Skip to content

Commit 3b7aeba

Browse files
Fixes
2 parents 3a916fe + cccf4a4 commit 3b7aeba

File tree

640 files changed

+8202
-4848
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

640 files changed

+8202
-4848
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -437,7 +437,7 @@
437437
{
438438
"path_to_root": "media-services-video-indexer",
439439
"url": "https://github.com/Azure-Samples/media-services-video-indexer",
440-
"branch": "main",
440+
"branch": "master",
441441
"branch_mapping": {}
442442
},
443443
{

.openpublishing.redirection.active-directory.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8792,8 +8792,8 @@
87928792
},
87938793
{
87948794
"source_path_from_root": "/articles/active-directory/active-directory-saas-linkedin-learning-provisioning-tutorial.md",
8795-
"redirect_url": "/azure/active-directory/saas-apps/linkedin-learning-provisioning-tutorial",
8796-
"redirect_document_id": true
8795+
"redirect_url": "/azure",
8796+
"redirect_document_id": false
87978797
},
87988798
{
87998799
"source_path_from_root": "/articles/active-directory/active-directory-saas-linkedinlearning-tutorial.md",

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,16 @@
181181
"redirect_url": "/azure/azure-monitor/visualize/workbooks-overview",
182182
"redirect_document_id": false
183183
},
184+
{
185+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-add-text.md",
186+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-add-workbook-elements",
187+
"redirect_document_id": false
188+
},
189+
{
190+
"source_path_from_root": "/articles/azure-monitor/visualize/workbooks-combine-data.md",
191+
"redirect_url": "/azure/azure-monitor/visualize/workbooks-data-sources",
192+
"redirect_document_id": false
193+
},
184194
{
185195
"source_path_from_root": "/articles/azure-monitor/alerts/itsmc-service-manager-script.md",
186196
"redirect_url": "/azure/azure-monitor/alerts/itsmc-connections",

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,8 @@ Declare your claims in the [claims schema](claimsschema.md). Open the extensions
130130
</BuildingBlocks> -->
131131
```
132132

133-
A claims transformation technical profile initiates the **isForgotPassword** claim. The technical profile is referenced later. When invoked, it sets the value of the **isForgotPassword** claim to `true`. Find the **ClaimsProviders** element. If the element doesn't exist, add it. Then add the following claims provider:
133+
### Add the technical profiles
134+
A claims transformation technical profile accesses the `isForgotPassword` claim. The technical profile is referenced later. When it's invoked, it sets the value of the `isForgotPassword` claim to `true`. Find the **ClaimsProviders** element (if the element doesn't exist, create it), and then add the following claims provider:
134135

135136
```xml
136137
<!--
@@ -151,6 +152,9 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
151152
<Item Key="setting.forgotPasswordLinkOverride">ForgotPasswordExchange</Item>
152153
</Metadata>
153154
</TechnicalProfile>
155+
<TechnicalProfile Id="LocalAccountWritePasswordUsingObjectId">
156+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-AAD" />
157+
</TechnicalProfile>
154158
</TechnicalProfiles>
155159
</ClaimsProvider>
156160
<!--
@@ -159,6 +163,8 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
159163

160164
The **SelfAsserted-LocalAccountSignin-Email** technical profile **setting.forgotPasswordLinkOverride** defines the password reset claims exchange that executes in your user journey.
161165

166+
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to preform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
167+
162168
### Add the password reset sub journey
163169

164170
The user can now sign in, sign up, and perform password reset in your user journey. To better organize the user journey, you can use a [sub journey](subjourneys.md) to handle the password reset flow.

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ In your own environment, if your SPA app uses MSAL.js 1.3 or earlier and the imp
101101

102102
1. In the left menu, under **Manage**, select **Authentication**.
103103

104-
1. Under **Implicit grant and hybrid flows**, select both the **Access tokens (used for implicit flows)** and **D tokens (used for implicit and hybrid flows)** check boxes.
104+
1. Under **Implicit grant and hybrid flows**, select both the **Access tokens (used for implicit flows)** and **ID tokens (used for implicit and hybrid flows)** check boxes.
105105

106106
1. Select **Save**.
107107

articles/active-directory-b2c/custom-email-mailjet.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/25/2022
12+
ms.date: 06/22/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
zone_pivot_groups: b2c-policy-type
@@ -35,8 +35,8 @@ Custom email verification requires the use of a third-party email provider like
3535

3636
If you don't already have one, start by setting up a Mailjet account (Azure customers can unlock 6,000 emails with a limit of 200 emails/day).
3737

