Skip to content

Commit 41d7c08

Browse files
authored
Merge pull request #190628 from MicrosoftDocs/main
3/04 AM Publish
2 parents 9e4760f + 3300fd0 commit 41d7c08

File tree

86 files changed

+1552
-998
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+1552
-998
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3483,7 +3483,7 @@
34833483
{
34843484
"source_path_from_root": "/articles/active-directory/active-directory-windows-enterprise-state-roaming-enable.md",
34853485
"redirect_url": "/azure/active-directory/devices/enterprise-state-roaming-enable",
3486-
"redirect_document_id": true
3486+
"redirect_document_id": false
34873487
},
34883488
{
34893489
"source_path_from_root": "/articles/active-directory/active-directory-windows-enterprise-state-roaming-faqs.md",
@@ -3498,7 +3498,7 @@
34983498
{
34993499
"source_path_from_root": "/articles/active-directory/active-directory-windows-enterprise-state-roaming-overview.md",
35003500
"redirect_url": "/azure/active-directory/devices/enterprise-state-roaming-overview",
3501-
"redirect_document_id": true
3501+
"redirect_document_id": false
35023502
},
35033503
{
35043504
"source_path_from_root": "/articles/active-directory/active-directory-windows-enterprise-state-roaming-troubleshooting.md",
@@ -3510,6 +3510,11 @@
35103510
"redirect_url": "/azure/active-directory/devices/enterprise-state-roaming-windows-settings-reference",
35113511
"redirect_document_id": true
35123512
},
3513+
{
3514+
"source_path_from_root": "/articles/active-directory/devices/enterprise-state-roaming-overview.md",
3515+
"redirect_url": "/azure/active-directory/devices/enterprise-state-roaming-enable",
3516+
"redirect_document_id": true
3517+
},
35133518
{
35143519
"source_path_from_root": "/articles/active-directory/device-management-faq.md",
35153520
"redirect_url": "/azure/active-directory/devices/faq",

.openpublishing.redirection.json

Lines changed: 5 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -32789,6 +32789,11 @@
3278932789
"redirect_url": "tutorial-app-containerization-java-kubernetes",
3279032790
"redirect_document_id": false
3279132791
},
32792+
{
32793+
"source_path_from_root": "/articles/migrate/migrate-appliance-architecture.md",
32794+
"redirect_url": "discovered-metadata",
32795+
"redirect_document_id": false
32796+
},
3279232797
{
3279332798
"source_path_from_root": "/articles/storage/common/storage-access-blobs-queues-portal.md",
3279432799
"redirect_url": "articles/storage/blobs/authorize-blob-access-portal",
@@ -43928,25 +43933,6 @@
4392843933
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-group-policy.md",
4392943934
"redirect_url": "/azure/governance/policy/how-to/guest-configuration-create",
4393043935
"redirect_document_id": false
43931-
},
43932-
{ "source_path_from_root": "/articles/azure/marketplace/co-sell-requirements.md",
43933-
"redirect_url": "/partner-center/co-sell-requirements",
43934-
"redirect_document_id": false
43935-
},
43936-
{
43937-
"source_path_from_root": "/articles/azure/marketplace/co-sell-status.md",
43938-
"redirect_url": "/partner-center/co-sell-status",
43939-
"redirect_document_id": false
43940-
},
43941-
{
43942-
"source_path_from_root": "/articles/azure/marketplace/co-sell-configure.md",
43943-
"redirect_url": "/partner-center/co-sell-configure",
43944-
"redirect_document_id": false
43945-
},
43946-
{
43947-
"source_path_from_root": "/articles/azure/marketplace/co-sell-overview.md",
43948-
"redirect_url": "/partner-center/co-sell-overview",
43949-
"redirect_document_id": false
4395043936
}
4395143937
]
4395243938
}

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,8 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration.
24-
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the separate legacy registration workflows for MFA and SSPR.
24+
>
25+
> After Sept. 30th, 2022, all users will register security information through the combined registration experience.
2526
2627
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
2728

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ A major step in every multifactor authentication deployment is getting users reg
158158

159159
> [!NOTE]
160160
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
161-
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
161+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration.
162162
163163
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
164164

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,8 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
24-
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the separate legacy registration workflows for MFA and SSPR.
24+
>
25+
> After Sept. 30th, 2022, all users will register security information through the combined registration experience.
2526
2627
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
2728

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Before deploying SSPR, you may opt to determine the number and the average cost
112112

113113
> [!NOTE]
114114
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
115-
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
115+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration.
116116
117117
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
118118

Loading

articles/active-directory/develop/includes/desktop-app/quickstart-windows-desktop.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Quickstart: Sign in users and call Microsoft Graph in a Windows desktop app | Azure"
3-
description: In this quickstart, learn how a Windows desktop .NET (XAML) application can get an access token and call an API protected by the Microsoft identity platform.
3+
description: Learn how a Windows Presentation Foundation (WPF) application can get an access token and call an API protected by the Microsoft identity platform.
44
services: active-directory
55
author: jmprieur
66
manager: CelesteDG
@@ -79,6 +79,13 @@ Where:
7979

8080
To find the values of **Directory (tenant) ID** and **Supported account types**, go to the app's **Overview** page in the Azure portal.
8181

82+
#### Step 4: Run the application
83+
84+
To build and run the sample application in Visual Studio, select the **Debug menu** > **Start Debugging**, or press the F5 key. Your application's MainWindow is displayed.
85+
86+
When the app's main window appears, select the Call Microsoft Graph API button. You'll be prompted to sign in using your Azure Active Directory account (work or school account) or Microsoft account (live.com, outlook.com) credentials.
87+
88+
If you're running the application for the first time, you'll be prompted to provide consent to allow the application to access your user profile and sign you in. After consenting to the requested permissions, the application displays that you've successfully logged in. You should see some basic token information and user data obtained from the call to the Microsoft Graph API.
8289

8390
## More information
8491

articles/active-directory/devices/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,6 @@
7272
href: faq.yml
7373
- name: Enterprise state roaming
7474
items:
75-
- name: What is enterprise state roaming?
76-
href: enterprise-state-roaming-overview.md
7775
- name: Enable enterprise state roaming
7876
href: enterprise-state-roaming-enable.md
7977
- name: Enable enterprise state FAQs

articles/active-directory/devices/concept-azure-ad-register.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,3 +60,4 @@ Another user wants to access their organizational email on their personal Androi
6060

6161
- [Manage device identities using the Azure portal](device-management-azure-portal.md)
6262
- [Manage stale devices in Azure AD](manage-stale-devices.md)
63+
- [Register your personal device on your work or school network](https://support.microsoft.com/account-billing/register-your-personal-device-on-your-work-or-school-network-8803dd61-a613-45e3-ae6c-bd1ab25bf8a8)

0 commit comments

Comments
 (0)