Skip to content

Commit 52d2fc8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/advanced-scheduling
2 parents 407a0f8 + fa1d0ea commit 52d2fc8

File tree

230 files changed

+2093
-1480
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

230 files changed

+2093
-1480
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16084,11 +16084,36 @@
1608416084
"redirect_url": "/azure/sentinel/normalization-schema-dns",
1608516085
"redirect_document_id": true
1608616086
},
16087+
{
16088+
"source_path_from_root": "/articles/sentinel/authentication-normalization-schema.md",
16089+
"redirect_url": "/azure/sentinel/normalization-schema-authentication",
16090+
"redirect_document_id": true
16091+
},
16092+
{
16093+
"source_path_from_root": "/articles/sentinel/dhcp-normalization-schema.md",
16094+
"redirect_url": "/azure/sentinel/normalization-schema-dhcp",
16095+
"redirect_document_id": true
16096+
},
16097+
{
16098+
"source_path_from_root": "/articles/sentinel/user-management-normalization-schema.md",
16099+
"redirect_url": "/azure/sentinel/normalization-schema-user-management",
16100+
"redirect_document_id": true
16101+
},
1608716102
{
1608816103
"source_path_from_root": "/articles/sentinel/file-event-normalization-schema.md",
1608916104
"redirect_url": "/azure/sentinel/normalization-schema-file-event",
1609016105
"redirect_document_id": true
1609116106
},
16107+
{
16108+
"source_path_from_root": "/articles/sentinel/registry-event-normalization-schema.md",
16109+
"redirect_url": "/azure/sentinel/normalization-schema-registry-event",
16110+
"redirect_document_id": true
16111+
},
16112+
{
16113+
"source_path_from_root": "/articles/sentinel/process-events-normalization-schema.md",
16114+
"redirect_url": "/azure/sentinel/normalization-schema-process-event",
16115+
"redirect_document_id": true
16116+
},
1609216117
{
1609316118
"source_path_from_root": "/articles/service-bus/index.md",
1609416119
"redirect_url": "/azure/service-bus-messaging/index",

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 01/29/2023
8+
ms.date: 01/30/2023
99

1010
ms.author: justinha
11-
author: vimrang
11+
author: justinha
1212
manager: amycolannino
1313
ms.reviewer: vimrang
1414

@@ -134,7 +134,7 @@ To enable the certificate-based authentication in the Azure portal, complete the
134134
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Authentication Policy Administrator.
135135
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
136136
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
137-
1. Under **Basics**, select **Yes** to enable CBA.
137+
1. Under **Enable and Target**, click **Enable**.
138138
1. Click **All users**, or click **Add groups** to select specific groups.
139139

140140
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/03/2023
9+
ms.date: 01/30/2023
1010

1111
ms.author: justinha
1212
author: calui
@@ -43,8 +43,8 @@ Here's what you need to know about email as an alternate login ID:
4343
* If the non-UPN email in use becomes stale (no longer belongs to the user), these claims will return the UPN instead.
4444
* The feature supports managed authentication with Password Hash Sync (PHS) or Pass-Through Authentication (PTA).
4545
* There are two options for configuring the feature:
46-
* [Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global administrator privileges required.
47-
* [Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
46+
* [Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global Administrator, Application Administrator, or Cloud Application Administrator role is required.
47+
* [Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global Administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
4848

4949
## Preview limitations
5050

@@ -132,11 +132,11 @@ Email as an alternate login ID applies to [Azure AD B2B collaboration](../extern
132132
133133
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
134134

135-
During preview, you currently need *global administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
135+
During preview, you currently need *Global Administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
136136

137137
### Azure portal
138138

139-
1. Sign in to the [Azure portal][azure-portal] as a *global administrator*.
139+
1. Sign in to the [Azure portal][azure-portal] as a *Global Administrator*.
140140
1. Search for and select **Azure Active Directory**.
141141
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Azure AD Connect > Email as alternate login ID**.
142142

@@ -156,7 +156,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
156156
157157
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign-in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
158158

159-
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *global administrator* privileges to complete the following steps:
159+
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *Global Administrator* privileges to complete the following steps:
160160

161161
1. Open a PowerShell session as an administrator, then install the *Microsoft.Graph* module using the `Install-Module` cmdlet:
162162

@@ -274,7 +274,7 @@ Remove-MgPolicyHomeRealmDiscoveryPolicy -HomeRealmDiscoveryPolicyId "HRD_POLICY_
274274
Staged rollout policy allows tenant administrators to enable features for specific Azure AD groups. It is recommended that tenant administrators use staged rollout to test user sign-in with an email address. When administrators are ready to deploy this feature to their entire tenant, they should use [HRD policy](#enable-user-sign-in-with-an-email-address).
275275

276276

277-
You need *global administrator* permissions to complete the following steps:
277+
You need *Global Administrator* permissions to complete the following steps:
278278

