Skip to content

Commit 59bce29

Browse files
authored
Merge pull request #103183 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/Microsoft/azure-docs (branch master)
2 parents 4e056d8 + c3561fe commit 59bce29

File tree

14 files changed

+49
-35
lines changed

14 files changed

+49
-35
lines changed

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -142,11 +142,11 @@ The ID attribute of the **ContentDefinition** element specifies the type of page
142142
| **api.error** | [exception.cshtml](https://login.microsoftonline.com/static/tenant/default/exception.cshtml) | **Error page** - Displays an error page when an exception or an error is encountered. |
143143
| **api.idpselections** | [idpSelector.cshtml](https://login.microsoftonline.com/static/tenant/default/idpSelector.cshtml) | **Identity provider selection page** - Lists identity providers that users can choose from during sign-in. The options are usually enterprise identity providers, social identity providers such as Facebook and Google+, or local accounts. |
144144
| **api.idpselections.signup** | [idpSelector.cshtml](https://login.microsoftonline.com/static/tenant/default/idpSelector.cshtml) | **Identity provider selection for sign-up** - Lists identity providers that users can choose from during sign-up. The options are usually enterprise identity providers, social identity providers such as Facebook and Google+, or local accounts. |
145-
| **api.localaccountpasswordreset** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Forgot password page** - Displays a form that users must complete to initiate a password reset. |
146-
| **api.localaccountsignin** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-in page** - Displays a form for signing in with a local account that's based on an email address or a user name. The form can contain a text input box and password entry box. |
147-
| **api.localaccountsignup** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-up page** - Displays a form for signing up for a local account that's based on an email address or a user name. The form can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. |
145+
| **api.localaccountpasswordreset** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Forgot password page** - Displays a form that users must complete to initiate a password reset. |
146+
| **api.localaccountsignin** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-in page** - Displays a form for signing in with a local account that's based on an email address or a user name. The form can contain a text input box and password entry box. |
147+
| **api.localaccountsignup** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Local account sign-up page** - Displays a form for signing up for a local account that's based on an email address or a user name. The form can contain various input controls, such as: a text input box, a password entry box, a radio button, single-select drop-down boxes, and multi-select check boxes. |
148148
| **api.phonefactor** | [multifactor-1.0.0.cshtml](https://login.microsoftonline.com/static/tenant/default/multifactor-1.0.0.cshtml) | **Multi-factor authentication page** - Verifies phone numbers, by using text or voice, during sign-up or sign-in. |
149-
| **api.selfasserted** | [selfasserted.html](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Social account sign-up page** - Displays a form that users must complete when they sign up by using an existing account from a social identity provider. This page is similar to the preceding social account sign up page, except for the password entry fields. |
150-
| **api.selfasserted.profileupdate** | [updateprofile.html](https://login.microsoftonline.com/static/tenant/default/updateProfile.cshtml) | **Profile update page** - Displays a form that users can access to update their profile. This page is similar to the social account sign up page, except for the password entry fields. |
151-
| **api.signuporsignin** | [unified.html](https://login.microsoftonline.com/static/tenant/default/unified.cshtml) | **Unified sign-up or sign-in page** - Handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook or Google+, or local accounts. |
149+
| **api.selfasserted** | [selfasserted.cshtml](https://login.microsoftonline.com/static/tenant/default/selfAsserted.cshtml) | **Social account sign-up page** - Displays a form that users must complete when they sign up by using an existing account from a social identity provider. This page is similar to the preceding social account sign up page, except for the password entry fields. |
150+
| **api.selfasserted.profileupdate** | [updateprofile.cshtml](https://login.microsoftonline.com/static/tenant/default/updateProfile.cshtml) | **Profile update page** - Displays a form that users can access to update their profile. This page is similar to the social account sign up page, except for the password entry fields. |
151+
| **api.signuporsignin** | [unified.cshtml](https://login.microsoftonline.com/static/tenant/default/unified.cshtml) | **Unified sign-up or sign-in page** - Handles the user sign-up and sign-in process. Users can use enterprise identity providers, social identity providers such as Facebook or Google+, or local accounts. |
152152

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ Passwords are *not* written back in any of the following situations:
160160
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com)
161161

