Skip to content

Commit 3977a25

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1604901a
2 parents c9e1bdd + 8654366 commit 3977a25

File tree

184 files changed

+1969
-1119
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

184 files changed

+1969
-1119
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16525,6 +16525,21 @@
1652516525
"redirect_url": "/azure/machine-learning/team-data-science-process/walkthroughs",
1652616526
"redirect_document_id": false
1652716527
},
16528+
{
16529+
"source_path": "articles/machine-learning/team-data-science-process/cortana-analytics-playbook-predictive-maintenance.md",
16530+
"redirect_url": "/azure/machine-learning/team-data-science-process/predictive-maintenance-playbook",
16531+
"redirect_document_id": true
16532+
},
16533+
{
16534+
"source_path": "articles/machine-learning/team-data-science-process/cortana-analytics-architecture-predictive-maintenance.md",
16535+
"redirect_url": "/azure/machine-learning/team-data-science-process/predictive-maintenance-architecture",
16536+
"redirect_document_id": true
16537+
},
16538+
{
16539+
"source_path": "articles/machine-learning/team-data-science-process/cortana-analytics-technical-guide-predictive-maintenance.md",
16540+
"redirect_url": "/azure/machine-learning/team-data-science-process/predictive-maintenance-technical-guide",
16541+
"redirect_document_id": true
16542+
},
1652816543
{
1652916544
"source_path": "articles/monitoring-and-diagnostics/monitor-alerts-unified-log-template.md",
1653016545
"redirect_url": "/azure/monitoring-and-diagnostics/alert-log",
@@ -49251,6 +49266,16 @@
4925149266
"redirect_url": "/azure/cognitive-services/Speech-Service/how-to-use-codec-compressed-audio-input-streams?pivots=programming-language-objectivec",
4925249267
"redirect_document_id": false
4925349268
},
49269+
{
49270+
"source_path": "articles/integrations/index.yml",
49271+
"redirect_url": "https://azure.microsoft.com/products/developer-tool-integrations/",
49272+
"redirect_document_id": false
49273+
},
49274+
{
49275+
"source_path": "articles/sdks/index.yml",
49276+
"redirect_url": "https://azure.microsoft.com/downloads/",
49277+
"redirect_document_id": false
49278+
},
4925449279
{
4925549280
"source_path": "articles/power-bi-embedded/index.md",
4925649281
"redirect_url": "https://docs.microsoft.com/power-bi/developer/azure-pbie-what-is-power-bi-embedded",

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 23 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -60,13 +60,13 @@ To read, update, or delete an existing user account, the input claim is a key th
6060

6161
To create a new user account, the input claim is a key that uniquely identifies a local or federated account. For example, local account: **signInNames.emailAddress**, or **signInNames.userName**. For a federated account: the **alternativeSecurityId**.
6262

63-
The InputClaimsTransformations element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
63+
The [InputClaimsTransformations](technicalprofiles.md#inputclaimstransformations) element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
6464

6565
## OutputClaims
6666

6767
The **OutputClaims** element contains a list of claims returned by the Azure AD technical profile. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory. You can also include claims that aren't returned by the Azure Active Directory, as long as you set the `DefaultValue` attribute.
6868

69-
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
69+
The [OutputClaimsTransformations](technicalprofiles.md#outputclaimstransformations) element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
7070

7171
For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a local account and returns the following claims:
7272

@@ -88,7 +88,7 @@ For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a lo
8888

8989
## PersistedClaims
9090

91-
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the ClaimsSchema section in the policy and the Azure AD attribute name.
91+
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Azure AD attribute name.
9292

9393
The **AAD-UserWriteUsingLogonEmail** technical profile, which creates new local account, persists following claims:
9494

@@ -119,9 +119,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
119119

120120
### Read
121121

122-
The **Read** operation reads data about a single user account. To read user data, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames** (any type, user name and email-based account) or **alternativeSecurityId**.
123-
124-
The following technical profile reads data about a user account using the user's objectId:
122+
The **Read** operation reads data about a single user account. The following technical profile reads data about a user account using the user's objectId:
125123

126124
```XML
127125
<TechnicalProfile Id="AAD-UserReadUsingObjectId">
@@ -151,9 +149,7 @@ The following technical profile reads data about a user account using the user's
151149

152150
### Write
153151

154-
The **Write** operation creates or updates a single user account. To write a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress**, or **alternativeSecurityId**.
155-
156-
The following technical profile creates new social account:
152+
The **Write** operation creates or updates a single user account. The following technical profile creates new social account:
157153

158154
```XML
159155
<TechnicalProfile Id="AAD-UserWriteUsingAlternativeSecurityId">
@@ -193,9 +189,7 @@ The following technical profile creates new social account:
193189

