Skip to content

Commit 512e604

Browse files
authored
Merge pull request #179330 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 838413a + a7baea5 commit 512e604

File tree

219 files changed

+2872
-1307
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

219 files changed

+2872
-1307
lines changed

.github/workflows/stale.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1200
2222
ascending: true
23-
start-date: '2020-09-02'
23+
start-date: '2021-04-15'
2424
stale-pr-message: >
2525
This pull request has been inactive for at least 14 days.
2626
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -419,6 +419,16 @@
419419
"redirect_document_id": false
420420
},
421421
{
422+
"source_path_from_root": "/articles/frontdoor/standard-premium/concept-rule-set-match-conditions.md",
423+
"redirect_url": "/azure/frontdoor/rules-match-conditions",
424+
"redirect_document_id": false
425+
},
426+
{
427+
"source_path_from_root": "/articles/frontdoor/front-door-rules-engine-match-conditions.md",
428+
"redirect_url": "/azure/frontdoor/rules-match-conditions",
429+
"redirect_document_id": false
430+
},
431+
{
422432
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
423433
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
424434
"redirect_document_id": false
@@ -748,6 +758,16 @@
748758
"redirect_url": "/azure",
749759
"redirect_document_id": false
750760
},
761+
{
762+
"source_path_from_root": "/articles/azure-sql/virtual-machines/windows/availability-group-manually-configure-prerequisites-tutorial.md",
763+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-manually-configure-prerequisites-tutorial-single-subnet",
764+
"redirect_document_id": true
765+
},
766+
{
767+
"source_path_from_root": "/articles/azure-sql/virtual-machines/windows/availability-group-manually-configure-tutorial.md",
768+
"redirect_url": "/azure/azure-sql/virtual-machines/windows/availability-group-manually-configure-tutorial-single-subnet",
769+
"redirect_document_id": true
770+
},
751771
{
752772
"source_path_from_root": "/articles/active-directory-b2c/active-directory-b2c-landing-custom.md",
753773
"redirect_url": "/azure/active-directory-b2c",

