Skip to content

Commit 4ce4188

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rollback
2 parents bbc0c57 + c960294 commit 4ce4188

File tree

1,619 files changed

+16139
-11569
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,619 files changed

+16139
-11569
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4391,6 +4391,11 @@
43914391
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43924392
"redirect_document_id": false
43934393
},
4394+
{
4395+
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendations-integrate-third-party-apps.md",
4396+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
4397+
"redirect_document_id": false
4398+
},
43944399
{
43954400
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
43964401
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
@@ -4411,11 +4416,21 @@
44114416
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
44124417
"redirect_document_id": false
44134418
},
4419+
{
4420+
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendation-integrate-third-party-apps.md",
4421+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
4422+
"redirect_document_id": false
4423+
},
44144424
{
44154425
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-reporting-api.md",
44164426
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
44174427
"redirect_document_id": false
44184428
},
4429+
{
4430+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-reports-latencies.md",
4431+
"redirect_url": "/azure/active-directory/reports-monitoring/reference-azure-ad-sla-performance",
4432+
"redirect_document_id": false
4433+
},
44194434
{
44204435
"source_path_from_root": "/articles/active-directory/customize-branding.md",
44214436
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,11 @@
2525
"redirect_url": "/azure/azure-monitor/change/change-analysis",
2626
"redirect_document_id": false
2727
},
28+
{
29+
"source_path_from_root": "/articles/azure-monitor/app/legacy-pricing.md",
30+
"redirect_url": "/azure/azure-monitor/best-practices-cost",
31+
"redirect_document_id": false
32+
},
2833
{
2934
"source_path_from_root": "/articles/azure-monitor/app/snapshot-debugger.md",
3035
"redirect_url": "/azure/azure-monitor/snapshot-debugger/snapshot-debugger",

.openpublishing.redirection.json

Lines changed: 25 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13444,16 +13444,6 @@
1344413444
"redirect_url": "/azure/logic-apps/logic-apps-exception-handling",
1344513445
"redirect_document_id": false
1344613446
},
13447-
{
13448-
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-automated-model.md",
13449-
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
13450-
"redirect_document_id": false
13451-
},
13452-
{
13453-
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-designer-model.md",
13454-
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
13455-
"redirect_document_id": false
13456-
},
1345713447
{
1345813448
"source_path_from_root": "/articles/event-grid/cli-samples.md",
1345913449
"redirect_url": "/azure/event-grid/scripts/event-grid-cli-subscribe-custom-topic",
@@ -14109,6 +14099,26 @@
1410914099
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1411014100
"redirect_document_id": ""
1411114101
},
14102+
{
14103+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-designer-custom-skill.md",
14104+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-designer-custom-skill",
14105+
"redirect_document_id": false
14106+
},
14107+
{
14108+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-custom-skill.md",
14109+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-custom-skill",
14110+
"redirect_document_id": false
14111+
},
14112+
{
14113+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-form.md",
14114+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-form",
14115+
"redirect_document_id": false
14116+
},
14117+
{
14118+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-python.md",
14119+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-python",
14120+
"redirect_document_id": false
14121+
},
1411214122
{
1411314123
"source_path_from_root": "/articles/search/search-get-started-vs-code.md",
1411414124
"redirect_url": "/previous-versions/azure/search/search-get-started-vs-code",
@@ -22671,6 +22681,11 @@
2267122681
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
2267222682
"redirect_document_id": false
2267322683
},
22684+
{
22685+
"source_path": "articles/external-attack-surface-management/data-connections-overview.md",
22686+
"redirect_URL": "/azure/external-attack-surface-management/index",
22687+
"redirect_document_id": true
22688+
},
2267422689
{
2267522690
"source_path": "articles/virtual-network/nat-gateway/tutorial-protect-nat-gateway.md",
2267622691
"redirect_URL": "/azure/virtual-network/nat-gateway/tutorial-protect-nat-gateway-ddos",

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 10/11/2022
12+
ms.date: 02/07/2023
1313
ms.author: godonnell
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit, project-no-code
@@ -67,26 +67,6 @@ To enable sign-in for users with an Azure AD account from a specific Azure AD or
6767
1. Select **Certificates & secrets**, and then select **New client secret**.
6868
1. Enter a **Description** for the secret, select an expiration, and then select **Add**. Record the **Value** of the secret for use in a later step.
6969
70-
### Configuring optional claims
71-
72-
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
73-
74-
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
75-
1. Select the **Directories + subscriptions** icon in the portal toolbar.
76-
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
77-
1. In the Azure portal, search for and select **Azure Active Directory**.
78-
1. In the left menu, under **Manage**, select **App registrations**.
79-
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
80-
1. From the **Manage** section, select **Token configuration**.
81-
1. Select **Add optional claim**.
82-
1. For the **Token type**, select **ID**.
83-
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
85-
86-
## [Optional] Verify your app authenticity
87-
88-
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
89-
9070
::: zone pivot="b2c-user-flow"
9171
9272
## Configure Azure AD as an identity provider
@@ -254,6 +234,26 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
254234

