Skip to content

Commit 36d467d

Browse files
committed
Merge branch 'main' into python-get-started
2 parents 3085c53 + 6e51a57 commit 36d467d

File tree

293 files changed

+3387
-1938
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

293 files changed

+3387
-1938
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5516,6 +5516,11 @@
55165516
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-prometheus-monitoring-addon.md",
55175517
"redirect_url": "/azure/azure-monitor/containers/container-insights-prometheus",
55185518
"redirect_document_id": false
5519+
},
5520+
{
5521+
"source_path_from_root": "/articles/azure-monitor/app/powershell-azure-diagnostics.md",
5522+
"redirect_url": "/azure/azure-monitor/agents/diagnostics-extension-to-application-insights",
5523+
"redirect_document_id": false
55195524
}
55205525
]
55215526
}

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/backup/backup-center-community.md",
5+
"redirect_url": "/azure/backup/backup-center-overview",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/api-management/developer-portal-widget-contribution-guidelines.md",
510
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
@@ -7018,6 +7023,11 @@
70187023
"redirect_url": "/azure/azure-functions/functions-event-grid-blob-trigger",
70197024
"redirect_document_id": false
70207025
},
7026+
{
7027+
"source_path_from_root": "/articles/azure-monitor/app/azure-functions-supported-features.md",
7028+
"redirect_url": "/azure/azure-functions/functions-monitoring",
7029+
"redirect_document_id": false
7030+
},
70217031
{
70227032
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
70237033
"redirect_url": "/azure/azure-government",

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2022
9+
ms.date: 11/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -57,8 +57,24 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
5757
>
5858
> When two methods are required, users can reset using either a notification or verification code in addition to any other enabled methods.
5959
60+
61+
## FIPS 140 compliant for Azure AD authentication
62+
63+
Beginning with version 6.6.8, Microsoft Authenticator for iOS is compliant with [Federal Information Processing Standard (FIPS) 140](https://csrc.nist.gov/publications/detail/fips/140/3/final?azure-portal=true) for all Azure AD authentications using push multi-factor authentications (MFA), passwordless Phone Sign-In (PSI), and time-based one-time passcodes (TOTP).  
64+
65+
Consistent with the guidelines outlined in [NIST SP 800-63B](https://pages.nist.gov/800-63-3/sp800-63b.html?azure-portal=true), authenticators are required to use FIPS 140 validated cryptography. This helps federal agencies meet the requirements of [Executive Order (EO) 14028](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/?azure-portal=true) and healthcare organizations working with [Electronic Prescriptions for Controlled Substances (EPCS)](/azure/compliance/offerings/offering-epcs-us)
66+
67+
FIPS 140 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140 standard is maintained by the [Cryptographic Module Validation Program (CMVP)](https://csrc.nist.gov/Projects/cryptographic-module-validation-program?azure-portal=true).
68+
69+
No changes in configurations are required in Microsoft Authenticator or the Azure portal to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default.
70+
71+
Authenticator leverages the native Apple cryptography to achieve FIPS 140, Security Level 1 compliance on Apple iOS devices beginning with Microsoft Authenticator version 6.6.8. For more information about the certifications being used, see the [Apple CoreCrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web?azure-portal=true)
72+
73+
FIPS 140 compliance for Microsoft Authenticator on Android is in progress and will follow soon.
74+
6075
## Next steps
6176

6277
- To get started with passwordless sign-in, see [Enable passwordless sign-in with the Microsoft Authenticator](howto-authentication-passwordless-phone.md).
6378

6479
- Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
80+

articles/active-directory/authentication/how-to-mfa-server-migration-utility.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/14/2022
9+
ms.date: 11/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -191,7 +191,7 @@ The MFA Server Migration utility targets a single Azure AD group for all migrati
191191

192192
To begin the migration process, enter the name or GUID of the Azure AD group you want to migrate. Once complete, press Tab or click outside the window and the utility will begin searching for the appropriate group. The window will populate all users in the group. A large group can take several minutes to finish.
193193

194-
To view user attribute data for a user, highlight the user, and select **View**:
194+
To view attribute data for a user, highlight the user, and select **View**:
195195

196196
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/view-user.png" alt-text="Screenshot of how to view use settings.":::
197197

@@ -202,7 +202,10 @@ The settings option allows you to change the settings for the migration process:
202202
:::image type="content" border="true" source="./media/how-to-mfa-server-migration-utility/settings.png" alt-text="Screenshot of settings.":::
203203

