Skip to content

Commit 3bac69c

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1645361ae
2 parents 3016efd + 63c46f5 commit 3bac69c

File tree

393 files changed

+3541
-4186
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

393 files changed

+3541
-4186
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39798,6 +39798,11 @@
3979839798
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
3979939799
"redirect_document_id": false
3980039800
},
39801+
{
39802+
"source_path": "articles/cognitive-services/Custom-Vision-Service/move-your-project-to-azure.md",
39803+
"redirect_url": "/azure/cognitive-services/Custom-Vision-Service/home",
39804+
"redirect_document_id": false
39805+
},
3980139806
{
3980239807
"source_path": "articles/data-catalog/data-catalog-prerequisites.md",
3980339808
"redirect_url": "/azure/data-catalog/data-catalog-get-started",

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ This flowchart describes which methods are shown to a user when interrupted to r
105105

106106
If you have both Multi-Factor Authentication and SSPR enabled, we recommend that you enforce Multi-Factor Authentication registration.
107107

108-
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up-to-date, or they can make changes if they need to.
108+
If the SSPR policy requires users to review their security info at regular intervals, users are interrupted during sign-in and shown all their registered methods. They can confirm the current info if it's up-to-date, or they can make changes if they need to. Users must perform multi-factor authentication when accessing this page.
109109

110110
### Manage mode
111111

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,15 +50,15 @@ The two-gate policy requires two pieces of authentication data, such as an **ema
5050
* Privileged Authentication administrator
5151

5252
* If 30 days have elapsed in a trial subscription; or
53-
* A vanity domain is present, such as contoso.com; or
53+
* A custom domain has been configured for your Azure AD tenant, such as *contoso.com*; or
5454
* Azure AD Connect is synchronizing identities from your on-premises directory
5555

5656
### Exceptions
5757

5858
A one-gate policy requires one piece of authentication data, such as an email address *or* phone number. A one-gate policy applies in the following circumstances:
5959

6060
* It's within the first 30 days of a trial subscription; or
61-
* A vanity domain isn't present (*.onmicrosoft.com); and
61+
* A custom domain hasn't been configured for your Azure AD tenant so is using the default **.onmicrosoft.com*. Note that the default **.onmicrosoft.com* domain isn't recommended for production use; and
6262
* Azure AD Connect isn't synchronizing identities
6363

6464
## UserPrincipalName policies that apply to all user accounts

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,10 @@ If you encounter one of these errors, we recommend that you [contact support](#c
9393

9494
If your users are [Having trouble with two-step verification](../user-help/multi-factor-authentication-end-user-troubleshoot.md), help them self-diagnose problems.
9595

96+
### Health check script
97+
98+
The [Azure MFA NPS Extension health check script](https://gallery.technet.microsoft.com/Azure-MFA-NPS-Extension-648de6bb) is available on the TechNet Gallery to perform a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
99+
96100
### Contact Microsoft support
97101

98102
If you need additional help, contact a support professional through [Azure Multi-Factor Authentication Server support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, the ID of the user who saw the error, and debug logs.

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,6 +131,16 @@ Identify users who have not registered for MFA using the PowerShell that follows
131131

