Skip to content

Commit 479ba2e

Browse files
Merge pull request #204195 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 5034484 + 6222563 commit 479ba2e

File tree

6 files changed

+18
-15
lines changed

6 files changed

+18
-15
lines changed

articles/active-directory-b2c/supported-azure-ad-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ An Azure AD B2C tenant is different than an Azure Active Directory tenant, which
2323
| [Inviting External Identities guests](../active-directory//external-identities/add-users-administrator.md)| You can invite guest users and configure External Identities features such as federation and sign-in with Facebook and Google accounts. | You can invite only a Microsoft account or an Azure AD user as a guest to your Azure AD tenant for accessing applications or managing tenants. For [consumer accounts](user-overview.md#consumer-user), you use Azure AD B2C user flows and custom policies to manage users and sign-up or sign-in with external identity providers, such as Google or Facebook. |
2424
| [Roles and administrators](../active-directory/fundamentals/active-directory-users-assign-role-azure-portal.md)| Fully supported for administrative and user accounts. | Roles are not supported with [consumer accounts](user-overview.md#consumer-user). Consumer accounts don't have access to any Azure resources.|
2525
| [Custom domain names](../active-directory/fundamentals/add-custom-domain.md) | You can use Azure AD custom domains for administrative accounts only. | [Consumer accounts](user-overview.md#consumer-user) can sign in with a username, phone number, or any email address. You can use [custom domains](custom-domain.md) in your redirect URLs.|
26-
| [Conditional Access](../active-directory/conditional-access/overview.md) | Fully supported for administrative and user accounts. | A subset of Azure AD Conditional Access features is supported with [consumer accounts](user-overview.md#consumer-user) Lean how to configure Azure AD B2C [conditional access](conditional-access-user-flow.md).|
26+
| [Conditional Access](../active-directory/conditional-access/overview.md) | Fully supported for administrative and user accounts. | A subset of Azure AD Conditional Access features is supported with [consumer accounts](user-overview.md#consumer-user) Learn how to configure Azure AD B2C [conditional access](conditional-access-user-flow.md).|
2727
| [Premium P1](https://azure.microsoft.com/pricing/details/active-directory) | Fully supported for Azure AD premium P1 features. For example, [Password Protection](../active-directory/authentication/concept-password-ban-bad.md), [Hybrid Identities](../active-directory/hybrid/whatis-hybrid-identity.md), [Conditional Access](../active-directory/roles/permissions-reference.md#), [Dynamic groups](../active-directory/enterprise-users/groups-create-rule.md), and more. | Azure AD B2C uses [Azure AD B2C Premium P1 license](https://azure.microsoft.com/pricing/details/active-directory/external-identities/), which is different from Azure AD premium P1. A subset of Azure AD Conditional Access features is supported with [consumer accounts](user-overview.md#consumer-user). Learn how to configure Azure AD B2C [Conditional Access](conditional-access-user-flow.md).|
2828
| [Premium P2](https://azure.microsoft.com/pricing/details/active-directory/) | Fully supported for Azure AD premium P2 features. For example, [Identity Protection](../active-directory/identity-protection/overview-identity-protection.md), and [Identity Governance](../active-directory/governance/identity-governance-overview.md). | Azure AD B2C uses [Azure AD B2C Premium P2 license](https://azure.microsoft.com/pricing/details/active-directory/external-identities/), which is different from Azure AD premium P2. A subset of Azure AD Identity Protection features is supported with [consumer accounts](user-overview.md#consumer-user). Learn how to [Investigate risk with Identity Protection](identity-protection-investigate-risk.md) and configure Azure AD B2C [Conditional Access](conditional-access-user-flow.md). |
2929
|[Data retention policy](../active-directory/reports-monitoring/reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data)|Data retention period for both audit and sign in logs depend on your subscription. Learn more about [How long Azure AD store reporting data](../active-directory/reports-monitoring/reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data).|Sign in and audit logs are only retained for **seven (7) days**. If you require a longer retention period, use the [Azure monitor](azure-monitor.md).|

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,9 @@ You can configure organization-specific settings by adding an organization and m
5050

5151
- For B2B collaboration with other Azure AD organizations, use cross-tenant access settings to manage inbound and outbound B2B collaboration and scope access to specific users, groups, and applications. You can set a default configuration that applies to all external organizations, and then create individual, organization-specific settings as needed. Using cross-tenant access settings, you can also trust multi-factor (MFA) and device claims (compliant claims and hybrid Azure AD joined claims) from other Azure AD organizations.
5252

53+
> [!TIP]
54+
>If you intend to trust inbound MFA for external users, make sure you don't have an [Identity Protection policy](../identity-protection/howto-identity-protection-configure-mfa-policy.md) in place that requires external users to register for MFA. When both of these policies are present, external users won’t be able to satisfy the requirements for access. If you want to enforce the Identity Protection MFA registration policy, be sure to exclude external users.
55+
5356
- For B2B direct connect, use organizational settings to set up a mutual trust relationship with another Azure AD organization. Both your organization and the external organization need to mutually enable B2B direct connect by configuring inbound and outbound cross-tenant access settings.
5457

5558
- You can use external collaboration settings to limit who can invite external users, allow or block B2B specific domains, and set restrictions on guest user access to your directory.

