Skip to content

Commit 34e2daa

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into prevalidate
2 parents 855050c + 5b83974 commit 34e2daa

File tree

629 files changed

+15015
-4333
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

629 files changed

+15015
-4333
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -287,19 +287,19 @@
287287
{
288288
"path_to_root": "azure-search-javascript-samples",
289289
"url": "https://github.com/Azure-Samples/azure-search-javascript-samples",
290-
"branch": "master",
290+
"branch": "main",
291291
"branch_mapping": {}
292292
},
293293
{
294294
"path_to_root": "azure-search-dotnet-samples",
295295
"url": "https://github.com/Azure-Samples/azure-search-dotnet-samples",
296-
"branch": "master",
296+
"branch": "main",
297297
"branch_mapping": {}
298298
},
299299
{
300300
"path_to_root": "azure-search-python-samples",
301301
"url": "https://github.com/Azure-Samples/azure-search-python-samples",
302-
"branch": "master",
302+
"branch": "main",
303303
"branch_mapping": {}
304304
},
305305
{
@@ -374,12 +374,6 @@
374374
"branch": "master",
375375
"branch_mapping": {}
376376
},
377-
{
378-
"path_to_root": "media-services-v3-dotnet-quickstarts",
379-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-quickstarts",
380-
"branch": "master",
381-
"branch_mapping": {}
382-
},
383377
{
384378
"path_to_root": "media-services-v3-dotnet-tutorials",
385379
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-tutorials",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34262,6 +34262,11 @@
3426234262
"source_path_from_root": "/articles/virtual-machines/linux/copy-files-to-linux-vm-using-scp.md",
3426334263
"redirect_url": "/azure/virtual-machines/copy-files-to-vm-using-scp",
3426434264
"redirect_document_id": false
34265+
},
34266+
{
34267+
"source_path_from_root": "/articles/web-application-firewall/afds/waf-front-door-rate-limit-powershell.md",
34268+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-rate-limit-configure",
34269+
"redirect_document_id": true
3426534270
}
3426634271
]
3426734272
}

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/17/2022
9+
ms.date: 09/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -21,7 +21,7 @@ ms.custom: contperf-fy20q4
2121

2222
Microsoft recommends passwordless authentication methods such as Windows Hello, FIDO2 security keys, and the Microsoft Authenticator app because they provide the most secure sign-in experience. Although a user can sign-in using other common methods such as a username and password, passwords should be replaced with more secure authentication methods.
2323

24-
![Table of the strengths and preferred authentication methods in Azure AD](media/concept-authentication-methods/authentication-methods.png)
24+
:::image type="content" border="true" source="media/concept-authentication-methods/authentication-methods.png" alt-text="Illustration of the strengths and preferred authentication methods in Azure AD." :::
2525

2626
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to an SMS or phone call.
2727

@@ -40,6 +40,7 @@ The following table outlines the security considerations for the available authe
4040
| Windows Hello for Business | High | High | High |
4141
| Microsoft Authenticator app | High | High | High |
4242
| FIDO2 security key | High | High | High |
43+
| Certificate-based authentication (preview)| High | High | High |
4344
| OATH hardware tokens (preview) | Medium | Medium | High |
4445
| OATH software tokens | Medium | Medium | High |
4546
| SMS | Medium | High | Medium |
@@ -65,13 +66,14 @@ The following table outlines when an authentication method can be used during a
6566
| Windows Hello for Business | Yes | MFA\* |
6667
| Microsoft Authenticator app | Yes | MFA and SSPR |
6768
| FIDO2 security key | Yes | MFA |
69+
| Certificate-based authentication (preview) | Yes | No |
6870
| OATH hardware tokens (preview) | No | MFA and SSPR |
6971
| OATH software tokens | No | MFA and SSPR |
7072
| SMS | Yes | MFA and SSPR |
7173
| Voice call | No | MFA and SSPR |
7274
| Password | Yes | |
7375

74-
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work sucessfully.
76+
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work successfully.
7577
7678
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
7779

@@ -80,6 +82,7 @@ To learn more about how each authentication method works, see the following sepa
8082
* [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
8183
* [Microsoft Authenticator app](concept-authentication-authenticator-app.md)
8284
* [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
85+
* [Certificate-based authentication](concept-certificate-based-authentication.md)
8386
* [OATH hardware tokens (preview)](concept-authentication-oath-tokens.md#oath-hardware-tokens-preview)
8487
* [OATH software tokens](concept-authentication-oath-tokens.md#oath-software-tokens)
8588
* [SMS sign-in](howto-authentication-sms-signin.md) and [verification](concept-authentication-phone-options.md#mobile-phone-verification)
-507 Bytes
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@
88
- name: How-to guides
99
expanded: true
1010
items:
11+
- name: Trial Playbook - Microsoft Entra Permissions Management
12+
href: permissions-management-trial-playbook.md
1113
- name: Onboard Permissions Management on the Azure AD tenant
1214
expanded: true
1315
items:
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)