132132
```Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods.Count -eq 0} | Select-Object -Property UserPrincipalName```
133133

134+
Identify users and output methods registered.
135+
136+
```PowerShell
137+
Get-MsolUser -All | Select-Object @{N='UserPrincipalName';E={$_.UserPrincipalName}},
138+
139+
@{N='MFA Status';E={if ($_.StrongAuthenticationRequirements.State){$_.StrongAuthenticationRequirements.State} else {"Disabled"}}},
140+
141+
@{N='MFA Methods';E={$_.StrongAuthenticationMethods.methodtype}} | Export-Csv -Path c:\MFA_Report.csv -NoTypeInformation
142+
```
143+
134144
## Possible results in activity reports
135145

136146
The following table may be used to troubleshoot multi-factor authentication using the downloaded version of the multi-factor authentication activity report. They will not appear directly in the Azure portal.

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,9 @@ Now that you have downloaded the server you can install and configure it. Be sur
120120

121121
5. Back on the page that you downloaded the server from, click the **Generate Activation Credentials** button. Copy this information into the Azure MFA Server in the boxes provided and click **Activate**.
122122

123+
> [!NOTE]
124+
> Only global administrators are able to generate activation credentials in the Azure portal.
125+
123126
## Send users an email
124127

125128
To ease rollout, allow MFA Server to communicate with your users. MFA Server can send an email to inform them that they have been enrolled for two-step verification.

articles/active-directory/authentication/multi-factor-authentication-faq.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,13 @@ This FAQ answers common questions about Azure Multi-Factor Authentication and us
2323

2424
> [!IMPORTANT]
2525
> As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual.
26+
>
27+
> Consumption-based licensing is no longer available to new customers effective September 1, 2018.
28+
> Effective September 1, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
29+
2630
> [!NOTE]
2731
> The information shared below regarding the Azure Multi-Factor Authentication Server is only applicable for users who already have the MFA server running.
2832
29-
3033
**Q: How does Azure Multi-Factor Authentication Server handle user data?**
3134

3235
With Multi-Factor Authentication Server, user data is stored only on the on-premises servers. No persistent user data is stored in the cloud. When the user performs two-step verification, Multi-Factor Authentication Server sends data to the Azure Multi-Factor Authentication cloud service for authentication. Communication between Multi-Factor Authentication Server and the Multi-Factor Authentication cloud service uses Secure Sockets Layer (SSL) or Transport Layer Security (TLS) over port 443 outbound.

articles/active-directory/cloud-provisioning/how-to-install.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Installing and configuring Azure AD Connect provisioning is accomplished in the
4343
6. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
4444
![Welcome screen](media/how-to-install/install4.png)</br>
4545

46-
7. Once this operation completes you should see a notice **Your was successfully verified.** You can click **Exit**.</br>
46+
7. Once this operation completes you should see a notice **Your agent configuration was successfully verified.** You can click **Exit**.</br>
4747
![Welcome screen](media/how-to-install/install5.png)</br>
4848
8. If you still see the initial splash screen, click **Close**.
4949

articles/active-directory/conditional-access/controls.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ For more information, see [how to require managed devices for cloud app access w
7474

7575
### Hybrid Azure AD joined device
7676

77-
Requiring a Hybrid Azure AD joined device is another option you have to configure device-based Conditional Access policies. This requirement refers to Windows desktops, laptops, and enterprise tablets that are joined to an on-premises Active Directory. If this option is selected, your Conditional Access policy grants access to access attempts made with devices that are joined to your on-premises Active Directory and your Azure Active Directory.
77+
Requiring a hybrid Azure AD joined device is another option you have to configure device-based Conditional Access policies. This requirement refers to Windows desktops, laptops, and enterprise tablets that are joined to an on-premises Active Directory. If this option is selected, your Conditional Access policy grants access to access attempts made with devices that are joined to your on-premises Active Directory and your Azure Active Directory. Mac devices do not support hybrid Azure AD join.
7878

7979
For more information, see [set up Azure Active Directory device-based Conditional Access policies](require-managed-devices.md).
8080

articles/active-directory/conditional-access/howto-conditional-access-policy-compliant-device.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,10 @@ The following steps will help create a Conditional Access policy to require devi
4646
1. Confirm your settings and set **Enable policy** to **On**.
4747
1. Select **Create** to create to enable your policy.
4848

49+
### Known behavior
50+
51+
On Windows 7, iOS, Android, macOS, and some third-party web browsers Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
52+
4953
## Next steps
5054

5155
[Conditional Access common policies](concept-conditional-access-policy-common.md)

0 commit comments

Comments
 (0)