Skip to content

Commit 548ffeb

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents af2517a + 0719b8a commit 548ffeb

File tree

374 files changed

+5435
-3403
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

374 files changed

+5435
-3403
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13399,6 +13399,11 @@
1339913399
"redirect_url": "/previous-versions/azure/search/search-how-to-index-power-query-data-sources",
1340013400
"redirect_document_id": false
1340113401
},
13402+
{
13403+
"source_path_from_root": "/articles/search/search-performance-optimization.md",
13404+
"redirect_url": "/azure/search/search-reliability",
13405+
"redirect_document_id": true
13406+
},
1340213407
{
1340313408
"source_path_from_root": "/articles/search/cognitive-search-quickstart-ocr.md",
1340413409
"redirect_url": "/azure/search/cognitive-search-quickstart-blob",

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -75,16 +75,16 @@ A job can go into quarantine regardless of failure counts for issues such as adm
7575

7676
The logic documented here may be different for certain connectors to ensure best customer experience, but we generally have the below retry cycles after a failure:
7777

78-
After the first failure, the first retry happens within the next 2 hours (usually in the next sync cycle).
79-
- The second retry happens 6 hours after the first failure.
80-
- The third retry happens 12 hours after the first failure.
81-
- The fourth retry happens 24 hours after the first failure.
82-
- The fifth retry happens 48 hours after the first failure.
83-
- The sixth retry happens 72 hours after the first failure.
84-
- The seventh retry happens 96 hours after the first failure.
85-
- The eighth retry happens 120 hours after the first failure.
86-
87-
This cycle is repeated every 24 hours until the 30th day when retries are stopped and the job is disabled.
78+
After the failure, the first retry will happen in 6 hours.
79+
- The second retry happens 12 hours after the first failure.
80+
- The third retry happens 24 hours after the first failure.
81+
- The fourth retry happens 48 hours after the first failure.
82+
- The fifth retry happens 96 hours after the first failure.
83+
- The sixth retry happens 192 hours after the first failure.
84+
- The seventh retry happens 384 hours after the first failure.
85+
- The eighth retry happens 768 hours after the first failure.
86+
87+
The retries are stopped after the 8th retry and the escrow entry is removed. The job will continue unless it hits the escrow thresholds from the section above
8888

8989

9090
## How do I get my application out of quarantine?

articles/active-directory/develop/msal-net-aad-b2c-considerations.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 05/07/2020
12+
ms.date: 02/21/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: saeeda, jeferrie
1515
ms.custom: "devx-track-csharp, aaddev"
@@ -29,9 +29,9 @@ This article applies to MSAL.NET 3.x. For MSAL.NET 2.x, see [Azure AD B2C specif
2929

3030
The authority format for Azure AD B2C is: `https://{azureADB2CHostname}/tfp/{tenant}/{policyName}`
3131

32-
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, *contosob2c.b2clogin.com*.
33-
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, *contosob2c.onmicrosoft.com* or a GUID, respectively.
34-
- `policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like *b2c_1_susi*.
32+
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, _contosob2c.b2clogin.com_.
33+
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, _contosob2c.onmicrosoft.com_ or a GUID, respectively.
34+
- `policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like _b2c_1_susi_.
3535

3636
For more information about Azure AD B2C authorities, see [Set redirect URLs to b2clogin.com](../../active-directory-b2c/b2clogin.md).
3737

@@ -77,7 +77,7 @@ catch (MsalUiRequiredException ex)
7777
.WithAccount(account)
7878
.WithParentActivityOrWindow(ParentActivityOrWindow)
7979
.ExecuteAsync();
80-
}
80+
}
8181
```
8282

8383
In the preceding code snippet:
@@ -116,12 +116,12 @@ private async void EditProfileButton_Click(object sender, RoutedEventArgs e)
116116

117117
For more information on the ROPC flow, see [Sign in with resource owner password credentials grant](v2-oauth-ropc.md).
118118

119-
The ROPC flow is **not recommended** because asking a user for their password in your application is not secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
119+
The ROPC flow is **not recommended** because asking a user for their password in your application isn't secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
120120

121121
By using username/password in an ROPC flow, you sacrifice several things:
122122

123123
- Core tenets of modern identity: The password can be fished or replayed because the shared secret can be intercepted. By definition, ROPC is incompatible with passwordless flows.
124-
- Users who need to do MFA won't be able to sign in (as there is no interaction).
124+
- Users who use multi-factor authentication (MFA) won't be able to sign in as there's no interaction.
125125
- Users won't be able to use single sign-on (SSO).
126126

127127
### Configure the ROPC flow in Azure AD B2C
@@ -137,21 +137,19 @@ AcquireTokenByUsernamePassword(
137137
SecureString password)
138138
```
139139