204204
- Migrate – This setting allows you to specify which method(s) should be migrated for the selection of users
205-
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName
205+
- User Match – Allows you to specify a different on-premises Active Directory attribute for matching Azure AD UPN instead of the default match to userPrincipalName:
206+
- The migration utility tries direct matching to UPN before using the on-premises Active Directory attribute.
207+
- If no match is found, it calls a Windows API to find the Azure AD UPN and get the SID, which it uses to search the MFA Server user list.
208+
- If the Windows API doesn’t find the user or the SID isn’t found in the MFA Server, then it will use the configured Active Directory attribute to find the user in the on-premises Active Directory, and then use the SID to search the MFA Server user list.
206209
- Automatic synchronization – Starts a background service that will continually monitor any authentication method changes to users in the on-premises MFA Server, and write them to Azure AD at the specified time interval defined
207210

208211
The migration process can be an automatic process, or a manual process.
@@ -367,7 +370,7 @@ Content-Type: application/json
367370
}
368371
```
369372

370-
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
373+
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
371374

372375
>[!NOTE]
373376
>The update of the domain federation setting can take up to 24 hours to take effect.
@@ -443,7 +446,8 @@ If the upgrade had issues, follow these steps to roll back:
443446
}
444447
```
445448

446-
Users will no longer be redirected to your on-premises federation server for MFA, whether they’re targeted by the Staged Rollout tool or not. Note this can take up to 24 hours to take effect.
449+
450+
Set the **Staged Rollout for Azure MFA** to **Off**. Users will once again be redirected to your on-premises federation server for MFA.
447451

448452

449453
## Next steps

articles/active-directory/develop/v2-overview.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,16 @@
22
title: Microsoft identity platform overview
33
description: Learn about the components of the Microsoft identity platform and how they can help you build identity and access management (IAM) support into your applications.
44
services: active-directory
5-
author: rwike77
5+
author: CelesteDG
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: overview
1111
ms.workload: identity
12-
ms.date: 10/18/2022
13-
ms.author: ryanwi
14-
ms.reviewer: agirling, saeeda, benv
15-
ms.custom: identityplatformtop40, contperf-fy21q2, engagement-fy23
12+
ms.date: 11/16/2022
13+
ms.author: celested
14+
ms.reviewer: saeeda
1615
# Customer intent: As an application developer, I want a quick introduction to the Microsoft identity platform so I can decide if this platform meets my application development requirements.
1716
---
1817

@@ -72,8 +71,6 @@ Learn how core authentication and Azure AD concepts apply to the Microsoft ident
7271

7372
[Azure AD B2B](../external-identities/what-is-b2b.md) - Invite external users into your Azure AD tenant as "guest" users, and assign permissions for authorization while they use their existing credentials for authentication.
7473

75-
[Azure Active Directory for developers (v1.0)](../azuread-dev/v1-overview.md) - Exclusively for developers with existing apps that use the older v1.0 endpoint. **Do not** use v1.0 for new projects.
76-
7774
## Next steps
7875

7976
If you have an Azure account, then you have access to an Azure Active Directory tenant. However, most Microsoft identity platform developers need their own Azure AD tenant for use while developing applications, known as a *dev tenant*.

articles/active-directory/fundamentals/how-to-manage-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ We currently don't support:
157157

158158
1. Locate the group you want your group to be a member of and choose **Select**.
159159

160-
For this exercise, we're adding "MDM policy - West" to the "MDM policy - All org" group, so "MDM - policy - West" inherits all the properties and configurations of the "MDM policy - All org" group.
160+
For this exercise, we're adding "MDM policy - West" to the "MDM policy - All org" group. The "MDM - policy - West" group will have the same access as the "MDM policy - All org" group.
161161

162162
![Screenshot of making a group the member of another group with 'Group membership' from the side menu and 'Add membership' option highlighted.](media/how-to-manage-groups/nested-groups-selected.png)
163163

@@ -166,7 +166,7 @@ Now you can review the "MDM policy - West - Group memberships" page to see the g
166166
For a more detailed view of the group and member relationship, select the parent group name (MDM policy - All org) and take a look at the "MDM policy - West" page details.
167167

168168
### Remove a group from another group
169-
You can remove an existing Security group from another Security group; however, removing the group also removes any inherited settings for its members.
169+
You can remove an existing Security group from another Security group; however, removing the group also removes any inherited access for its members.
170170