194190
### DeleteClaims
195191

196-
The **DeleteClaims** operation clears the information from a provided list of claims. To delete information from claims, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
197-
198-
The following technical profile deletes claims:
192+
The **DeleteClaims** operation clears the information from a provided list of claims. The following technical profile deletes claims:
199193

200194
```XML
201195
<TechnicalProfile Id="AAD-DeleteClaimsUsingObjectId">
@@ -216,9 +210,7 @@ The following technical profile deletes claims:
216210

217211
### DeleteClaimsPrincipal
218212

219-
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. To delete a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
220-
221-
The following technical profile deletes a user account from the directory using the user principal name:
213+
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. The following technical profile deletes a user account from the directory using the user principal name:
222214

223215
```XML
224216
<TechnicalProfile Id="AAD-DeleteUserUsingObjectId">
@@ -253,13 +245,27 @@ The following technical profile deletes a social user account using **alternativ
253245
| --------- | -------- | ----------- |
254246
| Operation | Yes | The operation to be performed. Possible values: `Read`, `Write`, `DeleteClaims`, or `DeleteClaimsPrincipal`. |
255247
| RaiseErrorIfClaimsPrincipalDoesNotExist | No | Raise an error if the user object does not exist in the directory. Possible values: `true` or `false`. |
256-
| UserMessageIfClaimsPrincipalDoesNotExist | No | If an error is to be raised (see the RaiseErrorIfClaimsPrincipalDoesNotExist attribute description), specify the message to show to the user if user object does not exist. The value can be [localized](localization.md).|
257248
| RaiseErrorIfClaimsPrincipalAlreadyExists | No | Raise an error if the user object already exists. Possible values: `true` or `false`.|
258-
| UserMessageIfClaimsPrincipalAlreadyExists | No | If an error is to be raised (see RaiseErrorIfClaimsPrincipalAlreadyExists attribute description), specify the message to show to the user if user object already exists. The value can be [localized](localization.md).|
259249
| ApplicationObjectId | No | The application object identifier for extension attributes. Value: ObjectId of an application. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md). |
260250
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md) |
261251
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
262252

253+
### Error messages
254+
255+
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
256+
257+
| Attribute | Required | Description |
258+
| --------- | -------- | ----------- |
259+
| UserMessageIfClaimsPrincipalAlreadyExists | No | If an error is to be raised (see RaiseErrorIfClaimsPrincipalAlreadyExists attribute description), specify the message to show to the user if user object already exists. |
260+
| UserMessageIfClaimsPrincipalDoesNotExist | No | If an error is to be raised (see the RaiseErrorIfClaimsPrincipalDoesNotExist attribute description), specify the message to show to the user if user object does not exist. |
261+
262+
263+
## Next steps
264+
265+
See the following article, for example of using Azure AD technical profile:
266+
267+
- [Add claims and customize user input using custom policies in Azure Active Directory B2C](custom-policy-configure-user-input.md)
268+
263269

264270

265271

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ With Azure AD DS successfully deployed, now configure the virtual network to all
134134

135135
1. The **Overview** tab for your managed domain shows some **Required configuration steps**. The first configuration step is to update DNS server settings for your virtual network. Once the DNS settings are correctly configured, this step is no longer shown.
136136

137-
The addresses listed are the domain controllers for use in the virtual network. In this example, those addresses are *10.1.0.4* and *10.1.0.5*. You can later find these IP addresses on the **Properties** tab.
137+
The addresses listed are the domain controllers for use in the virtual network. In this example, those addresses are *10.0.1.4* and *10.0.1.5*. You can later find these IP addresses on the **Properties** tab.
138138

139139
![Configure DNS settings for your virtual network with the Azure AD Domain Services IP addresses](./media/tutorial-create-instance/configure-dns.png)
140140

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ If your users are [Having trouble with two-step verification](../user-help/multi
9595

9696
### Health check script
9797

98-
The [Azure MFA NPS Extension health check script](https://gallery.technet.microsoft.com/Azure-MFA-NPS-Extension-648de6bb) is available on the TechNet Gallery to perform a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
98+
The [Azure MFA NPS Extension health check script](https://docs.microsoft.com/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) performs a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
9999