255235
::: zone-end
256236

237+
### [Optional] Configuring optional claims
238+
239+
If you want to get the `family_name` and `given_name` claims from Azure AD, you can configure optional claims for your application in the Azure portal UI or application manifest. For more information, see [How to provide optional claims to your Azure AD app](../active-directory/develop/active-directory-optional-claims.md).
240+
241+
1. Sign in to the [Azure portal](https://portal.azure.com) using your organizational Azure AD tenant. Or if you're already signed in, make sure you're using the directory that contains your organizational Azure AD tenant (for example, Contoso):
242+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
243+
2. On the **Portal settings | Directories + subscriptions** page, find your Azure AD directory in the **Directory name** list, and then select **Switch**.
244+
1. In the Azure portal, search for and select **Azure Active Directory**.
245+
1. In the left menu, under **Manage**, select **App registrations**.
246+
1. Select the application you want to configure optional claims for in the list, such as `Azure AD B2C App`.
247+
1. From the **Manage** section, select **Token configuration**.
248+
1. Select **Add optional claim**.
249+
1. For the **Token type**, select **ID**.
250+
1. Select the optional claims to add, `family_name` and `given_name`.
251+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
252+
253+
## [Optional] Verify your app authenticity
254+
255+
[Publisher verification](../active-directory/develop/publisher-verification-overview.md) helps your users understand the authenticity of the app you [registered](#register-an-azure-ad-app). A verified app means that the publisher of the app has [verified](/partner-center/verification-responses) their identity using their Microsoft Partner Network (MPN). Learn how to [mark your app as publisher verified](../active-directory/develop/mark-app-as-publisher-verified.md).
256+
257257
## Next steps
258258

259259
Learn how to [pass the Azure AD token to your application](idp-pass-through-user-flow.md).

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5353
1. Select **Save Changes**.
5454
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
56-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
56+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-id/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.
5858
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5959

@@ -135,4 +135,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
135135
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136136
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137137

138-
::: zone-end
138+
::: zone-end

articles/active-directory-b2c/page-layout.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,35 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5959

6060
## Self-asserted page (selfasserted)
6161

62+
**2.1.20**
63+
- Fixed an XSS issue on input from textbox
64+
65+
**2.1.19**
66+
- Fixed accessibility bugs
67+
- Handle Undefined Error message for existing user sign up
68+
- Move Password Mismatch Error to Inline instead of Page Level
69+
- Accessibility changes related to High Contrast button display and anchor focus improvements
70+
71+
**2.1.18**
72+
- Add asterisk for required fields
73+
- TOTP Store Icons position fixes for Classic Template
74+
- Activate input items only when verification code is verified
75+
- Add Alt Text for Background Image
76+
- Added customization for server errors by TOTP verification
77+
78+
**2.1.17**
79+
- Add descriptive error message and fixed forgotPassword link
80+
- Make checkbox as group
81+
- Enforce Validation Error Update on control change and enable continue on email verified
82+
- Added additional field to error code to validation failure response
83+
84+
**2.1.16**
85+
- Fixed "Claims for verification control have not been verified" bug while verifying code.
86+
- Hide error message on validation succeeds and send code to verify
87+
88+
**2.1.15**
89+
- Fixed QR code generation bug due to QR text length
90+
6291
**2.1.14**
6392
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
6493

@@ -158,6 +187,12 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
158187
> [!TIP]
159188
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
160189
190+
**2.1.9**
191+
- Fix accessibility bugs
192+
- Accessibility changes related to High Contrast button display and anchor focus improvements
193+
194+
**2.1.8**
195+
- Add descriptive error message and fixed forgotPassword link!
161196

162197
**2.1.7**
163198

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,9 +120,15 @@ sections:
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122122
- question: |
123-
Why can't single-factor certificates be used to complete MFA?
123+
Why does not proof up for registering other auth methods come up when I use single factor certificates?
124124
answer: |
125-
There's no support for a second factor when the first factor is a single-factor certificate. We're working to add support for second factors.
125+
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
126+
127+
- question: |
128+
How can I use single-factor certificates to complete MFA?
129+
answer: |
130+
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
131+
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
126132
127133
- question: |
128134
Will the changes to the Authentication methods policy take effect immediately?

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To work properly, phone numbers must be in the format *+CountryCode PhoneNumber*
3030
> [!NOTE]
3131
> There needs to be a space between the country/region code and the phone number.
3232
>
33-
> Password reset doesn't support phone extensions. Even in the *+1 4251234567X12345* format, extensions are removed before the call is placed.
33+
> Password reset and Azure AD Multi-Factor Authentication don't support phone extensions. Even in the *+1 4251234567X12345* format, extensions are removed before the call is placed.
3434
3535
## Mobile phone verification
3636

articles/active-directory/authentication/concept-certificate-based-authentication-migration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ To configure Staged Rollout, follow these steps:
3939

4040
For more information, see [Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
4141

42+
>[!NOTE]
43+
> When Staged rollout is enabled for a user, the user is considered a managed user and all authentication will happen at Azure AD. For a federated Tenant, if CBA is enabled on Staged Rollout, password authentication only works if PHS is enabled too otherwise password authentication will fail.
44+
4245
## Use Azure AD connect to update certificateUserIds attribute
4346

4447
An AD FS admin can use **Synchronization Rules Editor** to create rules to sync the values of attributes from AD FS to Azure AD user objects. For more information, see [Sync rules for certificateUserIds](concept-certificate-based-authentication-certificateuserids.md#update-certificate-user-ids-using-azure-ad-connect).

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,9 +72,12 @@ Now we'll walk through each step:
7272
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7373
1. If the user sign-in is successful, the user can access the application.
7474

75-
## Single-factor certificate-based authentication
75+
## MFA with Single-factor certificate-based authentication
7676

77-
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
77+
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to have another way to get MFA and register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
78+
79+
>[!IMPORTANT]
80+
>A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods. More info on [Azure AD MFA](../authentication/concept-mfa-howitworks.md)
7881
7982
**Steps to set up passwordless phone signin(PSI) with CBA**
8083

0 commit comments

Comments
 (0)