You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/stale.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ jobs:
20
20
exempt-pr-labels: keep-open
21
21
operations-per-run: 1200
22
22
ascending: true
23
-
start-date: '2020-09-02'
23
+
start-date: '2021-04-15'
24
24
stale-pr-message: >
25
25
This pull request has been inactive for at least 14 days.
26
26
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.
The Microsoft Identity Web middleware uses a startup class that runs when the hosting process starts. In this step, you add the necessary code to initiate the authentication libraries.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/troubleshoot-device-dsregcmd.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.date: 11/21/2019
10
10
ms.author: joflore
11
11
author: MicrosoftGuyJFlo
12
12
manager: karenhoran
13
-
ms.reviewer: spunukol
13
+
ms.reviewer: ravenn
14
14
15
15
ms.collection: M365-identity-device-management
16
16
---
@@ -64,7 +64,7 @@ The state is displayed only when the device is Azure AD-joined or hybrid Azure A
64
64
-**TpmProtected**: The state is set to *YES* if the device private key is stored in a hardware Trusted Platform Module (TPM).
65
65
-**DeviceAuthStatus**: Performs a check to determine the device's health in Azure AD. The health statuses are:
66
66
**SUCCESS* if the device is present and enabled in Azure AD.
67
-
**FAILED. Device is either disabled or deleted* if the device is either disabled or deleted. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-devices).
67
+
**FAILED. Device is either disabled or deleted* if the device is either disabled or deleted. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-11-devices).
68
68
**FAILED. ERROR* if the test was unable to run. This test requires network connectivity to Azure AD.
69
69
> [!NOTE]
70
70
> The **DeviceAuthStatus** field was added in the Windows 10 May 2021 update (version 21H1).
Copy file name to clipboardExpand all lines: articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -477,7 +477,7 @@ Use Event Viewer to look for the log entries that are logged by the Azure AD Clo
477
477
478
478
| Error code | Reason | Resolution |
479
479
| --- | --- | --- |
480
-
|**AADSTS50155: Device authentication failed**| <li>Azure AD is unable to authenticate the device to issue a PRT.<li>Confirm that the device hasn't been deleted or disabled in the Azure portal. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-devices). | Follow the instructions for this issue in [Azure Active Directory device management FAQ](faq.yml#i-disabled-or-deleted-my-device-in-the-azure-portal-or-by-using-windows-powershell--but-the-local-state-on-the-device-says-it-s-still-registered--what-should-i-do) to re-register the device based on the device join type. |
480
+
|**AADSTS50155: Device authentication failed**| <li>Azure AD is unable to authenticate the device to issue a PRT.<li>Confirm that the device hasn't been deleted or disabled in the Azure portal. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-11-devices). | Follow the instructions for this issue in [Azure Active Directory device management FAQ](faq.yml#i-disabled-or-deleted-my-device-in-the-azure-portal-or-by-using-windows-powershell--but-the-local-state-on-the-device-says-it-s-still-registered--what-should-i-do) to re-register the device based on the device join type. |
481
481
|**AADSTS50034: The user account `Account` does not exist in the `tenant id` directory**| Azure AD is unable to find the user account in the tenant. | <li>Ensure that the user is typing the correct UPN.<li>Ensure that the on-premises user account is being synced with Azure AD.<li>Event 1144 (Azure AD analytics logs) will contain the UPN provided. |
482
482
|**AADSTS50126: Error validating credentials due to invalid username or password.**| <li>The username and password entered by the user in the Windows LoginUI are incorrect.<li>If the tenant has password hash sync enabled, the device is hybrid-joined, and the user just changed the password, it's likely that the new password hasn’t synced with Azure AD. | To acquire a fresh PRT with the new credentials, wait for the Azure AD password sync to finish. |
@@ -30,6 +30,136 @@ The What's new in Azure Active Directory? release notes provide information abou
30
30
31
31
---
32
32
33
+
## April 2021
34
+
35
+
### Bug fixed - Azure AD will no longer double-encode the state parameter in responses
36
+
37
+
**Type:** Fixed
38
+
**Service category:** Authentications (Logins)
39
+
**Product capability:** User Authentication
40
+
41
+
Azure AD has identified, tested, and released a fix for a bug in the `/authorize` response to a client application. Azure AD was incorrectly URL encoding the `state` parameter twice when sending responses back to the client. This can cause a client application to reject the request, due to a mismatch in state parameters. [Learn more](../develop/reference-breaking-changes.md#bug-fix-azure-ad-will-no-longer-url-encode-the-state-parameter-twice).
