Skip to content

Commit 4cf5a71

Browse files
authored
Merge branch 'MicrosoftDocs:main' into cosmos-nosql-howto-geospatial
2 parents 91a5f0d + 932bc58 commit 4cf5a71

File tree

109 files changed

+4139
-1548
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+4139
-1548
lines changed

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 06/05/2023
4+
ms.date: 08/01/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 05/09/2023
14+
ms.date: 08/01/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Azure Active Directory (AD) Domain Services
1717
summary: This page answers frequently asked questions about Azure Active Directory Domain Services.
@@ -159,6 +159,10 @@ sections:
159159
Why do my domain controllers change names?
160160
answer: |
161161
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
162+
- question: |
163+
Is the password of the KRBTGT account in a managed domain rolled periodically? If so, what is the frequency?
164+
answer: |
165+
The password of the KRBTGT account in a managed domain is rolled over every seven (7) days.
162166
163167
- name: Billing and availability
164168
questions:

articles/active-directory-domain-services/join-windows-vm-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.custom: devx-track-arm-template
1313
ms.topic: how-to
14-
ms.date: 01/29/2023
14+
ms.date: 08/01/2023
1515
ms.author: justinha
1616
---
1717

@@ -31,7 +31,7 @@ To complete this tutorial, you need the following resources and privileges:
3131
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3232
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
3333
* If needed, the first tutorial [creates and configures an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
34-
* A user account that's a part of the managed domain.
34+
* A user account that's a part of the *AAD DC administrators* group.
3535

3636
## Azure Resource Manager template overview
3737

articles/active-directory-domain-services/network-considerations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 07/31/2023
12+
ms.date: 08/01/2023
1313
ms.author: justinha
1414
ms.reviewer: xyuan
1515

@@ -149,7 +149,7 @@ If needed, you can [create the required network security group and rules using A
149149
150150
### Outbound connectivity
151151

152-
For Outbound connectivity, you can either keep **AllowVnetOutbound** and **AllowInternetOutBound** or restrict Outbound traffic by using ServiceTags listed in the following table. The ServiceTag for AzureUpdateDelivery must be added via [PowerShell](powershell-create-instance.md).
152+
For Outbound connectivity, you can either keep **AllowVnetOutbound** and **AllowInternetOutBound** or restrict Outbound traffic by using ServiceTags listed in the following table. The ServiceTag for AzureUpdateDelivery must be added via [PowerShell](powershell-create-instance.md). Make sure no other NSG with higher priority denies the Outbound connectivity. If Outbound connectivity is denied, replication won't work between replica sets.
153153

154154

155155
| Outbound port number | Protocol | Source | Destination | Action | Required | Purpose |

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 07/31/2023
11+
ms.date: 08/01/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -67,7 +67,7 @@ When you create a managed domain, you specify a DNS name. There are some conside
6767
* **Non-routable domain suffixes:** We generally recommend that you avoid a non-routable domain name suffix, such as *contoso.local*. The *.local* suffix isn't routable and can cause issues with DNS resolution.
6868

6969
> [!TIP]
70-
> If you create a custom domain name, take care with existing DNS namespaces. It's recommended to use a domain name separate from any existing Azure or on-premises DNS name space.
70+
> If you create a custom domain name, take care with existing DNS namespaces. Although it's supported, you may want to use a domain name separate from any existing Azure or on-premises DNS namespace.
7171
>
7272
> For example, if you have an existing DNS name space of *contoso.com*, create a managed domain with the custom domain name of *aaddscontoso.com*. If you need to use secure LDAP, you must register and own this custom domain name to generate the required certificates.
7373
>

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,7 @@ The values stored in **certificateUserIds** should be in the format described in
3535

3636
## Roles to update certificateUserIds
3737

38-
For cloud-only users, only users with roles **Global Administrators**, **Privileged Authentication Administrator** can write into certificateUserIds.
39-
For synched users, AD users with role **Hybrid Identity Administrator** can write into the attribute.
38+
For cloud-only users, only users with roles **Global Administrators**, **Privileged Authentication Administrator** can write into certificateUserIds. Cloud-only users can use both UX and MSGraph to write into certificateUserIds. For synched users, AD users with role **Hybrid Identity Administrator** can write into the attribute. Only Azure ADConnect can be used to update CertificateUserIds by syncing the value from on-prem for synched users.
4039

4140
>[!NOTE]
4241
>Active Directory Administrators (including accounts with delegated administrative privilege over synched user accounts as well as administrative rights over the Azure >AD Connect Servers) can make changes that impact the certificateUserIds value in Azure AD for any synched accounts.