162162
> [!WARNING]
163-
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is supported as a preview feature of Azure AD Connect. For more information, see the article, [Implement password hash synchronization with Azure AD Connect sync](../hybrid/how-to-connect-password-hash-synchronization.md#public-preview-of-synchronizing-temporary-passwords-and-force-password-reset-on-next-logon).
163+
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is supported as a preview feature of Azure AD Connect. For more information, see the article, [Implement password hash synchronization with Azure AD Connect sync](../hybrid/how-to-connect-password-hash-synchronization.md#public-preview-of-synchronizing-temporary-passwords-and-force-password-change-on-next-logon).
164164
165165
## Next steps
166166

articles/active-directory/cloud-provisioning/concept-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ To view the schema and verify it, follow these steps.
6969
1. Go to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer).
7070
1. Sign in with your global administrator account.
7171
1. On the left, select **modify permissions** and ensure that **Directory.ReadWrite.All** is *Consented*.
72-
1. Run the query https://graph.microsoft.com/beta/serviceprincipals/. This query returns a list of service principals.
72+
1. Run the query https://graph.microsoft.com/beta/serviceprincipals/?$filter=startswith(Displayname,'Active'). This query returns a filtered list of service principals.
7373
1. Locate `"appDisplayName": "Active Directory to Azure Active Directory Provisioning"` and note the value for `"id"`.
7474
```
7575
"value": [

articles/active-directory/cloud-provisioning/reference-cloud-provisioning-faq.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,10 @@ Cloud provisioning is scheduled to run every 2 mins. Every 2 mins, any user, gro
2626

2727
This is expected. The failures are due to the user object not present in Azure AD. Once the user is provisioned to Azure AD, password hashes should provisioning in the subsequent run. Wait for a couple of runs and confirm that password hash sync no longer has the errors.
2828

29+
**Q: What happens if the Active Directory instance has attributes that are not supported by cloud provisoning (for instance, directory extensions)?**
30+
31+
Cloud provisioning will run and provision the supported attributes. The unsupported attributes will not be provisioned to Azure AD. Review the directory extensions in Active Directory and ensure that you don't need those attribute to flow to Azure AD. If one or more attributes are required, consider using Azure AD Connect sync or moving the required information to one of the supported attributes (for instance, extension attributes 1-15).
32+
2933
**Q: What's the difference between Azure AD Connect sync and cloud provisioning?**
3034

3135
With Azure AD Connect sync, provisioning runs on the on-premises sync server. Configuration is stored on the on-premises sync server. With Azure AD Connect cloud provisioning, the provisioning configuration is stored in the cloud and runs in the cloud as part of the Azure AD provisioning service.

articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@ The following table provides a comparison between Azure AD Connect and Azure AD
4242
| Support for contact objects |||
4343
| Support for device objects || |
4444
| Allow basic customization for attribute flows |||
45+
| Sychronize Exchange online attributes |||
46+
| Synchronize extension attributes 1-15 |||
4547
| Synchronize customer defined AD attributes (directory extensions) || |
4648
| Support for Password Hash Sync |||
4749
| Support for Pass-Through Authentication |||
@@ -56,7 +58,7 @@ The following table provides a comparison between Azure AD Connect and Azure AD
5658
| Allow advanced customization for attribute flows || |
5759
| Support for writeback (passwords, devices, groups) || |
5860
| Azure AD Domain Services support|| |
59-
| Exchange hybrid configuration || |
61+
| [Exchange hybrid writeback](../hybrid/reference-connect-sync-attributes-synchronized.md#exchange-hybrid-writeback) || |
6062
| Support for more than 50,000 objects per AD domain || |
6163

6264
## Next steps

articles/active-directory/hybrid/how-to-connect-password-hash-synchronization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Caveat: If there are synchronized accounts that need to have non-expiring passwo
119119
> [!NOTE]
120120
> This feature is in Public Preview right now.
121121
122-
#### Public Preview of synchronizing temporary passwords and "Force Password Reset on Next Logon"
122+
#### Public Preview of synchronizing temporary passwords and "Force Password Change on Next Logon"
123123

124124