38-
1. Follow the setup instructions at [Create a Mailjet Account](https://www.mailjet.com/guides/azure-mailjet-developer-resource-user-guide/enabling-mailjet/).
39-
1. To be able to send email, [register and validate](https://www.mailjet.com/guides/azure-mailjet-developer-resource-user-guide/enabling-mailjet/#how-to-configure-mailjet-for-use) your Sender email address or domain.
38+
1. Follow the setup instructions at [Create a Mailjet Account](https://dev.mailjet.com/email/guides/getting-started/).
39+
1. To be able to send email, [register and validate](https://dev.mailjet.com/email/guides/verify-your-domain) your Sender email address or domain.
4040
2. Navigate to the [API Key Management page](https://dev.mailjet.com/email/guides/senders-and-domains/#use-a-sender-on-all-api-keys-(metasender)). Record the **API Key** and **Secret Key** for use in a later step. Both keys are generated automatically when your account is created.
4141

4242
> [!IMPORTANT]

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -199,8 +199,8 @@ Use the steps below to provision roles for a user to your application. Note that
199199

200200
- **SingleAppRoleAssignment**
201201
- **When to use:** Use the SingleAppRoleAssignment expression to provision a single role for a user and to specify the primary role.
202-
- **How to configure:** Use the steps described above to navigate to the attribute mappings page and use the SingleAppRoleAssignment expression to map to the roles attribute. There are three role attributes to choose from: (roles[primary eq "True"].display, roles[primary eq "True].type, and roles[primary eq "True"].value). You can choose to include any or all of the role attributes in your mappings. If you would like to include more than one, just add a new mapping and include it as the target attribute.
203-
202+
- **How to configure:** Use the steps described above to navigate to the attribute mappings page and use the SingleAppRoleAssignment expression to map to the roles attribute. There are three role attributes to choose from (`roles[primary eq "True"].display`, `roles[primary eq "True"].type`, and `roles[primary eq "True"].value`). You can choose to include any or all of the role attributes in your mappings. If you would like to include more than one, just add a new mapping and include it as the target attribute.
203+
204204
![Add SingleAppRoleAssignment](./media/customize-application-attributes/edit-attribute-singleapproleassignment.png)
205205
- **Things to consider**
206206
- Ensure that multiple roles are not assigned to a user. We cannot guarantee which role will be provisioned.

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/09/2022
9+
ms.date: 06/23/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -59,7 +59,7 @@ With phone call verification during SSPR or Azure AD Multi-Factor Authentication
5959
If you have problems with phone authentication for Azure AD, review the following troubleshooting steps:
6060

6161
* “You've hit our limit on verification calls” or “You’ve hit our limit on text verification codes” error messages during sign-in
62-
* Microsoft may limit repeated authentication attempts that are performed by the same user or organization in a short period of time. This limitation does not apply to the Microsoft Entra Authenticator app or verification codes. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.
62+
* Microsoft may limit repeated authentication attempts that are performed by the same user or organization in a short period of time. This limitation does not apply to Microsoft Authenticator or verification codes. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.
6363
* "Sorry, we're having trouble verifying your account" error message during sign-in
6464
* Microsoft may limit or block voice or SMS authentication attempts that are performed by the same user, phone number, or organization due to high number of voice or SMS authentication attempts. If you are experiencing this error, you can try another method, such as Authenticator App or verification code, or reach out to your admin for support.
6565
* Blocked caller ID on a single device.

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@ The two-gate policy requires two pieces of authentication data, such as an email
9797
* A custom domain has been configured for your Azure AD tenant, such as *contoso.com*; or
9898
* Azure AD Connect is synchronizing identities from your on-premises directory
9999

100-
You can disable the use of SSPR for administrator accounts using the [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings) PowerShell cmdlet. The `-SelfServePasswordResetEnabled $False` parameter disables SSPR for administrators.
100+
You can disable the use of SSPR for administrator accounts using the [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings) PowerShell cmdlet. The `-SelfServePasswordResetEnabled $False` parameter disables SSPR for administrators. Policy changes to disable or enable SSPR for administrator accounts can take up to 60 minutes to take effect.
101101

102102
### Exceptions
103103

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Use additional context in Microsoft Entra Authenticator notifications (Preview) - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/08/2022
7+
ms.date: 06/23/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in Microsoft Entra Authenticator app notifications (Preview) - Authentication Methods Policy
14+
# How to use additional context in Microsoft Authenticator app notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to improve the security of user sign-in by adding the application and location in Microsoft Entra Authenticator app push notifications.
16+
This topic covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
1717

1818
## Prerequisites
1919

@@ -182,7 +182,7 @@ To turn off additional context, you'll need to PATCH remove **displayAppInformat
182182

183183
To enable additional context in the Azure AD portal, complete the following steps:
184184

185-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Entra Authenticator**.
185+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
186186
1. Select the target users, click the three dots on the right, and click **Configure**.
187187

188188
![Screenshot of how to configure number match.](media/howto-authentication-passwordless-phone/configure.png)
@@ -197,5 +197,5 @@ Additional context is not supported for Network Policy Server (NPS).
197197

198198
## Next steps
199199

200-
[Authentication methods in Azure Active Directory - Microsoft Entra Authenticator app](concept-authentication-authenticator-app.md)
200+
[Authentication methods in Azure Active Directory - Microsoft Authenticator app](concept-authentication-authenticator-app.md)
201201

0 commit comments

Comments
 (0)