42
+
43
+
---
44
+
45
+
### Users can only create security and Microsoft 365 groups in Azure portal being deprecated
46
+
47
+
**Type:** Plan for change
48
+
**Service category:** Group Management
49
+
**Product capability:** Directory
50
+
51
+
Users will no longer be limited to create security and Microsoft 365 groups only in the Azure portal. The new setting will allow users to create security groups in the Azure portal, PowerShell, and API. Users will be required to verify and update the new setting. [Learn more](../enterprise-users/groups-self-service-management.md).
52
+
53
+
---
54
+
55
+
### Public preview - External Identities Self-Service Sign-up in AAD using Email One-Time Passcode accounts
56
+
57
+
**Type:** New feature
58
+
**Service category:** B2B
59
+
**Product capability:** B2B/B2C
60
+
61
+
External users can now use Email One-Time Passcode accounts to sign up or sign in to Azure AD 1st party and line-of-business applications. [Learn more](../external-identities/one-time-passcode.md).
62
+
63
+
---
64
+
65
+
### General availability - External Identities Self-Service Sign Up
66
+
67
+
**Type:** New feature
68
+
**Service category:** B2B
69
+
**Product capability:** B2B/B2C
70
+
71
+
Self-service sign-up for external users is now in general availability. With this new feature, external users can now self-service sign up to an application.
72
+
73
+
You can create customized experiences for these external users, including collecting information about your users during the registration process and allowing external identity providers like Facebook and Google. You can also integrate with third-party cloud providers for various functionalities like identity verification or approval of users. [Learn more](../external-identities/self-service-sign-up-overview.md).
74
+
75
+
---
76
+
77
+
### General availability - Azure AD B2C Phone Sign-up and Sign-in using Built-in Policy
B2C Phone Sign-up and Sign-in using a built-in policy enable IT administrators and developers of organizations to allow their end-users to sign in and sign-up using a phone number in user flows. With this feature, disclaimer links such as privacy policy and terms of use can be customized and shown on the page before the end-user proceeds to receive the one-time passcode via text message. [Learn more](../../active-directory-b2c/phone-authentication-user-flows.md).
84
+
85
+
---
86
+
87
+
### New Federated Apps available in Azure AD Application gallery - April 2021
88
+
89
+
**Type:** New feature
90
+
**Service category:** Enterprise Apps
91
+
**Product capability:** 3rd Party Integration
92
+
93
+
In April 2021, we have added following 31 new applications in our App gallery with Federation support
94
+
95
+
[Zii Travel Azure AD Connect](http://ziitravel.com/), [Cerby](../saas-apps/cerby-tutorial.md), [Selflessly](https://app.selflessly.io/sign-in), [Apollo CX](https://apollo.cxlabs.de/sso/aad), [Pedagoo](https://account.pedagoo.com/), [Measureup](https://account.measureup.com/), [Wistec Education](https://wisteceducation.fi/login/index.php), [ProcessUnity](../saas-apps/processunity-tutorial.md), [Cisco Intersight](../saas-apps/cisco-intersight-tutorial.md), [Codility](../saas-apps/codility-tutorial.md), [H5mag](https://account.h5mag.com/auth/request-access/ms365), [Check Point Identity Awareness](../saas-apps/check-point-identity-awareness-tutorial.md), [Jarvis](https://jarvis.live/login), [desknet's NEO](../saas-apps/desknets-neo-tutorial.md), [SDS & Chemical Information Management](../saas-apps/sds-chemical-information-management-tutorial.md), [Wúru App](../saas-apps/wuru-app-tutorial.md), [Holmes](../saas-apps/holmes-tutorial.md), [Tide Multi Tenant](https://gallery.tideapp.co.uk/), [Telenor](https://admin.smartansatt.telenor.no/), [Yooz US](https://us1.getyooz.com/?kc_idp_hint=microsoft), [Mooncamp](https://app.mooncamp.com/#/login), [inwise SSO](https://app.inwise.com/defaultsso.aspx), [Ecolab Digital