Skip to content

Commit 374fa6c

Browse files
committed
merge from master
2 parents b7ddb4c + 337c46b commit 374fa6c

File tree

2,782 files changed

+39871
-34826
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,782 files changed

+39871
-34826
lines changed

.openpublishing.redirection.json

Lines changed: 437 additions & 1 deletion
Large diffs are not rendered by default.

.vscode/settings.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@
6262
"auditd"
6363
],
6464
"git.ignoreLimitWarning": true
65-
}
65+
}

articles/active-directory-b2c/azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,8 @@ To onboard your Azure AD tenant (the **Customer**), create an [Azure Resource Ma
8080

8181
Download the Azure Resource Manager template and parameter files:
8282

83-
- [rgDelegatedResourceManagement.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84-
- [rgDelegatedResourceManagement.parameters.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
83+
- [rgDelegatedResourceManagement.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84+
- [rgDelegatedResourceManagement.parameters.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
8585

8686
Next, update the parameters file with the values you recorded earlier. The following JSON snippet shows an example of an Azure Resource Manager template parameters file. For `authorizations.value.roleDefinitionId`, use the [built-in role](../role-based-access-control/built-in-roles.md) value for the *Contributor role*, `b24988ac-6180-42a0-ab88-20f7382dd24c`.
8787

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Next, expose the API by adding a scope:
112112
1. In **App registrations (Legacy)**, select **New application registration**.
113113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
114114
1. For **Application type**, choose **Native**.
115-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
115+
1. For **Redirect URI**, enter `myapp://auth`.
116116
1. Select **Create**. After it's created, copy the application ID and save it to use later.
117117
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
118118
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
@@ -125,7 +125,7 @@ Next, expose the API by adding a scope:
125125
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126126
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127127
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
128+
1. For **Redirect URI**, enter `myapp://auth`.
129129
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130130
1. Select **Register**.
131131
1. Record the **Application (client) ID** for use in a later step.

articles/active-directory-b2c/identity-provider-adfs2016-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Now that you have a button in place, you need to link it to an action. The actio
165165
To use ADFS as an identity provider in Azure AD B2C, you need to create an ADFS Relying Party Trust with the Azure AD B2C SAML metadata. The following example shows a URL address to the SAML metadata of an Azure AD B2C technical profile:
166166

167167
```
168-
https://your-tenant-name.b2clogin.com/your-tenant-name/your-policy/samlp/metadata?idptp=your-technical-profile
168+
https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy/samlp/metadata?idptp=your-technical-profile
169169
```
170170
171171
Replace the following values:

