Skip to content

Commit 5965328

Browse files
authored
Merge pull request #244020 from MicrosoftDocs/main
7/5/2023 PM Publish
2 parents 206c001 + da00717 commit 5965328

File tree

170 files changed

+8536
-1168
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

170 files changed

+8536
-1168
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1045,7 +1045,6 @@
10451045
".openpublishing.redirection.baremetal-infrastructure.json",
10461046
".openpublishing.redirection.defender-for-cloud.json",
10471047
".openpublishing.redirection.defender-for-iot.json",
1048-
".openpublishing.redirection.healthcare-apis.json",
10491048
".openpublishing.redirection.iot-hub-device-update.json",
10501049
".openpublishing.redirection.json",
10511050
".openpublishing.redirection.key-vault.json",
@@ -1076,6 +1075,7 @@
10761075
"articles/event-grid/.openpublishing.redirection.event-grid.json",
10771076
"articles/event-hubs/.openpublishing.redirection.event-hubs.json",
10781077
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
1078+
"articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json",
10791079
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
10801080
"articles/iot-central/.openpublishing.redirection.iot-central.json",
10811081
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23638,11 +23638,6 @@
2363823638
"redirect_url": "/azure/azure-monitor/app/java-get-started-supplemental",
2363923639
"redirect_document_id": true
2364023640
},
23641-
{
23642-
"source_path_from_root": "/articles/healthcare-apis/dicom/dicom-cast-access-request.md",
23643-
"redirect_url": "/azure/healthcare-apis/dicom/dicom-cast-overview",
23644-
"redirect_document_id": false
23645-
},
2364623641
{
2364723642
"source_path_from_root": "/articles/virtual-network/nat-gateway/faq.yml",
2364823643
"redirect_url": "/azure/nat-gateway/faq",

articles/active-directory-b2c/conditional-access-user-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -208,7 +208,7 @@ The following template can be used to create a Conditional Access policy with di
208208

209209
Identity Protection can calculate what it believes is normal for a user's behavior and use that to base decisions for their risk. User risk is a calculation of probability that an identity has been compromised. B2C tenants with P2 licenses can create Conditional Access policies incorporating user risk. When a user is detected as at risk, you can require that they securely change their password to remediate the risk and gain access to their account. We highly recommend setting up a user risk policy to require a secure password change so users can self-remediate.
210210

211-
Learn more about [user risk in Identity Protection](../active-directory/identity-protection/concept-identity-protection-risks.md#user-linked-detections), taking into account the [limitations on Identity Protection detections for B2C](identity-protection-investigate-risk.md#service-limitations-and-considerations).
211+
Learn more about [user risk in Identity Protection](../active-directory/identity-protection/concept-identity-protection-risks.md), taking into account the [limitations on Identity Protection detections for B2C](identity-protection-investigate-risk.md#service-limitations-and-considerations).
212212

213213
Configure Conditional Access through Azure portal or Microsoft Graph APIs to enable a user risk-based Conditional Access policy requiring multifactor authentication (MFA) and password change when user risk is medium OR high.
214214

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Configure Azure AD Multi-Factor Authentication
3-
description: Learn how to configure settings for Azure AD Multi-Factor Authentication in the Azure portal
3+
description: Learn how to configure settings for Azure AD Multi-Factor Authentication
44

55
services: multi-factor-authentication
66
ms.service: active-directory
@@ -18,9 +18,9 @@ ms.custom: contperf-fy20q4
1818
---
1919
# Configure Azure AD Multi-Factor Authentication settings
2020

21-
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications. Some settings are available directly in the Azure portal for Azure Active Directory (Azure AD), and some are in a separate Azure AD Multi-Factor Authentication portal.
21+
To customize the end-user experience for Azure AD Multi-Factor Authentication, you can configure options for settings like account lockout thresholds or fraud alerts and notifications.
2222

23-
The following Azure AD Multi-Factor Authentication settings are available in the Azure portal:
23+
The following Azure AD Multi-Factor Authentication settings are available:
2424