Solutions](https://ecolabb2c.b2clogin.com/account.ecolab.com/oauth2/v2.0/authorize?p=B2C_1A_Connect_OIDC_SignIn&client_id=01281626-dbed-4405-a430-66457825d361&nonce=defaultNonce&redirect_uri=https://jwt.ms&scope=openid&response_type=id_token&prompt=login), [Taguchi Digital Marketing System](https://login.taguchi.com.au/), [XpressDox EU Cloud](https://test.xpressdox.com/Authentication/Login.aspx), [EZSSH](https://docs.keytos.io/getting-started/registering-a-new-tenant/registering_app_in_tenant/), [EZSSH Client](https://portal.ezssh.io/signup), [Verto 365](https://www.vertocloud.com/Login/), [KPN Grip](https://www.grip-on-it.com/), [AddressLook](https://portal.bbsonlineservices.net/Manage/AddressLook), [Cornerstone Single Sign-On](../saas-apps/cornerstone-ondemand-tutorial.md)
96
+
97
+
You can also find the documentation of all the applications here: https://aka.ms/AppsTutorial
98
+
99
+
For listing your application in the Azure AD app gallery, read the details here: https://aka.ms/AzureADAppRequest
100
+
101
+
---
102
+
103
+
### New provisioning connectors in the Azure AD Application Gallery - April 2021
104
+
105
+
**Type:** New feature
106
+
**Service category:** App Provisioning
107
+
**Product capability:** 3rd Party Integration
108
+
109
+
You can now automate creating, updating, and deleting user accounts for these newly integrated apps:
110
+
111
+
-[Bentley - Automatic User Provisioning](../saas-apps/bentley-automatic-user-provisioning-tutorial.md)
For more information about how to better secure your organization with automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
121
+
122
+
---
123
+
124
+
### Introducing new versions of page layouts for B2C
The [page layouts](../../active-directory-b2c/page-layout.md) for B2C scenarios on the Azure AD B2C has been updated to reduce security risks by introducing the new versions of jQuery and Handlebars JS.
131
+
132
+
---
133
+
134
+
### Updates to Sign-in Diagnostic
135
+
136
+
**Type:** Changed feature
137
+
**Service category:** Reporting
138
+
**Product capability:** Monitoring & Reporting
139
+
140
+
The scenario coverage of the Sign-in Diagnostic tool has increased.
141
+
142
+
With this update, the following event-related scenarios will now be included in the sign-in diagnosis results:
143
+
- Enterprise Applications configuration problem events.
144
+
- Enterprise Applications service provider (application-side) events.
145
+
- Incorrect credentials events.
146
+
147
+
These results will show contextual and relevant details about the event and actions to take to resolve these problems. Also, for scenarios where we don't have deep contextual diagnostics, Sign-in Diagnostic will present more descriptive content about the error event.
148
+
149
+
For more information, see [What is sign-in diagnostic in Azure AD?](../reports-monitoring/overview-sign-in-diagnostics.md)
150
+
151
+
---
152
+
### Azure AD Connect cloud sync general availability refresh
153
+
**Type:** Changed feature
154
+
**Service category:** Azure AD Connect Cloud Sync
155
+
**Product capability:** Directory
156
+
157
+
Azure AD connect cloud sync now has an updated agent (version# - 1.1.359). For more details on agent updates, including bug fixes, check out the [version history](../cloud-sync/reference-version-history.md). With the updated agent, cloud sync customers can use GMSA cmdlets to set and reset their gMSA permission at a granular level. In addition that, we have changed the limit of syncing members using group scope filtering from 1499 to 50,000 (50K) members.
158
+
159
+
Check out the newly available [expression builder](../cloud-sync/how-to-expression-builder.md#deploy-the-expression) for cloud sync, which, helps you build complex expressions as well as simple expressions when you do transformations of attribute values from AD to Azure AD using attribute mapping.
160
+
161
+
---
162
+
33
163
## March 2021
34
164
35
165
### Guidance on how to enable support for TLS 1.2 in your environment, in preparation for upcoming Azure AD TLS 1.0/1.1 deprecation
0 commit comments