171171
1. On the **Groups - All groups** page, search for and select the group you need to remove as a member of another group.
172172

articles/active-directory/hybrid/how-to-connect-configure-ad-ds-connector-account.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ For Example:
285285

286286
``` powershell
287287
$credential = Get-Credential
288-
Set-ADSyncRestrictedPermissions -ADConnectorAccountDN 'CN=ADConnectorAccount,CN=Users,DC=Contoso,DC=com' -Credential $credential
288+
Set-ADSyncRestrictedPermissions -ADConnectorAccountDN 'CN=ADConnectorAccount,OU=Users,DC=Contoso,DC=com' -Credential $credential
289289
```
290290

291291
This cmdlet will set the following permissions:

articles/active-directory/hybrid/plan-connect-topologies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The most common topology is a single on-premises forest, with one or multiple do
4646
### Single forest, multiple sync servers to one Azure AD tenant
4747
![Unsupported, filtered topology for a single forest](./media/plan-connect-topologies/singleforestfilteredunsupported.png)
4848

49-
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers.
49+
Having multiple Azure AD Connect sync servers connected to the same Azure AD tenant is not supported, except for a [staging server](#staging-server). It's unsupported even if these servers are configured to synchronize with a mutually exclusive set of objects. You might have considered this topology if you can't reach all domains in the forest from a single server, or if you want to distribute load across several servers. (No errors occur when a new Azure AD Sync Server is configured for a new Azure AD forest and a new verified child domain.)
5050

5151
## Multiple forests, single Azure AD tenant
5252
![Topology for multiple forests and a single tenant](./media/plan-connect-topologies/multiforestsingledirectory.png)
@@ -78,7 +78,7 @@ You can find more details in [Understanding the default configuration](concept-a
7878

7979
Having more than one Azure AD Connect sync server connected to a single Azure AD tenant is not supported. The exception is the use of a [staging server](#staging-server).
8080

81-
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported.
81+
This topology differs from the one below in that **multiple sync servers** connected to a single Azure AD tenant is not supported. (While not supported, this still works.)
8282

8383
### Multiple forests, single sync server, users are represented in only one directory
8484
![Option for representing users only once across all directories](./media/plan-connect-topologies/multiforestusersonce.png)
@@ -142,8 +142,8 @@ We recommend having a single tenant in Azure AD for an organization. Before you
142142

143143
This topology implements the following use cases:
144144

145-
* AADConnect can synchronize the same users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial.
146-
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant)
145+
* AADConnect can synchronize the users, groups, and contacts from a single Active Directory to multiple Azure AD tenants. These tenants can be in different Azure environments, such as the Azure China environment or the Azure Government environment, but they could also be in the same Azure environment, such as two tenants that are both in Azure Commercial. For more details on options, see https://docs.microsoft.com/azure/azure-government/documentation-government-plan-identity.
146+
* The same Source Anchor can be used for a single object in separate tenants (but not for multiple objects in the same tenant). (The verified domain can't be the same in two tenants. More details are needed to enable the same object to have two UPNs.)
147147
* You will need to deploy an AADConnect server for every Azure AD tenant you want to synchronize to - one AADConnect server cannot synchronize to more than one Azure AD tenant.
148148
* It is supported to have different sync scopes and different sync rules for different tenants.
149149
* Only one Azure AD tenant sync can be configured to write back to Active Directory for the same object. This includes device and group writeback as well as Hybrid Exchange configurations – these features can only be configured in one tenant. The only exception here is Password Writeback – see below.

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -434,6 +434,9 @@ You can use these cmdlets to retrieve the TLS 1.2 enablement status or set it as
434434
- We added the following new user properties to sync from on-premises Active Directory to Azure AD:
435435
- employeeType
436436
- employeeHireDate
437+
>[!NOTE]
438+
> There's no corresponding EmployeeHireDate or EmployeeLeaveDateTime attribute in Active Directory. If you're importing from on-premises AD, you'll need to identify an attribute in AD that can be used. This attribute must be a string. For more information see, [Synchronizing lifecycle workflow attributes](../governance/how-to-lifecycle-workflow-sync-attributes.md)
439+
437440
- This release requires PowerShell version 5.0 or newer to be installed on the Windows server. This version is part of Windows Server 2016 and newer.
438441
- We increased the group sync membership limits to 250,000 with the new V2 endpoint.
439442
- We updated the Generic LDAP Connector and the Generic SQL Connector to the latest versions. To learn more about these connectors, see the reference documentation for:

0 commit comments

Comments
 (0)