articles/active-directory-b2c/enable-authentication-web-app-with-api.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 06/25/2021
10+
ms.date: 11/10/2021
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -57,6 +57,8 @@ Install-Package Microsoft.Identity.Web
5757
Install-Package Microsoft.Identity.Web.UI
5858
```
5959

60+
---
61+
6062
## Step 3: Initiate the authentication libraries
6163

6264
The Microsoft Identity Web middleware uses a startup class that runs when the hosting process starts. In this step, you add the necessary code to initiate the authentication libraries.

articles/active-directory/devices/faq.yml

Lines changed: 29 additions & 30 deletions
Large diffs are not rendered by default.

articles/active-directory/devices/troubleshoot-device-dsregcmd.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 11/21/2019
1010
ms.author: joflore
1111
author: MicrosoftGuyJFlo
1212
manager: karenhoran
13-
ms.reviewer: spunukol
13+
ms.reviewer: ravenn
1414

1515
ms.collection: M365-identity-device-management
1616
---
@@ -64,7 +64,7 @@ The state is displayed only when the device is Azure AD-joined or hybrid Azure A
6464
- **TpmProtected**: The state is set to *YES* if the device private key is stored in a hardware Trusted Platform Module (TPM).
6565
- **DeviceAuthStatus**: Performs a check to determine the device's health in Azure AD. The health statuses are:
6666
* *SUCCESS* if the device is present and enabled in Azure AD.
67-
* *FAILED. Device is either disabled or deleted* if the device is either disabled or deleted. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-devices).
67+
* *FAILED. Device is either disabled or deleted* if the device is either disabled or deleted. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-11-devices).
6868
* *FAILED. ERROR* if the test was unable to run. This test requires network connectivity to Azure AD.
6969
> [!NOTE]
7070
> The **DeviceAuthStatus** field was added in the Windows 10 May 2021 update (version 21H1).

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -477,7 +477,7 @@ Use Event Viewer to look for the log entries that are logged by the Azure AD Clo
477477

478478
| Error code | Reason | Resolution |
479479
| --- | --- | --- |
480-
| **AADSTS50155: Device authentication failed** | <li>Azure AD is unable to authenticate the device to issue a PRT.<li>Confirm that the device hasn't been deleted or disabled in the Azure portal. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-devices). | Follow the instructions for this issue in [Azure Active Directory device management FAQ](faq.yml#i-disabled-or-deleted-my-device-in-the-azure-portal-or-by-using-windows-powershell--but-the-local-state-on-the-device-says-it-s-still-registered--what-should-i-do) to re-register the device based on the device join type. |
480+
| **AADSTS50155: Device authentication failed** | <li>Azure AD is unable to authenticate the device to issue a PRT.<li>Confirm that the device hasn't been deleted or disabled in the Azure portal. For more information about this issue, see [Azure Active Directory device management FAQ](faq.yml#why-do-my-users-see-an-error-message-saying--your-organization-has-deleted-the-device--or--your-organization-has-disabled-the-device--on-their-windows-10-11-devices). | Follow the instructions for this issue in [Azure Active Directory device management FAQ](faq.yml#i-disabled-or-deleted-my-device-in-the-azure-portal-or-by-using-windows-powershell--but-the-local-state-on-the-device-says-it-s-still-registered--what-should-i-do) to re-register the device based on the device join type. |
481481
| **AADSTS50034: The user account `Account` does not exist in the `tenant id` directory** | Azure AD is unable to find the user account in the tenant. | <li>Ensure that the user is typing the correct UPN.<li>Ensure that the on-premises user account is being synced with Azure AD.<li>Event 1144 (Azure AD analytics logs) will contain the UPN provided. |
482482
| **AADSTS50126: Error validating credentials due to invalid username or password.** | <li>The username and password entered by the user in the Windows LoginUI are incorrect.<li>If the tenant has password hash sync enabled, the device is hybrid-joined, and the user just changed the password, it's likely that the new password hasn’t synced with Azure AD. | To acquire a fresh PRT with the new credentials, wait for the Azure AD password sync to finish. |
483483
| | |

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 131 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: fundamentals
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 9/30/2021
12+
ms.date: 10/30/2021
1313
ms.author: ajburnle
1414
ms.reviewer: dhanyahk
1515
ms.custom: it-pro, seo-update-azuread-jan, has-adal-ref