279279
1. Open a PowerShell session as an administrator, then install the *AzureADPreview* module using the [Install-Module][Install-Module] cmdlet:
280280

@@ -284,7 +284,7 @@ You need *global administrator* permissions to complete the following steps:
284284
285285
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
286286
287-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
287+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
288288
289289
```powershell
290290
Connect-AzureAD
@@ -379,7 +379,7 @@ Within a tenant, a cloud-only user's UPN may take on the same value as another u
379379
380380
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
381381
382-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
382+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
383383
384384
```powershell
385385
Connect-AzureAD

articles/active-directory/authentication/tutorial-enable-sspr.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: tutorial
8-
ms.date: 01/29/2023
8+
ms.date: 01/30/2023
99
ms.author: justinha
1010
author: justinha
1111
ms.reviewer: tilarso
@@ -143,6 +143,10 @@ If you no longer want to use the SSPR functionality you have set up as part of t
143143

144144
This section explains common questions from administrators and end-users who try SSPR:
145145

146+
- Why aren't on-premises password policies displayed during SSPR?
147+
148+
At this time, Azure AD Connect and cloud sync don't support sharing password policy details with the cloud. SSPR only displays the cloud password policy details, and can't show on-premises policies.
149+
146150
- Why do federated users wait up to 2 minutes after they see **Your password has been reset** before they can use passwords that are synchronized from on-premises?
147151

148152
For federated users whose passwords are synchronized, the source of authority for the passwords is on-premises. As a result, SSPR updates only the on-premises passwords. Password hash synchronization back to Azure AD is scheduled for every 2 minutes.

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -193,6 +193,12 @@ With inbound settings, you select which external users and groups will be able t
193193

194194
1. Select **Save**.
195195

196+
### Allow users to sync into this tenant
197+
198+
If you select **Inbound access** of the added organization, you'll see the **Cross-tenant sync (Preview)** tab and the **Allow users sync into this tenant** check box. Cross-tenant synchronization is a one-way synchronization service in Azure AD that automates creating, updating, and deleting B2B collaboration users across tenants in an organization. For more information, see [Configure cross-tenant synchronization](../../active-directory/multi-tenant-organizations/cross-tenant-synchronization-configure.md) and the [Multi-tenant organizations documentation](/azure/active-directory/multi-tenant-organizations).
199+
200+
:::image type="content" source="media/cross-tenant-access-settings-b2b-collaboration/cross-tenant-sync-tab.png" alt-text="Screenshot that shows the Cross-tenant sync tab with the Allow users sync into this tenant check box." lightbox="media/cross-tenant-access-settings-b2b-collaboration/cross-tenant-sync-tab.png":::
201+
196202
## Modify outbound access settings
197203

198204
With outbound settings, you select which of your users and groups will be able to access the external applications you choose. Whether you're configuring default settings or organization-specific settings, the steps for changing outbound cross-tenant access settings are the same. As described in this section, you'll navigate to either the **Default** tab or an organization on the **Organizational settings** tab, and then make your changes.

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,6 +187,9 @@ With inbound settings, you select which external users and groups will be able t
187187

188188
1. Select **Save**.
189189

190+
> [!NOTE]
191+
> When configuring settings for an organization, you'll notice a **Cross-tenant sync (Preview)** tab. This tab doesn't apply to your B2B direct connect configuration. Instead, this feature is used by multi-tenant organizations to enable B2B collaboration across their tenants. For more information, see the [multi-tenant organization documentation](/azure/active-directory/multi-tenant-organizations).
192+
190193
## Modify outbound access settings
191194

192195
With outbound settings, you select which of your users and groups will be able to access the external applications you choose. The detailed steps for modifying outbound cross-tenant access settings are the same whether you're configuring default or organization-specific settings. As described in this section, navigate to the **Default** tab or an organization on the **Organizational settings** tab, and then make your changes.

articles/active-directory/external-identities/external-identities-overview.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ The following capabilities make up External Identities:
2929

3030
- **Azure AD B2C** - Publish modern SaaS apps or custom-developed apps (excluding Microsoft apps) to consumers and customers, while using Azure AD B2C for identity and access management.
3131

32+
- **Azure AD multi-tenant organization** - Collaborate with multiple tenants in a single Azure AD organization via cross-tenant synchronization.
33+
3234
Depending on how you want to interact with external organizations and the types of resources you need to share, you can use a combination of these capabilities.
3335