2525
| Feature | Description |
2626
| ------- | ----------- |

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/01/2023
9+
ms.date: 07/05/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -90,8 +90,9 @@ If you're assigned the *Authentication Administrator* role, you can require user
9090
1. On the left, select **Azure Active Directory** > **Users** > **All users**.
9191
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
9292
- **Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
93-
- **Require Re-register MFA** deactivates the user's hardware OATH tokens and deletes the following authentication methods from this user: phone numbers, Microsoft Authenticator apps and software OATH tokens. If needed, the user is requested to set up a new MFA authentication method the next time they sign in.
94-
93+
- **Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
94+
> [!NOTE]
95+
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
9596
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
9697

9798
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Azure portal":::

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 01/24/2023
9+
ms.date: 06/14/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -28,11 +28,11 @@ For example, when accessing a sensitive application an administrator may factor
2828

2929
## Sign-in risk
3030

31-
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), sign-in risk can be evaluated as part of a Conditional Access policy. Sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. More information about sign-in risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md#sign-in-risk) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
31+
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), sign-in risk can be evaluated as part of a Conditional Access policy. Sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. More information about sign-in risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
3232

3333
## User risk
3434

35-
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. More information about user risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md#user-linked-detections) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
35+
For customers with access to [Identity Protection](../identity-protection/overview-identity-protection.md), user risk can be evaluated as part of a Conditional Access policy. User risk represents the probability that a given identity or account is compromised. More information about user risk can be found in the articles, [What is risk](../identity-protection/concept-identity-protection-risks.md) and [How To: Configure and enable risk policies](../identity-protection/howto-identity-protection-configure-risk-policies.md).
3636

3737
## Device platforms
3838

@@ -213,7 +213,4 @@ There’s a new optional condition in Conditional Access called filter for devic
213213
## Next steps
214214

215215
- [Conditional Access: Grant](concept-conditional-access-grant.md)
216-
217-
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
218-
219-
216+
- [Common Conditional Access policies](concept-conditional-access-policy-common.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Most users have a normal behavior that can be tracked, when they fall outside of this norm it could be risky to allow them to just sign in. You may want to block that user or maybe just ask them to perform multifactor authentication to prove that they're really who they say they are.
2121

22-
A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection sign-in risk detections](../identity-protection/concept-identity-protection-risks.md#sign-in-risk).
22+
A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection sign-in risk detections](../identity-protection/concept-identity-protection-risks.md).
2323

2424
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes like sign-in frequency in the policy.
2525

articles/active-directory/develop/identity-platform-integration-checklist.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Use the following checklist to ensure that your application is effectively integ
3737

3838
## Branding
3939

40-
![checkbox](./media/integration-checklist/checkbox-two.svg) Adhere to the [Branding guidelines for applications](howto-add-branding-in-azure-ad-apps.md).
40+
![checkbox](./media/integration-checklist/checkbox-two.svg) Adhere to the [Branding guidelines for applications](howto-add-branding-in-apps.md).
4141

4242
![checkbox](./media/integration-checklist/checkbox-two.svg) Provide a meaningful name and logo for your application. This information appears on your [application’s consent prompt](application-consent-experience.md). Make sure your name and logo are representative of your company/product so that users can make informed decisions. Ensure that you're not violating any trademarks.
4343

articles/active-directory/external-identities/one-time-passcode.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ Email one-time passcode guest users can also use application endpoints that incl
3939

4040
You can also give email one-time passcode guest users a direct link to an application or resource by including your tenant information, for example `https://myapps.microsoft.com/signin/Twitter/<application ID?tenantId=<your tenant ID>`.
4141

42+
> [!NOTE]
43+
> Email one-time passcode guest users can sign in to Microsoft Teams directly from the common endpoint without choosing **Sign-in options**. During the sign-in process to Microsoft Teams, the guest user can select a link to send a one-time passcode.
44+
4245
## User experience for one-time passcode guest users
4346

4447
When the email one-time passcode feature is enabled, newly invited users [who meet certain conditions](#when-does-a-guest-user-get-a-one-time-passcode) will use one-time passcode authentication. Guest users who redeemed an invitation before email one-time passcode was enabled will continue to use their same authentication method.

0 commit comments

Comments
 (0)