanaged Azure AD accounts try to access your tenant, they'll re-redeem their invitations. However, because Email OTP is enabled, Azure AD will prevent users from redeeming with an existing unmanaged Azure AD account and they’ll redeem with another account type. Google Federation and SAML/WS-Fed aren't enabled by default. So by default, these users will redeem with either an MSA or Email OTP, with MSA taking precedence. For a full explanation on the B2B redemption precedence, refer to the [redemption precedence flow chart](../external-identities/redemption-experience.md#invitation-redemption-flow).
4747

4848
## Overtaken tenants and domains
4949

5050
Some tenants created as unmanaged tenants can be taken over and
5151
converted to a managed tenant. See, [take over an unmanaged directory as
52-
administrator in Azure AD](https://docs.microsoft.com/azure/active-directory/enterprise-users/domains-admin-takeover).
52+
administrator in Azure AD](./domains-admin-takeover.md).
5353

5454
In some cases, overtaken domains might not be updated, for example, missing a DNS TXT record and therefore become flagged as unmanaged. Implications are:
5555

@@ -103,4 +103,4 @@ To delete unmanaged Azure AD accounts, run:
103103
## Next steps
104104

105105
Examples of using
106-
[Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser)
106+
[Get-MSIdUnmanagedExternalUser](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MsIdUnmanagedExternalUser)

articles/active-directory/enterprise-users/groups-dynamic-rule-member-of.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,22 +3,22 @@ title: Group membership for Azure AD dynamic groups with memberOf - Azure AD | M
33
description: How to create a dynamic membership group that can contain members of other groups in Azure Active Directory.
44
services: active-directory
55
documentationcenter: ''
6-
author: curtand
7-
manager: karenhoran
6+
author: billmath
7+
manager: billmath
88
ms.service: active-directory
99
ms.subservice: enterprise-users
1010
ms.workload: identity
1111
ms.topic: overview
12-
ms.date: 06/23/2022
13-
ms.author: curtand
12+
ms.date: 07/15/2022
13+
ms.author: billmath
1414
ms.reviewer: krbain
1515
ms.custom: it-pro
1616
ms.collection: M365-identity-device-management
1717
---
1818

1919
# Group membership in a dynamic group (preview) in Azure Active Directory
2020

21-
This feature preview in Azure Active Directory (Azure AD), part of Microsoft Entra, enables admins to create dynamic groups that populate by adding members of other groups using the memberOf attribute. Apps that couldn't read group-based membership previously in Azure AD can now read the entire membership of these new memberOf groups. Not only can these groups be used for apps, they can also be used for licensing assignment and role-based access control. The following diagram illustrates how you could create Dynamic-Group-A with members of Security-Group-X and Security-Group-Y. Members of the groups inside of Security-Group-X and Security-Group-Y don't become members of Dynamic-Group-A.
21+
This feature preview in Azure Active Directory (Azure AD), part of Microsoft Entra, enables admins to create dynamic groups that populate by adding members of other groups using the memberOf attribute. Apps that couldn't read group-based membership previously in Azure AD can now read the entire membership of these new memberOf groups. Not only can these groups be used for apps, they can also be used for licensing assignments. The following diagram illustrates how you could create Dynamic-Group-A with members of Security-Group-X and Security-Group-Y. Members of the groups inside of Security-Group-X and Security-Group-Y don't become members of Dynamic-Group-A.
2222

2323
:::image type="content" source="./media/groups-dynamic-rule-member-of/member-of-diagram.png" alt-text="Diagram showing how the memberOf attribute works.":::
2424

0 commit comments

Comments
 (0)