3436
![External Identities overview diagram.](media/external-identities-overview/external-identities-b2b-overview.png)
@@ -87,6 +89,8 @@ The following table gives a detailed comparison of the scenarios you can enable
8789
| **Branding** | Host/inviting organization's brand is used. | For sign-in screens, the user’s home organization brand is used. In the shared channel, the resource organization's brand is used. | Fully customizable branding per application or organization. |
8890
| **More information** | [Blog post](https://blogs.technet.microsoft.com/enterprisemobility/2017/02/01/azure-ad-b2b-new-updates-make-cross-business-collab-easy/), [Documentation](what-is-b2b.md) | [Documentation](b2b-direct-connect-overview.md) | [Product page](https://azure.microsoft.com/services/active-directory-b2c/), [Documentation](../../active-directory-b2c/index.yml) |
8991

92+
Based on your organization’s requirements you might use cross-tenant synchronization (preview) in multi-tenant organizations. For more information about this new feature, see the [multi-tenant organization documentation](/azure/active-directory/multi-tenant-organizations) and the [feature comparison](../multi-tenant-organizations/overview.md#compare-multi-tenant-capabilities).
93+
9094
## Managing External Identities features
9195

9296
Azure AD B2B collaboration and B2B direct connect are features Azure AD, and they're managed in the Azure portal through the Azure Active Directory service. To control inbound and outbound collaboration, you can use a combination of *cross-tenant access settings* and *external collaboration settings*.
@@ -101,6 +105,8 @@ Cross-tenant access settings let you manage B2B collaboration and B2B direct con
101105

102106
For more information, see [Cross-tenant access in Azure AD External Identities](cross-tenant-access-overview.md).
103107

108+
Azure AD has a new feature for multi-tenant organizations called cross-tenant synchronization (preview), which allows for a seamless collaboration experience across Azure AD tenants. Cross-tenant synchronization settings are configured under the **Organization-specific access settings**. To learn more about multi-tenant organizations and cross-tenant synchronization see the [Multi-tenant organizations documentation](/azure/active-directory/multi-tenant-organizations).
109+
104110
### Microsoft cloud settings for B2B collaboration (preview)
105111

106112
Microsoft Azure cloud services are available in separate national clouds, which are physically isolated instances of Azure. Increasingly, organizations are finding the need to collaborate with organizations and users across global cloud and national cloud boundaries. With Microsoft cloud settings, you can establish mutual B2B collaboration between the following Microsoft Azure clouds:
@@ -162,8 +168,13 @@ Organizations can enforce Conditional Access policies for external B2B collabora
162168

163169
If you offer a Software as a Service (SaaS) application to many organizations, you can configure your application to accept sign-ins from any Azure Active Directory (Azure AD) tenant. This configuration is called making your application multi-tenant. Users in any Azure AD tenant will be able to sign in to your application after consenting to use their account with your application. See how to [enable multitenant sign-ins](../develop/howto-convert-app-to-be-multi-tenant.md).
164170

171+
### Multi-tenant organizations
172+
173+
A multi-tenant organization is an organization that has more than one instance of Azure AD. There are various reasons for [multi-tenancy](../../active-directory/multi-tenant-organizations/overview.md#what-is-a-multi-tenant-organization), like using multiple clouds or having multiple geographical boundaries. Multi-tenant organizations use a one-way synchronization service in Azure AD, called [cross-tenant synchronization](../../active-directory/multi-tenant-organizations/overview.md#cross-tenant-synchronization-preview). Cross-tenant synchronization enables seamless collaboration for a multi-tenant organization. It improves user experience and ensures that users can access resources, without receiving an invitation email and having to accept a consent prompt in each tenant. Cross-tenant synchronization is currently in preview.
174+
165175
## Next steps
166176

167177
- [What is Azure AD B2B collaboration?](what-is-b2b.md)
168178
- [What is Azure AD B2B direct connect?](b2b-direct-connect-overview.md)
169179
- [About Azure AD B2C](../../active-directory-b2c/overview.md)
180+
- [About Azure AD multi-tenant organizations](../../active-directory/multi-tenant-organizations/overview.md)

articles/active-directory/external-identities/index.yml

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,4 +85,19 @@ landingContent:
8585
- text: Add a self-service sign-up user flow
8686
url: self-service-sign-up-user-flow.md
8787
- text: Define custom attributes for user flows
88-
url: user-flow-add-custom-attributes.md
88+
url: user-flow-add-custom-attributes.md
89+
- title: Multi-tenant organizations
90+
linkLists:
91+
- linkListType: overview
92+
links:
93+
- text: What is a multi-tenant organization in Azure AD?
94+
url: ../../active-directory/multi-tenant-organizations/overview.md
95+
- linkListType: concept
96+
links:
97+
- text: Topologies for cross-tenant synchronization
98+
url: ../../active-directory/multi-tenant-organizations/cross-tenant-synchronization-topology.md
99+
- linkListType: how-to-guide
100+
links:
101+
- text: Configure cross-tenant synchronization
102+
url: ../../active-directory/multi-tenant-organizations/cross-tenant-synchronization-overview.md
103+
Loading
Loading

0 commit comments

Comments
 (0)