Skip to content

Commit 419c8c8

Browse files
authored
Merge pull request #134368 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents dbe434f + 743df36 commit 419c8c8

File tree

177 files changed

+2691
-1457
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

177 files changed

+2691
-1457
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54193,6 +54193,16 @@
5419354193
"redirect_url": "/azure/active-directory/develop/microsoft-graph-intro",
5419454194
"redirect_document_id": false
5419554195
},
54196+
{
54197+
"source_path": "articles/azure-sql/virtual-machines/windows/hadr-distributed-network-name-dnn-configure.md",
54198+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/failover-cluster-instance-distributed-network-name-dnn-configure",
54199+
"redirect_document_id": true
54200+
},
54201+
{
54202+
"source_path": "articles/azure-sql/virtual-machines/windows/hadr-vnn-azure-load-balancer-configure.md",
54203+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-vnn-azure-load-balancer-configure",
54204+
"redirect_document_id": true
54205+
},
5419654206
{
5419754207
"source_path": "articles/jenkins/container-instances-jenkins.md",
5419854208
"redirect_url": "/azure/developer/jenkins/azure-container-instances-as-jenkins-build-agent",

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/02/2020
9+
ms.date: 10/05/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -35,7 +35,7 @@ For Azure Multi-Factor Authentication or SSPR, users can choose to receive a tex
3535

3636
If users don't want their mobile phone number to be visible in the directory but want to use it for password reset, administrators shouldn't populate the phone number in the directory. Instead, users should populate their **Authentication Phone** attribute via the combined security info registration at [https://aka.ms/setupsecurityinfo](https://aka.ms/setupsecurityinfo). Administrators can see this information in the user's profile, but it's not published elsewhere.
3737

38-
![Screenshot of the Azure portal that shows authentication methods with a phone number populated](media/concept-authentication-methods/user-authentication-methods.png)
38+
:::image type="content" source="media/concept-authentication-methods/user-authentication-methods.png" alt-text="Screenshot of the Azure portal that shows authentication methods with a phone number populated":::
3939

4040
Microsoft doesn't guarantee consistent SMS or voice-based Azure Multi-Factor Authentication prompt delivery by the same number. In the interest of our users, we may add or remove short codes at any time as we make route adjustments to improve SMS deliverability. Microsoft doesn't support short codes for countries / regions besides the United States and Canada.
4141

articles/active-directory/authentication/howto-authentication-sms-signin.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/26/2020
9+
ms.date: 10/05/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -94,13 +94,17 @@ When a phone number is set for SMS-sign, it's also then available for use with [
9494
1. Search for and select **Azure Active Directory**.
9595
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Users**.
9696
1. Select the user you enabled for SMS-based authentication in the previous section, such as *Contoso User*, then select **Authentication methods**.
97-
1. Enter the user's phone number, including the country code, such as *+1 xxxxxxxxx*. The Azure portal validates the phone number is in the correct format.
97+
1. Select **+ Add authentication method**, then in the *Choose method* drop-down menu, choose **Phone number**.
9898

99-
![Set a phone number for a user in the Azure portal to use with SMS-based authentication](./media/howto-authentication-sms-signin/set-user-phone-number.png)
99+
Enter the user's phone number, including the country code, such as *+1 xxxxxxxxx*. The Azure portal validates the phone number is in the correct format.
100+
101+
Then, from the *Phone type* drop-down menu, select *Mobile*, *Alternate mobile*, or *Other* as needed.
102+
103+
:::image type="content" source="media/howto-authentication-sms-signin/set-user-phone-number.png" alt-text="Set a phone number for a user in the Azure portal to use with SMS-based authentication":::
100104

101105
The phone number must be unique in your tenant. If you try to use the same phone number for multiple users, an error message is shown.
102106

103-
1. To apply the phone number to a user's account, select **Save**.
107+
1. To apply the phone number to a user's account, select **Add**.
104108

105109
When successfully provisioned, a check mark appears for *SMS Sign-in enabled*.
106110

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/20/2020
9+
ms.date: 10/05/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -33,8 +33,8 @@ If you're assigned the *Authentication Administrator* role, you can require user
3333
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
3434
3535
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
36-
37-
![Manage authentication methods from the Azure portal](./media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png)
36+
37+
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::
3838

3939
## Delete users existing app passwords
4040

articles/active-directory/authentication/howto-sspr-authenticationdata.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/17/2020
9+
ms.date: 10/05/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -45,16 +45,14 @@ After a user verifies their mobile phone number, the *Phone* field under **Authe
4545

4646
## Authentication contact info
4747

48-
On the **Authentication methods** page for an Azure AD user in the Azure portal, a Global Administrator can manually set the authentication contact information, as shown in the following example screenshot:
48+
On the **Authentication methods** page for an Azure AD user in the Azure portal, a Global Administrator can manually set the authentication contact information. You can review existing methods under the *Usable authentication methods* section, or **+Add authentication methods**, as shown in the following example screenshot:
4949

50-
![Authentication contact info on a user in Azure AD][Contact]
50+
:::image type="content" source="media/howto-sspr-authenticationdata/user-authentication-contact-info.png" alt-text="Manage authentication methods from the Azure portal":::
5151

5252
The following considerations apply for this authentication contact info:
5353

5454
* If the *Phone* field is populated and *Mobile phone* is enabled in the SSPR policy, the user sees that number on the password reset registration page and during the password reset workflow.
55-
* The *Alternate phone* field isn't used for password reset.
5655
* If the *Email* field is populated and *Email* is enabled in the SSPR policy, the user sees that email on the password reset registration page and during the password reset workflow.
57-
* If the *Alternate email* field is populated and *Email* is enabled in the SSPR policy, the user won't see that email on the password reset registration page, but they see it during the password reset workflow.
5856

5957
## Security questions and answers
6058

@@ -166,5 +164,3 @@ Once authentication contact information is pre-populated for users, complete the
166164

167165
> [!div class="nextstepaction"]
168166
> [Enable Azure AD self-service password reset](tutorial-enable-sspr.md)
169-
170-
[Contact]: ./media/howto-sspr-authenticationdata/user-authentication-contact-info.png "Global administrators can modify a user's authentication contact info"
65.6 KB
Loading
52.9 KB
Loading
Loading
44.9 KB
Loading

articles/aks/availability-zones.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ You need the Azure CLI version 2.0.76 or later installed and configured. Run `a
2525
AKS clusters can currently be created using availability zones in the following regions:
2626

2727
* Australia East
28+
* Canada Central
2829
* Central US
2930
* East US 2
3031
* East US

0 commit comments

Comments
 (0)