@@ -30,6 +30,136 @@ The What's new in Azure Active Directory? release notes provide information abou
3030

3131
---
3232

33+
## April 2021
34+
35+
### Bug fixed - Azure AD will no longer double-encode the state parameter in responses
36+
37+
**Type:** Fixed
38+
**Service category:** Authentications (Logins)
39+
**Product capability:** User Authentication
40+
41+
Azure AD has identified, tested, and released a fix for a bug in the `/authorize` response to a client application. Azure AD was incorrectly URL encoding the `state` parameter twice when sending responses back to the client. This can cause a client application to reject the request, due to a mismatch in state parameters. [Learn more](../develop/reference-breaking-changes.md#bug-fix-azure-ad-will-no-longer-url-encode-the-state-parameter-twice).
42+
43+
---
44+
45+
### Users can only create security and Microsoft 365 groups in Azure portal being deprecated
46+
47+
**Type:** Plan for change
48+
**Service category:** Group Management
49+
**Product capability:** Directory
50+
51+
Users will no longer be limited to create security and Microsoft 365 groups only in the Azure portal. The new setting will allow users to create security groups in the Azure portal, PowerShell, and API. Users will be required to verify and update the new setting. [Learn more](../enterprise-users/groups-self-service-management.md).
52+
53+
---
54+
55+
### Public preview - External Identities Self-Service Sign-up in AAD using Email One-Time Passcode accounts
56+
57+
**Type:** New feature
58+
**Service category:** B2B
59+
**Product capability:** B2B/B2C
60+
61+
External users can now use Email One-Time Passcode accounts to sign up or sign in to Azure AD 1st party and line-of-business applications. [Learn more](../external-identities/one-time-passcode.md).
62+
63+
---
64+
65+
### General availability - External Identities Self-Service Sign Up
66+
67+
**Type:** New feature
68+
**Service category:** B2B
69+
**Product capability:** B2B/B2C
70+
71+
Self-service sign-up for external users is now in general availability. With this new feature, external users can now self-service sign up to an application.
72+
73+
You can create customized experiences for these external users, including collecting information about your users during the registration process and allowing external identity providers like Facebook and Google. You can also integrate with third-party cloud providers for various functionalities like identity verification or approval of users. [Learn more](../external-identities/self-service-sign-up-overview.md).
74+
75+
---
76+
77+
### General availability - Azure AD B2C Phone Sign-up and Sign-in using Built-in Policy
78+
79+
**Type:** New feature
80+
**Service category:** B2C - Consumer Identity Management
81+
**Product capability:** B2B/B2C
82+
83+
B2C Phone Sign-up and Sign-in using a built-in policy enable IT administrators and developers of organizations to allow their end-users to sign in and sign-up using a phone number in user flows. With this feature, disclaimer links such as privacy policy and terms of use can be customized and shown on the page before the end-user proceeds to receive the one-time passcode via text message. [Learn more](../../active-directory-b2c/phone-authentication-user-flows.md).
84+
85+
---
86+
87+
### New Federated Apps available in Azure AD Application gallery - April 2021
88+
89+
**Type:** New feature
90+
**Service category:** Enterprise Apps
91+
**Product capability:** 3rd Party Integration
92+
93+
In April 2021, we have added following 31 new applications in our App gallery with Federation support
94+
95+
[Zii Travel Azure AD Connect](http://ziitravel.com/), [Cerby](../saas-apps/cerby-tutorial.md), [Selflessly](https://app.selflessly.io/sign-in), [Apollo CX](https://apollo.cxlabs.de/sso/aad), [Pedagoo](https://account.pedagoo.com/), [Measureup](https://account.measureup.com/), [Wistec Education](https://wisteceducation.fi/login/index.php), [ProcessUnity](../saas-apps/processunity-tutorial.md), [Cisco Intersight](../saas-apps/cisco-intersight-tutorial.md), [Codility](../saas-apps/codility-tutorial.md), [H5mag](https://account.h5mag.com/auth/request-access/ms365), [Check Point Identity Awareness](../saas-apps/check-point-identity-awareness-tutorial.md), [Jarvis](https://jarvis.live/login), [desknet's NEO](../saas-apps/desknets-neo-tutorial.md), [SDS & Chemical Information Management](../saas-apps/sds-chemical-information-management-tutorial.md), [Wúru App](../saas-apps/wuru-app-tutorial.md), [Holmes](../saas-apps/holmes-tutorial.md), [Tide Multi Tenant](https://gallery.tideapp.co.uk/), [Telenor](https://admin.smartansatt.telenor.no/), [Yooz US](https://us1.getyooz.com/?kc_idp_hint=microsoft), [Mooncamp](https://app.mooncamp.com/#/login), [inwise