It is typical to force a user to change their password during their first logon, especially after an admin password reset occurs. It is commonly known as setting a "temporary" password and is completed by checking the "User must change password at next logon" flag on a user object in Active Directory (AD).
125125

articles/active-directory/hybrid/reference-connect-ports.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -30,21 +30,21 @@ This table describes the ports and protocols that are required for communication
3030
| --- | --- | --- |
3131
| DNS |53 (TCP/UDP) |DNS lookups on the destination forest. |
3232
| Kerberos |88 (TCP/UDP) |Kerberos authentication to the AD forest. |
33-
| MS-RPC |135 (TCP/UDP) |Used during the initial configuration of the Azure AD Connect wizard when it binds to the AD forest, and also during Password synchronization. |
33+
| MS-RPC |135 (TCP) |Used during the initial configuration of the Azure AD Connect wizard when it binds to the AD forest, and also during Password synchronization. |
3434
| LDAP |389 (TCP/UDP) |Used for data import from AD. Data is encrypted with Kerberos Sign & Seal. |
35-
| SMB | 445 (TCP/UDP) |Used by Seamless SSO to create a computer account in the AD forest. |
35+
| SMB | 445 (TCP) |Used by Seamless SSO to create a computer account in the AD forest. |
3636
| LDAP/SSL |636 (TCP/UDP) |Used for data import from AD. The data transfer is signed and encrypted. Only used if you are using SSL. |
37-
| RPC |49152- 65535 (Random high RPC Port)(TCP/UDP) |Used during the initial configuration of Azure AD Connect when it binds to the AD forests, and during Password synchronization. See [KB929851](https://support.microsoft.com/kb/929851), [KB832017](https://support.microsoft.com/kb/832017), and [KB224196](https://support.microsoft.com/kb/224196) for more information. |
38-
|WinRM | 5985 (TCP/UDP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard|
39-
|AD DS Web Services | 9389 (TCP/UDP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard |
37+
| RPC |49152- 65535 (Random high RPC Port)(TCP) |Used during the initial configuration of Azure AD Connect when it binds to the AD forests, and during Password synchronization. See [KB929851](https://support.microsoft.com/kb/929851), [KB832017](https://support.microsoft.com/kb/832017), and [KB224196](https://support.microsoft.com/kb/224196) for more information. |
38+
|WinRM | 5985 (TCP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard|
39+
|AD DS Web Services | 9389 (TCP) |Only used if you are installing AD FS with gMSA by Azure AD Connect Wizard |
4040

4141
## Table 2 - Azure AD Connect and Azure AD
4242
This table describes the ports and protocols that are required for communication between the Azure AD Connect server and Azure AD.
4343

4444
| Protocol | Ports | Description |
4545
| --- | --- | --- |
46-
| HTTP |80 (TCP/UDP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
47-
| HTTPS |443(TCP/UDP) |Used to synchronize with Azure AD. |
46+
| HTTP |80 (TCP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
47+
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
4848

4949
For a list of URLs and IP addresses you need to open in your firewall, see [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2).
5050

@@ -53,23 +53,23 @@ This table describes the ports and protocols that are required for communication
5353

5454
| Protocol | Ports | Description |
5555
| --- | --- | --- |
56-
| HTTP |80 (TCP/UDP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
57-
| HTTPS |443(TCP/UDP) |Used to synchronize with Azure AD. |
56+
| HTTP |80 (TCP) |Used to download CRLs (Certificate Revocation Lists) to verify SSL certificates. |
57+
| HTTPS |443(TCP) |Used to synchronize with Azure AD. |
5858
| WinRM |5985 |WinRM Listener |
5959

6060
## Table 4 - WAP and Federation Servers
6161
This table describes the ports and protocols that are required for communication between the Federation servers and WAP servers.
6262

6363
| Protocol | Ports | Description |
6464
| --- | --- | --- |
65-
| HTTPS |443(TCP/UDP) |Used for authentication. |
65+
| HTTPS |443(TCP) |Used for authentication. |
6666

6767
## Table 5 - WAP and Users
6868
This table describes the ports and protocols that are required for communication between users and the WAP servers.
6969

7070
| Protocol | Ports | Description |
7171
| --- | --- | --- |
72-
| HTTPS |443(TCP/UDP) |Used for device authentication. |
72+
| HTTPS |443(TCP) |Used for device authentication. |
7373
| TCP |49443 (TCP) |Used for certificate authentication. |
7474

7575
## Table 6a & 6b - Pass-through Authentication with Single Sign On (SSO) and Password Hash Sync with Single Sign On (SSO)

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-password-vaulting.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ You should already have published and tested your app with Application Proxy. If
3030
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
3131
