Skip to content

Commit 5428e8c

Browse files
author
Craig Casey
authored
Merge branch 'master' into vcraic0315
2 parents 1fe4361 + 7297800 commit 5428e8c

File tree

414 files changed

+8406
-2529
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

414 files changed

+8406
-2529
lines changed

.openpublishing.redirection.json

Lines changed: 36 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2170,6 +2170,11 @@
21702170
"redirect_url": "/azure/cosmos-db/create-sql-api-python",
21712171
"redirect_document_id": false
21722172
},
2173+
{
2174+
"source_path": "articles/cosmos-db/cosmos-db-security-controls.md",
2175+
"redirect_url": "/azure/cosmos-db/security-baseline",
2176+
"redirect_document_id": false
2177+
},
21732178
{
21742179
"source_path": "articles/cosmos-db/powershell-samples.md",
21752180
"redirect_url": "/azure/cosmos-db/powershell-samples-sql",
@@ -13604,6 +13609,11 @@
1360413609
"redirect_url": "/azure/event-hubs/authorize-access-azure-active-directory",
1360513610
"redirect_document_id": false
1360613611
},
13612+
{
13613+
"source_path": "articles/event-hubs/event-hubs-tutorial-virtual-networks-firewalls.md",
13614+
"redirect_url": "/azure/event-hubs/event-hubs-service-endpoints",
13615+
"redirect_document_id": false
13616+
},
1360713617
{
1360813618
"source_path": "articles/active-directory/active-directory-saml-protocol-reference.md",
1360913619
"redirect_url": "/azure/active-directory/develop/active-directory-saml-protocol-reference",
@@ -15786,7 +15796,12 @@
1578615796
},
1578715797
{
1578815798
"source_path": "articles/machine-learning/machine-learning-dedicated-capacity-for-bes-jobs.md",
15789-
"redirect_url": "/azure/machine-learning/studio/dedicated-capacity-for-bes-jobs",
15799+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
15800+
"redirect_document_id": false
15801+
},
15802+
{
15803+
"source_path": "articles/machine-learning/studio/dedicated-capacity-for-bes-jobs.md",
15804+
"redirect_url": "/azure/machine-learning/studio/consume-web-services",
1579015805
"redirect_document_id": false
1579115806
},
1579215807
{
@@ -49284,6 +49299,11 @@
4928449299
"redirect_url": "/azure/azure-monitor/overview",
4928549300
"redirect_document_id": false
4928649301
},
49302+
{
49303+
"source_path": "articles/cli/index.yml",
49304+
"redirect_url": "/cli/azure",
49305+
"redirect_document_id": false
49306+
},
4928749307
{
4928849308
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-jenkins.md",
4928949309
"redirect_url": "/azure/jenkins/tutorial-build-deploy-jenkins",
@@ -49383,6 +49403,21 @@
4938349403
"source_path": "articles/media-services/latest/create-account-cli-how-to.md",
4938449404
"redirect_url": "/azure/media-services/latest/create-account-howto",
4938549405
"redirect_document_id": false
49406+
},
49407+
{
49408+
"source_path": "articles/mariadb/howto-tls-configurations.md",
49409+
"redirect_url": "/azure/mariadb/howto-configure-ssl",
49410+
"redirect_document_id": false
49411+
},
49412+
{
49413+
"source_path": "articles/mysql/howto-tls-configurations.md",
49414+
"redirect_url": "/azure/mysql/howto-configure-ssl",
49415+
"redirect_document_id": false
49416+
},
49417+
{
49418+
"source_path": "articles/postgresql/howto-tls-configurations.md",
49419+
"redirect_url": "/azure/postgresql/concepts-ssl-connection-security",
49420+
"redirect_document_id": false
4938649421
}
4938749422
]
4938849423
}

articles/active-directory-b2c/custom-policy-configure-user-input.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/10/2020
12+
ms.date: 03/17/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -19,9 +19,12 @@ ms.subservice: B2C
1919

2020
In this article, you collect a new attribute during your sign-up journey in Azure Active Directory B2C (Azure AD B2C). You'll obtain the users' city, configure it as a drop-down, and define whether it's required to be provided.
2121

22+
> [!NOTE]
23+
> This sample uses the built-in claim 'city'. Instead, you can choose one of the supported [Azure AD B2C built-in attributes](user-profile-attributes.md) or a custom attribute. To use a custom attribute, [enable custom attributes in your policy](custom-policy-custom-attributes.md). To use a different built-in or custom attribute, replace 'city' with the attribute of your choice, for example the built-in attribute *jobTitle* or a custom attribute like *extension_loyaltyId*.
24+
2225
You can gather initial data from your users by using the sign-up or sign-in user journey. Additional claims can be gathered later by using a profile edit user journey. Anytime Azure AD B2C gathers information directly from the user interactively, the Identity Experience Framework uses its [self-asserted technical profile](self-asserted-technical-profile.md). In this sample, you:
2326

