Skip to content

Commit 550ebaa

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into frontdoortitlelengthseo
2 parents bf0dc6e + c0e51e0 commit 550ebaa

File tree

56 files changed

+1522
-6390
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+1522
-6390
lines changed

articles/active-directory/authentication/concept-password-ban-bad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Since this password is at least five (5) points, it is accepted.
165165
| Users synchronized from on-premises Windows Server Active Directory | Azure AD Premium P1 or P2 | Azure AD Premium P1 or P2 |
166166

167167
> [!NOTE]
168-
> On-premises Windows Server Active Directory users that not synchronized to Azure Active Directory also avail the benefits of Azure AD password protection based on existing licensing for synchronized users.
168+
> On-premises Windows Server Active Directory users that are not synchronized to Azure Active Directory also benefits from Azure AD password protection based on existing licensing for synchronized users.
169169
170170
Additional licensing information, including costs, can be found on the [Azure Active Directory pricing site](https://azure.microsoft.com/pricing/details/active-directory/).
171171

articles/active-directory/devices/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ See below on how these actions can be rectified.
117117

118118
### Q: Does Windows 10 device registration in Azure AD support TPMs in FIPS mode?
119119

120-
**A:** No, currently device registration on Windows 10 for all device states - Hybrid Azure AD join, Azure AD join, and Azure AD registered - does not support TPMs in FIPS mode. To successfully join or register to Azure AD, FIPS mode needs to be turned off for the TPMs on those devices
120+
**A:** Windows 10 device registration only supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join or Hybrid Azure AD join. Note that Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.
121121

122122
---
123123

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,8 @@ If your Windows 10 domain joined devices are [Azure AD registered](overview.md#g
9090
- You can prevent your domain joined device from being Azure AD registered by adding this registry key - HKLM\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin, "BlockAADWorkplaceJoin"=dword:00000001.
9191
- In Windows 10 1803, if you have Windows Hello for Business configured, the user needs to re-setup Windows Hello for Business after the dual state clean up.This issue has been addressed with KB4512509
9292

93-
93+
> [!NOTE]
94+
> The Azure AD registered device will not be automatically removed if it is managed by Intune.
9495
9596
## Review controlled validation of hybrid Azure AD join
9697

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to use managed identities for Azure resources on an Azure VM with Azure SDKs
2+
title: Use managed identities on an Azure VM with Azure SDKs - Azure AD
33
description: Code samples for using Azure SDKs with an Azure VM that has managed identities for Azure resources.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to use managed identities for Azure resources on an Azure VM for sign in
2+
title: Use managed identities on an Azure VM for sign in - Azure AD
33
description: Step by step instructions and examples for using an Azure VM managed identities for Azure resources service principal for script client sign in and resource access.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to view the service principal of a managed identity using PowerShell
2+
title: View the service principal of a managed identity using PowerShell - Azure AD
33
description: Step-by-step instructions for viewing the service principal of a managed identity using PowerShell.
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/managed-identities-azure-resources/howto-assign-access-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to assign a managed identity access to an Azure resource using Azure CLI
2+
title: Assign a managed identity access to a resource using Azure CLI - Azure AD
33
description: Step by step instructions for assigning a managed identity on one resource, access to another resource, using Azure CLI.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/howto-assign-access-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to assign a managed identity access to an Azure resource using PowerShell
2+
title: Assign a managed identity access to a resource using PowerShell - Azure AD
33
description: Step by step instructions for assigning a managed identity on one resource, access to another resource, using PowerShell.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/howto-migrate-vm-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Stop using the managed identity VM extension and start using the Azure Instance Metadata Service endpoint
2+
title: Stop using managed identity VM extension - Azure AD
33
description: Step by step instructions to stop using the VM extension and start using the Azure Instance Metadata Service (IMDS) for authentication.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/known-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: FAQs and known issues with managed identities for Azure resources
2+
title: FAQs and known issues with managed identities - Azure AD
33
description: Known issues with managed identities for Azure resources.
44
services: active-directory
55
documentationcenter:

0 commit comments

Comments
 (0)