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,14 +37,14 @@ The following table details the different ways to get Azure AD Multi-Factor Auth
3737

3838
## Feature comparison based on licenses
3939

40-
The following table provides a list of the features that are available in the various versions of Azure AD for Multi-Factor Authentication. Plan out your needs for securing user authentication, then determine which approach meets those requirements. For example, although Azure AD Free provides security defaults that provide Azure AD Multi-Factor Authentication, only the mobile authenticator app can be used for the authentication prompt, including SMS and phone calls. This approach may be a limitation if you can't ensure the mobile authentication app is installed on a user's personal device. See [Azure AD Free tier](#azure-ad-free-tier) later in this topic for more details.
40+
The following table provides a list of the features that are available in the various versions of Azure AD for Multi-Factor Authentication. Plan out your needs for securing user authentication, then determine which approach meets those requirements. For example, although Azure AD Free provides security defaults that provide Azure AD Multi-Factor Authentication where only the mobile authenticator app can be used for the authentication prompt. This approach may be a limitation if you can't ensure the mobile authentication app is installed on a user's personal device. See [Azure AD Free tier](#azure-ad-free-tier) later in this topic for more details.
4141

4242
| Feature | Azure AD Free - Security defaults (enabled for all users) | Azure AD Free - Global Administrators only | Office 365 | Azure AD Premium P1 | Azure AD Premium P2 |
4343
| --- |:---:|:---:|:---:|:---:|:---:|
4444
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) ||||
4545
| Mobile app as a second factor ||||||
46-
| Phone call as a second factor | | ||||
47-
| SMS as a second factor | |||||
46+
| Phone call as a second factor | | ||||
47+
| SMS as a second factor | |||||
4848
| Admin control over verification methods | |||||
4949
| Fraud alert | | | |||
5050
| MFA Reports | | | |||
@@ -93,7 +93,7 @@ After you have purchased the required Azure AD tier, [plan and deploy Azure AD M
9393

9494
### Azure AD Free tier
9595

96-
All users in an Azure AD Free tenant can use Azure AD Multi-Factor Authentication by using security defaults. The mobile authentication app and SMS methods can be used for Azure AD Multi-Factor Authentication when using Azure AD Free security defaults.
96+
All users in an Azure AD Free tenant can use Azure AD Multi-Factor Authentication by using security defaults. The mobile authentication app can be used for Azure AD Multi-Factor Authentication when using Azure AD Free security defaults.
9797

9898
* [Learn more about Azure AD security defaults](../fundamentals/concept-fundamentals-security-defaults.md)
9999
* [Enable security defaults for users in Azure AD Free](../fundamentals/concept-fundamentals-security-defaults.md#enabling-security-defaults)

articles/active-directory/develop/whats-new-docs.md

Lines changed: 15 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: henrymbuguakiarie
66
manager: CelesteDG
77

8-
ms.date: 07/03/2023
8+
ms.date: 08/01/2023
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: reference
@@ -18,6 +18,20 @@ ms.custom: has-adal-ref
1818

1919
Welcome to what's new in the Microsoft identity platform documentation. This article lists new docs that have been added and those that have had significant updates in the last three months.
2020

21+
## July 2023
22+
23+
### New articles
24+
25+
- [Deploy a web app in a pipeline and configure App Service authentication](deploy-web-app-authentication-pipeline.md) - Deploy a webapp and configure auth in a pipeline
26+
27+
### Updated articles
28+
29+
- [Access tokens in the Microsoft identity platform](access-tokens.md) - Improve the explanations on how to validate a token
30+
- [Claims mapping policy type](reference-claims-mapping-policy-type.md) - Updates to Restricted Claims Set
31+
- [Migrate confidential client applications from ADAL.NET to MSAL.NET](msal-net-migration-confidential-client.md) - Improving clarity in the content
32+
- [Single sign-on with MSAL.js](msal-js-sso.md) - Add guidance on using the loginHint claim for SSO
33+
- [Tutorial: Create a Blazor Server app that uses the Microsoft identity platform for authentication](tutorial-blazor-server.md) - Simplified and leverage the Microsoft Identity App Sync .NET tool
34+
2135
## June 2023
2236