24-
1. Define a "city" claim.
27+
1. Define a "city" claim.
2528
1. Ask the user for their city.
2629
1. Persist the city to the user profile in the Azure AD B2C directory.
2730
1. Read the city claim from the Azure AD B2C directory on each sign-in.

articles/active-directory-b2c/custom-policy-custom-attributes.md

Lines changed: 84 additions & 246 deletions
Large diffs are not rendered by default.

articles/active-directory/app-provisioning/application-provisioning-configure-api.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ Content-type: application/json
171171

172172
### Retrieve the template for the provisioning connector
173173

174-
Applications in the gallery that are enabled for provisioning have templates to streamline configuration. Use the request below to [retrieve the template for the provisioning configuration](https://docs.microsoft.com/graph/api/synchronization-synchronizationtemplate-list?view=graph-rest-beta&tabs=http).
174+
Applications in the gallery that are enabled for provisioning have templates to streamline configuration. Use the request below to [retrieve the template for the provisioning configuration](https://docs.microsoft.com/graph/api/synchronization-synchronizationtemplate-list?view=graph-rest-beta&tabs=http). Note that you will need to provide the ID. The ID refers to the preceding resource, which in this case is the ServicePrincipal.
175175

176176
#### *Request*
177177

@@ -263,10 +263,10 @@ Content-type: application/json
263263

264264
### Test the connection to the application
265265

266-
Test the connection with the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Review the [API documentation](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http) to see the available options.
266+
Test the connection with the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Applications often use BaseAddress in place of ClientSecret. To determine what credentials your app requires, navigate to the provisioning configuration page for your application and in developer mode click test connection. The network traffic will show the parameters used for credentials. The full list of credentials can be found [here](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http).
267267

268268
#### *Request*
269-
```http
269+
```msgraph-interactive
270270
POST https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/jobs/{id}/validateCredentials
271271
{
272272
credentials: [
@@ -290,7 +290,7 @@ HTTP/1.1 204 No Content
290290
Configuring provisioning requires establishing a trust between Azure AD and the application. Authorize access to the third-party application. The example below is for an application that requires clientSecret and secretToken. Each application has its on requirements. Review the [API documentation](https://docs.microsoft.com/graph/api/synchronization-synchronizationjob-validatecredentials?view=graph-rest-beta&tabs=http) to see the available options.
291291

292292
#### *Request*
293-
```json
293+
```msgraph-interactive
294294
PUT https://graph.microsoft.com/beta/servicePrincipals/{id}/synchronization/secrets
295295
296296
{

articles/active-directory/app-provisioning/how-provisioning-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection: M365-identity-device-management
2222

2323
Automatic provisioning refers to creating user identities and roles in the cloud applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Before you start a deployment, you can review this article to learn how Azure AD provision works and get configuration recommendations.
2424

25-
The **Azure AD Provisioning Service** provisions users to SaaS apps and other systems by connecting to a System for Cross-Domain Identity Management (SCIM) 2.0 user management API endpoint provided by the application vendor. This SCIM endpoint allows Azure AD to programmatically create, update, and remove users. For selected applications, the provisioning service can also create, update, and remove additional identity-related objects, such as groups and roles. The channel used for provisioning between Azure AD and the application is encrypted using HTTPS SSL encryption.
25+
The **Azure AD Provisioning Service** provisions users to SaaS apps and other systems by connecting to a System for Cross-Domain Identity Management (SCIM) 2.0 user management API endpoint provided by the application vendor. This SCIM endpoint allows Azure AD to programmatically create, update, and remove users. For selected applications, the provisioning service can also create, update, and remove additional identity-related objects, such as groups and roles. The channel used for provisioning between Azure AD and the application is encrypted using HTTPS TLS encryption.
2626

2727

2828
![Azure AD Provisioning Service](./media/how-provisioning-works/provisioning0.PNG)

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,6 @@ Azure AD Connect lets you synchronize users, groups, and credential between an o
5050
To correctly work with SSPR writeback, the account specified in Azure AD Connect must have the appropriate permissions and options set. If you're not sure which account is currently in use, open Azure AD Connect and select the **View current configuration** option. The account that you need to add permissions to is listed under **Synchronized Directories**. The following permissions and options must be set on the account:
5151

5252
* **Reset password**
53-
* **Change password**
5453
* **Write permissions** on `lockoutTime`
5554
* **Write permissions** on `pwdLastSet`
5655
* **Extended rights** on either:
@@ -68,7 +67,6 @@ To set up the appropriate permissions for password writeback to occur, complete
6867
1. For **Principal**, select the account that permissions should be applied to (the account used by Azure AD Connect).
6968
1. In the **Applies to** drop-down list, select **Descendant User objects**.
7069
1. Under *Permissions*, select the boxes for the following options:
71-
* **Change password**
7270
* **Reset password**
7371
1. Under *Properties*, select the boxes for the following options. You need to scroll through the list to find these options, which may already be set by default:
7472
* **Write lockoutTime**

articles/active-directory/conditional-access/app-based-conditional-access.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ This article presents two scenarios to configure Conditional Access policies for
2626