100100
### Contact Microsoft support
101101

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ When using the NPS extension for Azure MFA, the authentication flow includes the
2626
1. **NAS/VPN Server** receives requests from VPN clients and converts them into RADIUS requests to NPS servers. 
2727
2. **NPS Server** connects to Active Directory to perform the primary authentication for the RADIUS requests and, upon success, passes the request to any installed extensions.  
2828
3. **NPS Extension** triggers a request to Azure MFA for the secondary authentication. Once the extension receives the response, and if the MFA challenge succeeds, it completes the authentication request by providing the NPS server with security tokens that include an MFA claim, issued by Azure STS.  
29-
4. **Azure MFA** communicates with Azure Active Directory to retrieve the users details and performs the secondary authentication using a verification method configured to the user.
29+
4. **Azure MFA** communicates with Azure Active Directory to retrieve the user's details and performs the secondary authentication using a verification method configured to the user.
3030

3131
The following diagram illustrates this high-level authentication request flow: 
3232

@@ -165,7 +165,7 @@ The installer creates a PowerShell script in this location: `C:\Program Files\Mi
165165
- Create a self-signed certificate.
166166
- Associate the public key of the certificate to the service principal on Azure AD.
167167
- Store the cert in the local machine cert store.
168-
- Grant access to the certificates private key to Network User.
168+
- Grant access to the certificate's private key to Network User.
169169
- Restart the NPS.
170170

171171
Unless you want to use your own certificates (instead of the self-signed certificates that the PowerShell script generates), run the PowerShell Script to complete the installation. If you install the extension on multiple servers, each one should have its own certificate.
@@ -247,9 +247,9 @@ You can choose to create this key and set it to FALSE while your users are onboa
247247

248248
### NPS extension health check script
249249

250-
The following script is available on the TechNet Gallery to perform basic health check steps when troubleshooting the NPS extension.
250+
The following script is available to perform basic health check steps when troubleshooting the NPS extension.
251251

252-
[MFA_NPS_Troubleshooter.ps1](https://gallery.technet.microsoft.com/Azure-MFA-NPS-Extension-648de6bb)
252+
[MFA_NPS_Troubleshooter.ps1](https://docs.microsoft.com/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/)
253253

254254
---
255255

@@ -332,6 +332,8 @@ Additional troubleshooting guidance and possible solutions can be found in the a
332332

333333
## Next steps
334334

335+
- [Overview and configuration of Network Policy Server in Windows Server](https://docs.microsoft.com/windows-server/networking/technologies/nps/nps-top)
336+
335337
- Configure alternate IDs for login, or set up an exception list for IPs that shouldn't perform two-step verification in [Advanced configuration options for the NPS extension for Multi-Factor Authentication](howto-mfa-nps-extension-advanced.md)
336338

337339
- Learn how to integrate [Remote Desktop Gateway](howto-mfa-nps-extension-rdg.md) and [VPN servers](howto-mfa-nps-extension-vpn.md) using the NPS extension

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: jsimmons
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Enable on-premises Azure Active Password Protection
18+
# Enable on-premises Azure Active Directory Password Protection
1919

2020
Users often create passwords that use common local words such as a school, sports team, or famous person. These passwords are easy to guess, and weak against dictionary-based attacks. To enforce strong passwords in your organization, Azure Active Directory (Azure AD) Password Protection provides a global and custom banned password list. A password change request fails if there's a match in these banned password list.
2121

articles/active-directory/conditional-access/terms-of-use.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,11 @@ If a user is using Windows 10 and Microsoft Edge, they will receive a message si
274274

275275
If they are using Chrome, they will be prompted to install the [Windows 10 Accounts extension](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji).
276276

277-
### Join an Android device
277+
### Register an iOS device
278+
279+
If a user is using an iOS device, they will be prompted to install the [Microsoft Authenticator app](https://apps.apple.com/us/app/microsoft-authenticator/id983156458).
280+
281+
### Register an Android device
278282

279283
If a user is using an Android device, they will be prompted to install the [Microsoft Authenticator app](https://play.google.com/store/apps/details?id=com.azure.authenticator).
280284

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,6 +119,7 @@ Caveat: If there are synchronized accounts that need to have non-expiring passwo
119119

120120
> [!NOTE]
121121
> This feature is in Public Preview right now.
122+
> The Set-MsolPasswordPolicy PowerShell command will not work on federated domains.
122123
123124
#### Public Preview of synchronizing temporary passwords and "Force Password Change on Next Logon"
124125

3.44 KB
Loading

0 commit comments

Comments
 (0)