Skip to content

Commit 3c318f6

Browse files
authored
Merge pull request #110002 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 980c3d8 + 2778981 commit 3c318f6

File tree

176 files changed

+1810
-1647
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

176 files changed

+1810
-1647
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29764,6 +29764,26 @@
2976429764
"redirect_url": "/azure/sentinel/fusion",
2976529765
"redirect_document_id": false
2976629766
},
29767+
{
29768+
"source_path": "articles/security-center/security-center-apply-system-updates.md",
29769+
"redirect_url": "/azure/security-center/security-center-virtual-machine-protection",
29770+
"redirect_document_id": false
29771+
},
29772+
{
29773+
"source_path": "articles/security-center/security-center-investigation.md",
29774+
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#security-alerts-investigation",
29775+
"redirect_document_id": false
29776+
},
29777+
{
29778+
"source_path": "articles/security-center/security-center-threat-intel.md",
29779+
"redirect_url": "/azure/security-center/security-center-features-retirement-july2019#menu_securityeventsmap",
29780+
"redirect_document_id": false
29781+
},
29782+
{
29783+
"source_path": "articles/security-center/security-center-apply-disk-encryption.md",
29784+
"redirect_url": "/azure/security-center/security-center-virtual-machine-protection",
29785+
"redirect_document_id": false
29786+
},
2976729787
{
2976829788
"source_path": "articles/security-center/security-center-confidence-score.md",
2976929789
"redirect_url": "/azure/security-center/security-center-intro",

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Microsoft's passwordless authentication methods enable different scenarios. Cons
5656
| **Web app sign-in**: <br> from a mobile or non-windows device | **Yes** | **No** | **No** |
5757
| **Computer sign in**: <br> Non-Windows computer | **No** | **No** | **No** |
5858

59-
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#deciding-a-passwordless-method).
59+
For information on selecting the best method for your organization, see [Deciding a passwordless method](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#choose-a-passwordless-method).
6060

6161
## Prerequisites
6262

@@ -130,7 +130,7 @@ See [Best practices for a pilot](https://aka.ms/deploymentplans) on the deployme
130130

131131
The Microsoft Authenticator app is a free download from Google Play or the Apple App Store. [Learn more about downloading the Microsoft Authenticator app](https://www.microsoft.com/p/microsoft-authenticator/9nblgggzmcj6). Have users download the Microsoft Authenticator app. and follow the directions to enable phone sign in.
132132

133-
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/security/fundamentals/ad-passwordless#user-using-microsoft-authenticator-for-passwordless-sign-in).
133+
It turns any iOS or Android phone into a strong, passwordless credential. Users sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using biometrics or a PIN to confirm. [See details on how the Microsoft Authenticator app works](https://docs.microsoft.com/azure/active-directory/authentication/concept-authentication-passwordless#microsoft-authenticator-app).
134134

135135
![sign in with the Authenticator app](./media/howto-authentication-passwordless-deployment/passwordless-dp-sign-in.png)
136136

articles/active-directory/fundamentals/whats-new.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: active-directory
1212
ms.subservice: fundamentals
1313
ms.workload: identity
1414
ms.topic: conceptual
15-
ms.date: 03/25/2020
15+
ms.date: 04/01/2020
1616
ms.author: mimart
1717
ms.reviewer: dhanyahk
1818
ms.custom: it-pro
@@ -37,6 +37,14 @@ This page is updated monthly, so revisit it regularly. If you're looking for ite
3737

3838
## March 2020
3939

40+
### Unmanaged Azure Active Directory accounts in B2B update for March, 2021
41+
42+
**Type:** Plan for change
43+
**Service category:** B2B
44+
**Product capability:** B2B/B2C
45+
46+
**Beginning on March 31, 2021**, Microsoft will no longer support the redemption of invitations by creating unmanaged Azure Active Directory (Azure AD) accounts and tenants for B2B collaboration scenarios. In preparation for this, we encourage you to opt in to [email one-time passcode authentication](https://docs.microsoft.com/azure/active-directory/b2b/one-time-passcode).
47+
4048
### Users with the default access role will be in scope for provisioning
4149

4250
**Type:** Plan for change

articles/active-directory/governance/entitlement-management-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ These problems are compounded for users who need access from another organizatio
4141
- No one person may not know all of the specific individuals in other organization's directories to be able to invite them
4242
- Even if they were able to invite these users, no one in that organization may remember to manage all of the user's access consistently
4343

44-
Azure AD entitlement management can help address these challenges. To learn more about how customers have been using Azure AD entitlement management, you can read the [Avanade case study](https://aka.ms/AvanadeELMCase) and the [Centrica case study](https://aka.ms/CentricaELMCase). This video provides an overview of entitlement management and its value:
44+
Azure AD entitlement management can help address these challenges. To learn more about how customers have been using Azure AD entitlement management, you can read the [Avanade case study](https://customers.microsoft.com/story/avanade-professional-services-azure-canada) and the [Centrica case study](https://customers.microsoft.com/story/757467-centrica-energy-azure). This video provides an overview of entitlement management and its value:
4545

4646
>[!VIDEO https://www.youtube.com/embed/_Lss6bFrnQ8]
4747

articles/active-directory/saas-apps/box-tutorial.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: tutorial
16-
ms.date: 01/31/2020
16+
ms.date: 03/24/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -87,6 +87,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8787
b. In the **Identifier (Entity ID)** text box, type a URL:
8888
`box.net`
8989

90+
c. In the **Reply URL** text box, type a URL:
91+
`https://sso.services.box.net/sp/ACS.saml2`
92+
9093
> [!NOTE]
9194
> The Sign-on URL value is not real. Update the value with the actual Sign-On URL. Contact [Box Client support team](https://community.box.com/t5/custom/page/page-id/submit_sso_questionaire) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
9295

0 commit comments

Comments
 (0)