2727
In Conditional Access, this functionality is known as requiring an approved client app. For a list of approved client apps, see [approved client app requirement](concept-conditional-access-grant.md#require-approved-client-app).
2828

29+
> [!NOTE]
30+
> In order to require approved client apps for iOS and Android devices, these devices must first register in Azure AD.
31+
2932
## Scenario 1: Office 365 apps require an approved client app
3033

3134
In this scenario, Contoso has decided that users using mobile devices can access all Office 365 services as long as they use approved client apps, like Outlook mobile, OneDrive, and Microsoft Teams. All of their users already sign in with Azure AD credentials and have licenses assigned to them that include Azure AD Premium P1 or P2 and Microsoft Intune.

articles/active-directory/conditional-access/require-managed-devices.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ Requiring managed devices for cloud app access ties **Azure AD Conditional Acces
2828

2929
- **[Conditional Access in Azure Active Directory](../active-directory-conditional-access-azure-portal.md)** - This article provides you with a conceptual overview of Conditional Access and the related terminology.
3030
- **[Introduction to device management in Azure Active Directory](../devices/overview.md)** - This article gives you an overview of the various options you have to get devices under organizational control.
31+
- For Chrome support in **Windows 10 Creators Update (version 1703)** or later, install the [Windows 10 Accounts extension](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji). This extension is required when a Conditional Access policy requires device specific details.
3132

3233
>[!NOTE]
3334
> We recommend using Azure AD device based Conditional Access policy to get the best enforcement after initial device authentication. This includes closing sessions if the device falls out of compliance and device code flow.

articles/active-directory/develop/howto-convert-app-to-be-multi-tenant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.subservice: develop
1212
ms.topic: conceptual
1313
ms.workload: identity
14-
ms.date: 02/19/2020
14+
ms.date: 03/17/2020
1515
ms.author: ryanwi
1616
ms.reviewer: jmprieur, lenalepa, sureshja, kkrishna
1717
ms.custom: aaddev
@@ -172,7 +172,7 @@ In this article, you learned how to build an application that can sign in a user
172172

173173
## Related content
174174

175-
* [Multi-tenant application sample](https://github.com/mspnp/multitenant-saas-guidance)
175+
* [Multi-tenant application sample](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/blob/master/2-WebApp-graph-user/2-3-Multi-Tenant/README.md)
176176
* [Branding guidelines for applications][AAD-App-Branding]
177177
* [Application objects and service principal objects][AAD-App-SP-Objects]
178178
* [Integrating applications with Azure Active Directory][AAD-Integrating-Apps]

articles/active-directory/fundamentals/active-directory-data-storage-australia-newzealand.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,22 +15,20 @@ ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Identity data storage for Australian customers in Azure Active Directory
18+
# Identity data storage for Australian and New Zealand customers in Azure Active Directory
1919

2020
Identity data is stored by Azure AD in a geographical location based on the address provided by your organization when subscribing for a Microsoft Online service such as Office 365 and Azure. For information on where your Identity Customer Data is stored, you can use the [Where is your data located?](https://www.microsoft.com/trustcenter/privacy/where-your-data-is-located) section of the Microsoft Trust Center.
2121

2222
> [!NOTE]
2323
> Services and applications that integrate with Azure AD have access to Identity Customer Data. Evaluate each service and application you use to determine how Identity Customer Data is processed by that specific service and application, and whether they meet your company's data storage requirements. For more information about Microsoft services' data residency, see the Where is your data located? section of the Microsoft Trust Center.
2424
25-
For customers who provided an address in Australia, Azure AD keeps identity data for these services within Australian datacenters:
26-
- Azure AD Directory Management
27-
- Authentication
25+
For customers who provided an address in Australia and New Zealand and uses Azure AD free edition, Azure AD keeps PII data at rest within Australian datacenters.
2826

29-
All other Azure AD services store customer data in global datacenters. To locate the datacenter for a service, see [Azure Active Directory – Where is your data located?](https://www.microsoft.com/trustcenter/privacy/where-your-data-is-located)
27+
All other Azure AD premium services store customer data in global datacenters. To locate the datacenter for a service, see [Azure Active Directory – Where is your data located?](https://www.microsoft.com/trustcenter/privacy/where-your-data-is-located)
3028

3129
## Microsoft Azure multi-factor authentication (MFA)
3230

33-
MFA stores Identity Customer Data in global datacenters. To learn more about the user information collected and stored by cloud-based Azure MFA and Azure MFA Server, see [Azure Multi-Factor Authentication user data collection](https://docs.microsoft.com/azure/active-directory/authentication/concept-mfa-data-residency).
31+
MFA service in Azure AD stores Identity Customer Data in global datacenters at rest. To learn more about the user information collected and stored by cloud-based Azure MFA and Azure MFA Server, see [Azure Multi-Factor Authentication user data collection](https://docs.microsoft.com/azure/active-directory/authentication/concept-mfa-data-residency). If customers use MFA their data will be stored outside of Australia datacenters at rest.
3432

3533
## Next steps
3634
For more information about any of the features and functionality described above, see these articles:

0 commit comments

Comments
 (0)