140-
This `AcquireTokenByUsernamePassword` method takes the following parameters:
140+
The `AcquireTokenByUsernamePassword` method takes the following parameters:
141141

142-
- The *scopes* for which to obtain an access token.
143-
- A *username*.
144-
- A SecureString *password* for the user.
142+
- The _scopes_ for which to obtain an access token.
143+
- A _username_.
144+
- A SecureString _password_ for the user.
145145

146146
### Limitations of the ROPC flow
147147

148148
The ROPC flow **only works for local accounts**, where your users have registered with Azure AD B2C using an email address or username. This flow doesn't work when federating to an external identity provider supported by Azure AD B2C (Facebook, Google, etc.).
149149

150150
## Google auth and embedded webview
151151

152-
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` is not a trusted authority with Google, so users will not be able to authenticate.
153-
154-
We'll provide an update to this [issue](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/688) if things change.
152+
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` isn't a trusted authority with Google, so users won't be able to authenticate.
155153

156154
## Token caching in MSAL.NET
157155

@@ -186,6 +184,6 @@ For more information about specifying which claims are returned by your user flo
186184

187185
More details about acquiring tokens interactively with MSAL.NET for Azure AD B2C applications are provided in the following sample.
188186

189-
| Sample | Platform | Description|
190-
|------ | -------- | -----------|
191-
|[active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned.|
187+
| Sample | Platform | Description |
188+
| ----------------------------------------------------------------------------------------------------------- | --------------------------------- | --------------------------------------------------------------------------------------------------------------------------------- |
189+
| [active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned. |

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -424,10 +424,8 @@ The following service plans cannot be assigned together:
424424
| Service Plan Name | GUID |
425425
| --- | --- |
426426
| EXCHANGE_B_STANDARD | 90927877-dcff-4af6-b346-2332c0b15bb7 |
427-
| EXCHANGE_L_STANDARD | d42bdbd6-c335-4231-ab3d-c8f348d5aff5 |
428427
| EXCHANGE_S_ARCHIVE | da040e0a-b393-4bea-bb76-928b3fa1cf5a |
429428
| EXCHANGE_S_DESKLESS | 4a82b400-a79f-41a4-b4e2-e94f5787b113 |
430-
| EXCHANGE_S_ENTERPRISE | efb87545-963c-4e0d-99df-69c6916d9eb0 |
431429
| EXCHANGE_S_ESSENTIALS | 1126bef5-da20-4f07-b45e-ad25d2581aa8 |
432430
| EXCHANGE_S_STANDARD | 9aaf7827-d63c-4b61-89c3-182f06f82e5c |
433431
| EXCHANGE_S_STANDARD_MIDMARKET | fc52cc4b-ed7d-472d-bbe7-b081c23ecc56 |

articles/active-directory/fundamentals/data-protection-considerations.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,6 @@ For more information about Secret encryption at rest, see the following table.
8383

8484
* [Microsoft Service Trust Documents](https://servicetrust.microsoft.com/Documents/TrustDocuments)
8585
* [Microsoft Azure Trust Center](https://azure.microsoft.com/overview/trusted-cloud/)
86-
* [Where is my data? - Office 365 documentation](http://o365datacentermap.azurewebsites.net/)
8786
* [Recover from deletions in Azure Active Directory](recover-from-deletions.md)
8887