articles/azure-fluid-relay/how-tos/azure-function-token-provider.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ fluid.url: https://fluidframework.com/docs/build/tokenproviders/
1515
> [!NOTE]
1616
> This preview version is provided without a service-level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
1717
18-
In the [Fluid Framework](https://fluidframework.com/), TokenProviders are responsible for creating and signing tokens that the `@fluidframework/azure-client` uses to make requests to the Azure Fluid Relay service. The Fluid Framework provides a simple, insecure TokenProvider for development purposes, aptly named **InsecureTokenProvider**. Each Fluid service must implement a custom TokenProvider based on the particulars service's authentication and security considerations.
18+
In the [Fluid Framework](https://fluidframework.com/), TokenProviders are responsible for creating and signing tokens that the `@fluidframework/azure-client` uses to make requests to the Azure Fluid Relay service. The Fluid Framework provides a simple, insecure TokenProvider for development purposes, aptly named **InsecureTokenProvider**. Each Fluid service must implement a custom TokenProvider based on the particular service's authentication and security considerations.
1919

2020
Each Azure Fluid Relay resource you create is assigned a **tenant ID** and its own unique **tenant secret key**. The secret key is a **shared secret**. Your app/service knows it, and the Azure Fluid Relay service knows it. TokenProviders must know the secret key to sign requests, but the secret key cannot be included in client code.
2121

articles/azure-fluid-relay/how-tos/deploy-fluid-static-web-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ If you don't have an Azure subscription, [create a free trial account](https://a
2626

2727
## Connect to Azure Fluid Relay
2828

29-
You can connect to Azure Fluid Relay by providing the tenant ID and key that is uniquely generated for you when creating the Azure resource. You can build your own token provider implementation or you can use the two token provider implementations that the Fluid Framework provides: **InsecureTokenProvider** and **AzureFunctionTokenProvider**.
29+
You can connect to Azure Fluid Relay by providing the tenant ID and key that is uniquely generated for you when creating the Azure resource. You can build your own token provider implementation or you can use the two token provider implementations that the Fluid Framework provides: [InsecureTokenProvider](https://fluidframework.com/docs/apis/test-client-utils/insecuretokenprovider) and [AzureFunctionTokenProvider](https://fluidframework.com/docs/apis/azure-client/azurefunctiontokenprovider).
3030

3131
To learn more about using InsecureTokenProvider for local development, see [Connecting to the service](connect-fluid-azure-service.md#connecting-to-the-service) and [Authentication and authorization in your app](../concepts/authentication-authorization.md#the-token-provider).
3232

articles/cosmos-db/hierarchical-partition-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -363,9 +363,9 @@ For example, assume we have a hierarchical partition key composed of **TenantId
363363
```bicep
364364
partitionKey: {
365365
paths: [
366-
'TenantId',
367-
'UserId',
368-
'SessionId'
366+
'/TenantId',
367+
'/UserId',
368+
'/SessionId'
369369
]
370370
kind: 'MultiHash'
371371
version: 2
@@ -377,9 +377,9 @@ partitionKey: {
377377
```json
378378
"partitionKey": {
379379
"paths": [
380-
"TenantId",
381-
"UserId",
382-
"SessionId"
380+
"/TenantId",
381+
"/UserId",
382+
"/SessionId"
383383
],
384384
"kind": "MultiHash",
385385
"version": 2

articles/virtual-machines/trusted-launch-portal.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ az vm update \
9595
In order to provision a VM with Trusted Launch, it first needs to be enabled with the `TrustedLaunch` using the `Set-AzVmSecurityProfile` cmdlet. Then you can use the Set-AzVmUefi cmdlet to set the vTPM and SecureBoot configuration. Use the below snippet as a quick start, remember to replace the values in this example with your own.
9696

9797
```azurepowershell-interactive
98-
$resourceGroup = "myResourceGroup"
98+
$rgName = "myResourceGroup"
9999
$location = "West US"
100100
$vmName = "myTrustedVM"
101101
$vmSize = Standard_B2s
@@ -135,7 +135,7 @@ $vm = Set-AzVmUefi -VM $vm `
135135
-EnableVtpm $true `
136136
-EnableSecureBoot $true
137137
138-
New-AzVM -ResourceGroupName $resourceGroup -Location $location -VM $vm
138+
New-AzVM -ResourceGroupName $rgName -Location $location -VM $vm
139139
```
140140

141141

@@ -288,13 +288,13 @@ $subnetConfig = New-AzVirtualNetworkSubnetConfig `
288288
-Name mySubnet `
289289
-AddressPrefix 192.168.1.0/24
290290
$vnet = New-AzVirtualNetwork `
291-
-ResourceGroupName $resourceGroup `
291+
-ResourceGroupName $rgName `
292292
-Location $location `
293293
-Name MYvNET `
294294
-AddressPrefix 192.168.0.0/16 `
295295
-Subnet $subnetConfig
296296
$pip = New-AzPublicIpAddress `
297-
-ResourceGroupName $resourceGroup `
297+
-ResourceGroupName $rgName `
298298
-Location $location `
299299
-Name "mypublicdns$(Get-Random)" `
300300
-AllocationMethod Static `
@@ -310,13 +310,13 @@ $nsgRuleRDP = New-AzNetworkSecurityRuleConfig `
310310
-DestinationPortRange 3389 `
311311
-Access Deny
312312
$nsg = New-AzNetworkSecurityGroup `
313-
-ResourceGroupName $resourceGroup `
313+
-ResourceGroupName $rgName `
314314
-Location $location `
315315
-Name myNetworkSecurityGroup `
316316
-SecurityRules $nsgRuleRDP
317317
$nic = New-AzNetworkInterface `
318318
-Name myNic `
319-
-ResourceGroupName $resourceGroup `
319+
-ResourceGroupName $rgName `
320320
-Location $location `
321321
-SubnetId $vnet.Subnets[0].Id `
322322
-PublicIpAddressId $pip.Id `

0 commit comments

Comments
 (0)