articles/active-directory/authentication/TOC.yml

Lines changed: 48 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -22,44 +22,38 @@
2222
items:
2323
- name: Authentication methods
2424
href: concept-authentication-methods.md
25-
- name: Passwordless authentication
26-
href: concept-authentication-passwordless.md
27-
- name: Security information registration
28-
href: concept-registration-mfa-sspr-combined.md
29-
- name: Password reset
25+
- name: Self-service password reset
3026
items:
3127
- name: How password reset works
3228
href: concept-sspr-howitworks.md
33-
- name: Password reset options
34-
href: concept-sspr-customization.md
35-
- name: Password reset policies
36-
href: concept-sspr-policy.md
37-
- name: What license do I need?
38-
href: concept-sspr-licensing.md
3929
- name: On-premises integration
4030
href: concept-sspr-writeback.md
31+
- name: Policies
32+
href: concept-sspr-policy.md
33+
- name: Licenses
34+
href: concept-sspr-licensing.md
4135
- name: Multi-Factor Authentication
4236
items:
4337
- name: How MFA works
4438
href: concept-mfa-howitworks.md
45-
- name: License your users
46-
href: concept-mfa-licensing.md
47-
- name: Manage an Auth Provider
48-
href: concept-mfa-authprovider.md
49-
- name: Security guidance
50-
href: multi-factor-authentication-security-best-practices.md
5139
- name: Data residency
5240
href: concept-mfa-data-residency.md
41+
- name: Licenses
42+
href: concept-mfa-licensing.md
5343
- name: MFA for Office 365
5444
href: https://docs.microsoft.com/office365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide
55-
- name: MFA FAQ
45+
- name: FAQ
5646
href: multi-factor-authentication-faq.md
57-
- name: Azure AD password protection
47+
- name: Passwordless authentication
48+
href: concept-authentication-passwordless.md
49+
- name: Password protection
5850
items:
5951
- name: Eliminate weak passwords in the cloud
6052
href: concept-password-ban-bad.md
6153
- name: Eliminate weak passwords on-premises
6254
href: concept-password-ban-bad-on-premises.md
55+
- name: Security information registration
56+
href: concept-registration-mfa-sspr-combined.md
6357
- name: Resilient access controls
6458
href: concept-resilient-controls.md
6559
- name: How-to guides
@@ -68,20 +62,24 @@
6862
items:
6963
- name: Deployment guide
7064
href: howto-sspr-deployment.md
65+
- name: User customization options
66+
href: howto-sspr-customization.md
7167
- name: Pre-register authentication data
7268
href: howto-sspr-authenticationdata.md
7369
- name: SSPR for Windows clients
7470
href: howto-sspr-windows.md
75-
- name: Cloud-based MFA
71+
- name: Azure Multi-Factor Authentication
7672
items:
7773
- name: Deployment guide
7874
href: howto-mfa-getstarted.md
79-
- name: Per user MFA
80-
href: howto-mfa-userstates.md
81-
- name: User and device settings
82-
href: howto-mfa-userdevicesettings.md
8375
- name: Configure settings
8476
href: howto-mfa-mfasettings.md
77+
- name: Configure users
78+
href: howto-mfa-userdevicesettings.md
79+
- name: Enable per-user MFA
80+
href: howto-mfa-userstates.md
81+
- name: Configure authentication providers
82+
href: concept-mfa-authprovider.md
8583
- name: Directory Federation
8684
items:
8785
- name: Windows Server 2016 AD FS Adapter
@@ -102,28 +100,6 @@
102100
href: howto-mfa-nps-extension-rdg.md
103101
- name: VPN
104102
href: howto-mfa-nps-extension-vpn.md
105-
- name: Security info registration
106-
items:
107-
- name: Enable combined registration
108-
href: howto-registration-mfa-sspr-combined.md
109-
- name: Troubleshoot combined registration
110-
href: howto-registration-mfa-sspr-combined-troubleshoot.md
111-
- name: Azure AD password protection
112-
items:
113-
- name: Plan and deploy on-premises
114-
href: howto-password-ban-bad-on-premises-deploy.md
115-
- name: Enable and configure on-premises
116-
href: howto-password-ban-bad-on-premises-operations.md
117-
- name: Monitor on-premises deployments
118-
href: howto-password-ban-bad-on-premises-monitor.md
119-
- name: Troubleshoot on-premises deployments
120-
href: howto-password-ban-bad-on-premises-troubleshoot.md
121-
- name: On-premises FAQs
122-
href: howto-password-ban-bad-on-premises-faq.md
123-
- name: On-premises agent version history
124-
href: howto-password-ban-bad-on-premises-agent-versions.md
125-
- name: Azure AD smart lockout
126-
href: howto-password-smart-lockout.md
127103
- name: Passwordless
128104
items:
129105
- name: Deploying passwordless
@@ -140,14 +116,38 @@
140116
href: howto-authentication-passwordless-phone.md
141117
- name: Windows Hello for Business
142118
href: https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification
119+
- name: Security info registration
120+
items:
121+
- name: Enable combined registration
122+
href: howto-registration-mfa-sspr-combined.md
123+
- name: Troubleshoot combined registration
124+
href: howto-registration-mfa-sspr-combined-troubleshoot.md
125+
- name: On-premises password protection
126+
items:
127+
- name: Plan and deploy
128+
href: howto-password-ban-bad-on-premises-deploy.md
129+
- name: Enable and configure
130+
href: howto-password-ban-bad-on-premises-operations.md
131+
- name: Monitor
132+
href: howto-password-ban-bad-on-premises-monitor.md
133+
- name: Troubleshoot
134+
href: howto-password-ban-bad-on-premises-troubleshoot.md
135+
- name: FAQs
136+
href: howto-password-ban-bad-on-premises-faq.md
137+
- name: Agent version history
138+
href: howto-password-ban-bad-on-premises-agent-versions.md
139+
- name: Use SMS-based authentication (preview)
140+
href: howto-authentication-sms-signin.md
141+
- name: Azure AD smart lockout
142+
href: howto-password-smart-lockout.md
143143
- name: Certificate-based authentication
144144
items:
145145
- name: Get started with certificate auth
146146
href: active-directory-certificate-based-authentication-get-started.md
147147
items:
148-
- name: CBA on Android Devices
148+
- name: Use on Android Devices
149149
href: active-directory-certificate-based-authentication-android.md
150-
- name: CBA on iOS Devices
150+
- name: Use on iOS Devices
151151
href: active-directory-certificate-based-authentication-ios.md
152152
- name: Reporting
153153
items:

articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ iOS devices can use certificate-based authentication (CBA) to authenticate to Az
2424

2525
Configuring this feature eliminates the need to enter a username and password combination into certain mail and Microsoft Office applications on your mobile device.
2626

27-
This topic provides you with the requirements and the supported scenarios for configuring CBA on an iOS(Android) device for users of tenants in Office 365 Enterprise, Business, Education, US Government, China, and Germany plans.
27+
This topic provides you with the requirements and the supported scenarios for configuring CBA on an iOS device for users of tenants in Office 365 Enterprise, Business, Education, US Government, China, and Germany plans.
2828

2929
This feature is available in preview in Office 365 US Government Defense and Federal plans.
3030

articles/active-directory/authentication/active-directory-passwords-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/11/2018
9+
ms.date: 04/15/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -232,7 +232,7 @@ This FAQ is split into the following sections:
232232
>
233233
* **Q: Is there an API to access the password reset or registration reporting data?**
234234

235-
> **A:** Yes. To learn how you can access the password reset reporting data stream, see [Learn how to access password reset reporting events programmatically](https://msdn.microsoft.com/library/azure/mt126081.aspx#BKMK_SsprActivityEvent).
235+
> **A:** Yes. To learn how you can access the password reset reporting data, see the [Azure Log Analytics REST API Reference](/rest/api/loganalytics/).
236236
>
237237
>
238238

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,13 @@ ms.collection: M365-identity-device-management
1717
---
1818
# When to use an Azure Multi-Factor Authentication Provider
1919

20+
> [!IMPORTANT]
21+
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
22+
2023
Two-step verification is available by default for global administrators who have Azure Active Directory, and Office 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure Multi-Factor Authentication (MFA).
2124

2225
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by Azure Multi-Factor Authentication for users who **do not have licenses**.
2326

24-
> [!NOTE]
25-
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
26-
2727
## Caveats related to the Azure MFA SDK
2828

2929
Note the SDK has been deprecated and will only continue to work until November 14, 2018. After that time, calls to the SDK will fail.

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 12/16/2019
9+
ms.date: 04/13/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds

0 commit comments

Comments
 (0)