2337
### New articles
@@ -67,28 +81,3 @@ Welcome to what's new in the Microsoft identity platform documentation. This art
6781
- [Tutorial: Sign in users and call the Microsoft Graph API from an Android application](tutorial-v2-android.md)
6882
- [Tutorial: Sign in users and call the Microsoft Graph API from an Angular single-page application (SPA) using auth code flow](tutorial-v2-angular-auth-code.md)
6983
- [Web app that signs in users: Code configuration](scenario-web-app-sign-user-app-configuration.md)
70-
71-
## April 2023
72-
73-
### New articles
74-
75-
- [Configure token lifetime policies (preview)](configure-token-lifetimes.md)
76-
- [Secure applications and APIs by validating claims](claims-validation.md)
77-
78-
### Updated articles
79-
80-
- [Authentication flow support in MSAL](msal-authentication-flows.md)
81-
- [A web app that calls web APIs: Acquire a token for the app](scenario-web-app-call-api-acquire-token.md)
82-
- [A web app that calls web APIs: Code configuration](scenario-web-app-call-api-app-configuration.md)
83-
- [Customize claims issued in the JSON web token (JWT) for enterprise applications (Preview)](active-directory-jwt-claims-customization.md)
84-
- [Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md)
85-
- [Daemon app that calls web APIs - acquire a token](scenario-daemon-acquire-token.md)
86-
- [Daemon app that calls web APIs - call a web API from the app](scenario-daemon-call-api.md)
87-
- [Daemon app that calls web APIs - code configuration](scenario-daemon-app-configuration.md)
88-
- [Desktop app that calls web APIs: Acquire a token using WAM](scenario-desktop-acquire-token-wam.md)
89-
- [Microsoft identity platform access tokens](access-tokens.md)
90-
- [Quickstart: Get a token and call the Microsoft Graph API by using a console app's identity](quickstart-v2-netcore-daemon.md)
91-
- [Tutorial: Sign in users and call the Microsoft Graph API from an Android application](tutorial-v2-android.md)
92-
- [Web app that signs in users: App registration](scenario-web-app-sign-user-app-registration.md)
93-
- [Web app that signs in users: Code configuration](scenario-web-app-sign-user-app-configuration.md)
94-
- [Web app that signs in users: Sign-in and sign-out](scenario-web-app-sign-user-sign-in.md)

articles/active-directory/enterprise-users/licensing-group-advanced.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -102,13 +102,13 @@ Here's an example of what this process may look like:
102102
## Use PowerShell to see who has inherited and direct licenses
103103
You can use a PowerShell script to check if users have a license assigned directly or inherited from a group.
104104

105-
1. Run the `connect-msolservice` cmdlet to authenticate and connect to your organization.
105+
1. Run the `Connect-MgGraph -Scopes "Organization.Read.All"` cmdlet to authenticate and connect to your organization using Microsoft Graph.
106106

107-
2. `Get-MsolAccountSku` can be used to discover all provisioned product licenses in the Azure AD organization.
107+
2. `Get-MgSubscribedSku -All | Select-Object skuid -ExpandProperty serviceplans | select serviceplanid, serviceplanname` can be used to discover all provisioned product licenses in the Azure AD organization.
108108

109-
![Screenshot of the Get-Msolaccountsku cmdlet](./media/licensing-group-advanced/get-msolaccountsku-cmdlet.png)
109+
![Screenshot of the Get-Msolaccountsku cmdlet](./media/licensing-group-advanced/get-mgsubscribedsku-cmdlet.png)
110110

111-
3. Use the *AccountSkuId* value for the license you're interested in with [this PowerShell script](licensing-ps-examples.md#check-if-user-license-is-assigned-directly-or-inherited-from-a-group). A list populates the users who have this license and information about how the license is assigned.
111+
3. Use the *ServicePlanId* value for the license you're interested in with [this PowerShell script](licensing-ps-examples.md#check-if-user-license-is-assigned-directly-or-inherited-from-a-group). A list populates the users who have this license and information about how the license is assigned.
112112

113113
## Use Audit logs to monitor group-based licensing activity
114114

146 KB
Loading

0 commit comments

Comments
 (0)