SSO](https://app.inwise.com/defaultsso.aspx), [Ecolab Digital Solutions](https://ecolabb2c.b2clogin.com/account.ecolab.com/oauth2/v2.0/authorize?p=B2C_1A_Connect_OIDC_SignIn&client_id=01281626-dbed-4405-a430-66457825d361&nonce=defaultNonce&redirect_uri=https://jwt.ms&scope=openid&response_type=id_token&prompt=login), [Taguchi Digital Marketing System](https://login.taguchi.com.au/), [XpressDox EU Cloud](https://test.xpressdox.com/Authentication/Login.aspx), [EZSSH](https://docs.keytos.io/getting-started/registering-a-new-tenant/registering_app_in_tenant/), [EZSSH Client](https://portal.ezssh.io/signup), [Verto 365](https://www.vertocloud.com/Login/), [KPN Grip](https://www.grip-on-it.com/), [AddressLook](https://portal.bbsonlineservices.net/Manage/AddressLook), [Cornerstone Single Sign-On](../saas-apps/cornerstone-ondemand-tutorial.md)
96+
97+
You can also find the documentation of all the applications here: https://aka.ms/AppsTutorial
98+
99+
For listing your application in the Azure AD app gallery, read the details here: https://aka.ms/AzureADAppRequest
100+
101+
---
102+
103+
### New provisioning connectors in the Azure AD Application Gallery - April 2021
104+
105+
**Type:** New feature
106+
**Service category:** App Provisioning
107+
**Product capability:** 3rd Party Integration
108+
109+
You can now automate creating, updating, and deleting user accounts for these newly integrated apps:
110+
111+
- [Bentley - Automatic User Provisioning](../saas-apps/bentley-automatic-user-provisioning-tutorial.md)
112+
- [Boxcryptor](../saas-apps/boxcryptor-provisioning-tutorial.md)
113+
- [BrowserStack Single Sign-on](../saas-apps/browserstack-single-sign-on-provisioning-tutorial.md)
114+
- [Eletive](../saas-apps/eletive-provisioning-tutorial.md)
115+
- [Jostle](../saas-apps/jostle-provisioning-tutorial.md)
116+
- [Olfeo SAAS](../saas-apps/olfeo-saas-provisioning-tutorial.md)
117+
- [Proware](../saas-apps/proware-provisioning-tutorial.md)
118+
- [Segment](../saas-apps/segment-provisioning-tutorial.md)
119+
120+
For more information about how to better secure your organization with automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
121+
122+
---
123+
124+
### Introducing new versions of page layouts for B2C
125+
126+
**Type:** Changed feature
127+
**Service category:** B2C - Consumer Identity Management
128+
**Product capability:** B2B/B2C
129+
130+
The [page layouts](../../active-directory-b2c/page-layout.md) for B2C scenarios on the Azure AD B2C has been updated to reduce security risks by introducing the new versions of jQuery and Handlebars JS.
131+
132+
---
133+
134+
### Updates to Sign-in Diagnostic
135+
136+
**Type:** Changed feature
137+
**Service category:** Reporting
138+
**Product capability:** Monitoring & Reporting
139+
140+
The scenario coverage of the Sign-in Diagnostic tool has increased.
141+
142+
With this update, the following event-related scenarios will now be included in the sign-in diagnosis results:
143+
- Enterprise Applications configuration problem events.
144+
- Enterprise Applications service provider (application-side) events.
145+
- Incorrect credentials events.
146+
147+
These results will show contextual and relevant details about the event and actions to take to resolve these problems. Also, for scenarios where we don't have deep contextual diagnostics, Sign-in Diagnostic will present more descriptive content about the error event.
148+
149+
For more information, see [What is sign-in diagnostic in Azure AD?](../reports-monitoring/overview-sign-in-diagnostics.md)
150+
151+
---
152+
### Azure AD Connect cloud sync general availability refresh
153+
**Type:** Changed feature
154+
**Service category:** Azure AD Connect Cloud Sync
155+
**Product capability:** Directory
156+
157+
Azure AD connect cloud sync now has an updated agent (version# - 1.1.359). For more details on agent updates, including bug fixes, check out the [version history](../cloud-sync/reference-version-history.md). With the updated agent, cloud sync customers can use GMSA cmdlets to set and reset their gMSA permission at a granular level. In addition that, we have changed the limit of syncing members using group scope filtering from 1499 to 50,000 (50K) members.
158+
159+
Check out the newly available [expression builder](../cloud-sync/how-to-expression-builder.md#deploy-the-expression) for cloud sync, which, helps you build complex expressions as well as simple expressions when you do transformations of attribute values from AD to Azure AD using attribute mapping.
160+
161+
---
162+
33163
## March 2021
34164

35165
### Guidance on how to enable support for TLS 1.2 in your environment, in preparation for upcoming Azure AD TLS 1.0/1.1 deprecation

0 commit comments

Comments
 (0)