1. Select **Azure Active Directory** > **Enterprise applications** > **All applications**.
3232
1. From the list, select the app that you want to set up with SSO.
33+
1. Select **Application Proxy**.
34+
1. Change the **Pre Authentication type** to **Passthrough** and select **Save**. Later you can switch back to **Azure Active Directory** type again!
3335
1. Select **Single sign-on**.
3436

3537
![Select Single sign-on from the app's overview page](./media/application-proxy-configure-single-sign-on-password-vaulting/select-sso.png)
@@ -40,14 +42,25 @@ You should already have published and tested your app with Application Proxy. If
4042
![Choose password-based Sign-on and enter your URL](./media/application-proxy-configure-single-sign-on-password-vaulting/password-sso.png)
4143

4244
1. Select **Save**.
45+
1. Select **Application Proxy**.
46+
1. Change the **Pre Authentication type** to **Azure Active Directory** and select **Save**.
47+
1. Select **Users and Groups**.
48+
1. Assign users to the application with selecting **Add user**.
49+
1. If you want to predefine credentials for a user, check the box front of the user name and select **Update credentials**.
50+
1. Select **Azure Active Directory** > **App registrations** > **All applications**.
51+
1. From the list, select the app that you configured with Password SSO.
52+
1. Select **Branding**.
53+
1. Update the **Home page URL** with the **Sign on URL** from the Password SSO page and select **Save**.
54+
55+
4356

4457
<!-- Need to repro?
4558
7. The page should tell you that a sign-in form was successfully detected at the provided URL. If it doesn't, select **Configure [your app name] Password Single Sign-on Settings** and choose **Manually detect sign-in fields**. Follow the instructions to point out where the sign-in credentials go.
4659
-->
4760

4861
## Test your app
4962

50-
Go to external URL that you configured for remote access to your application. Sign in with your credentials for that app (or the credentials for a test account that you set up with access). Once you sign in successfully, you should be able to leave the app and come back without entering your credentials again.
63+
Go to the My Apps portal. Sign in with your credentials (or the credentials for a test account that you set up with access). Once you signed in successfully, click on the icon of the app. This might trigger the installation of the My Apps Secure Sign-in browser extension. If your user had predefined credentials the authentication to the app should happen automatically, otherwise you must specify the user name or password for the first time.
5164

5265
## Next steps
5366

articles/app-service-mobile/app-service-mobile-xamarin-forms-get-started-push.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ With the back end configured with FCM, you can add components and codes to the c
198198
intent.AddFlags(ActivityFlags.ClearTop);
199199
//Unique request code to avoid PendingIntent collision.
200200
var requestCode = new Random().Next();
201-
201+
var pendingIntent = PendingIntent.GetActivity(this, requestCode, intent, PendingIntentFlags.OneShot);
202202
var notificationBuilder = new NotificationCompat.Builder(this)
203203
.SetSmallIcon(Resource.Drawable.ic_stat_ic_notification)
204204
.SetContentTitle("New Todo Item")

articles/azure-functions/functions-premium-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following features are available to function apps deployed to a Premium plan
3333

3434
### Pre-warmed instances
3535

36-
If no events and executions occur today in the Consumption plan, your app may scale down to zero instances. When new events come in, a new instance needs to be specialized with your app running on it. Specializing new instances may take some time depending on the app. This additional latency on the first call is often called app cold start.
36+
If no events and executions occur today in the Consumption plan, your app may scale in to zero instances. When new events come in, a new instance needs to be specialized with your app running on it. Specializing new instances may take some time depending on the app. This additional latency on the first call is often called app cold start.
3737

3838
In the Premium plan, you can have your app pre-warmed on a specified number of instances, up to your minimum plan size. Pre-warmed instances also let you pre-scale an app before high load. As the app scales out, it first scales into the pre-warmed instances. Additional instances continue to buffer out and warm immediately in preparation for the next scale operation. By having a buffer of pre-warmed instances, you can effectively avoid cold start latencies. Pre-warmed instances is a feature of the Premium plan, and you need to keep at least one instance running and available at all times the plan is active.
3939

0 commit comments

Comments
 (0)