8988
## Next steps
16.3 KB
Loading
-1.67 KB
Loading

articles/active-directory/reports-monitoring/overview-recommendations.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.topic: overview
99
ms.tgt_pltfrm: na
1010
ms.workload: identity
1111
ms.subservice: report-monitor
12-
ms.date: 02/16/2023
12+
ms.date: 02/24/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: hafowler
1515
ms.collection: M365-identity-device-management
@@ -48,9 +48,9 @@ Each recommendation contains a description, a summary of the value of addressing
4848

4949
Each recommendation provides the same set of details that explain what the recommendation is, why it's important, and how to fix it.
5050

51-
The **Status** of a recommendation can be updated manually or automatically. If all resources are addressed according to the action plan, the status will automatically change to *Completed* the next time the recommendations service runs. The recommendation service runs every 24-48 hours, depending on the recommendation.
51+
The **Status** of a recommendation can be updated manually or automatically by the system. If all resources are addressed according to the action plan, the status automatically changes to *Completed* the next time the recommendations service runs. The recommendation service runs every 24-48 hours, depending on the recommendation.
5252

53-
![Screenshot of the Mark as options.](./media/overview-recommendations/recommendations-object.png)
53+
![Screenshot of the Mark as options.](./media/overview-recommendations/recommendation-mark-as-options.png)
5454

5555
The **Priority** of a recommendation could be low, medium, or high. These values are determined by several factors, such as security implications, health concerns, or potential breaking changes.
5656

@@ -118,17 +118,16 @@ The recommendations listed in the following table are available to all Azure AD
118118

119119
1. The recommendation service automatically marks the recommendation as complete, but if you need to manually change the status of a recommendation, select **Mark as** from the top of the page and select a status.
120120

121-
![Screenshot of the Mark as options, to highlight the difference from the resource menu.](./media/overview-recommendations/recommendations-object.png)
121+
![Screenshot of the Mark as options, to highlight the difference from the resource menu.](./media/overview-recommendations/recommendation-mark-as-options.png)
122122

123-
- Mark a recommendation as **Completed** if all impacted resources have been addressed.
124-
- Active resources may still appear in the list of resources for manually completed recommendations. If the resource is completed, the service will update the status the next time the service runs.
125-
- If the service identifies an active resource for a manually completed recommendation the next time the service runs, the recommendation will automatically change back to **Active**.
126-
- Completing a recommendation is the only action collected in the audit log. To view these logs, go to **Azure AD** > **Audit logs** and filter the service to "Azure AD recommendations."
127123
- Mark a recommendation as **Dismissed** if you think the recommendation is irrelevant or the data is wrong.
128-
- Azure AD will ask for a reason why you dismissed the recommendation so we can improve the service.
124+
- Azure AD asks for a reason why you dismissed the recommendation so we can improve the service.
129125
- Mark a recommendation as **Postponed** if you want to address the recommendation at a later time.
130-
- The recommendation will become **Active** when the selected date occurs.
126+
- The recommendation becomes **Active** when the selected date occurs.
131127
- You can reactivate a completed or postponed recommendation to keep it top of mind and reassess the resources.
128+
- Recommendations change to **Completed** if all impacted resources have been addressed.
129+
- If the service identifies an active resource for a completed recommendation the next time the service runs, the recommendation will automatically change back to **Active**.
130+
- Completing a recommendation is the only action collected in the audit log. To view these logs, go to **Azure AD** > **Audit logs** and filter the service to "Azure AD recommendations."
132131

133132
Continue to monitor the recommendations in your tenant for changes.
134133

articles/active-directory/reports-monitoring/recommendation-migrate-to-authenticator.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,18 @@ ms.service: active-directory
88
ms.topic: reference
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 02/07/2023
11+
ms.date: 02/24/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: hafowler
1414

1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Azure AD recommendation: Migrate to Microsoft Authenticator
18+
# Azure AD recommendation: Migrate to Microsoft Authenticator (preview)
1919

2020
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
2121

22-
This article covers the recommendation to migrate users to the Microsoft Authenticator app. This recommendation is called `useAuthenticatorApp` in the recommendations API in Microsoft Graph.
22+
This article covers the recommendation to migrate users to the Microsoft Authenticator app, which is currently a preview recommendation. This recommendation is called `useAuthenticatorApp` in the recommendations API in Microsoft Graph.
2323

2424
## Description
2525

0 commit comments

Comments
 (0)