Skip to content

Commit 5be8891

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into gen2DiskUpdate
2 parents 1b32616 + 43f028a commit 5be8891

File tree

239 files changed

+1763
-1600
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

239 files changed

+1763
-1600
lines changed

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ This topic:
3333

3434
To configure certificate-based authentication, the following statements must be true:
3535

36-
- Certificate-based authentication (CBA) is only supported for Federated environments for browser applications or native clients using modern authentication (ADAL). The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts.
36+
- Certificate-based authentication (CBA) is only supported for Federated environments for browser applications, native clients using modern authentication (ADAL), or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts.
3737
- The root certificate authority and any intermediate certificate authorities must be configured in Azure Active Directory.
3838
- Each certificate authority must have a certificate revocation list (CRL) that can be referenced via an internet-facing URL.
3939
- You must have at least one certificate authority configured in Azure Active Directory. You can find related steps in the [Configure the certificate authorities](#step-2-configure-the-certificate-authorities) section.

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,14 @@ Enabled by Azure AD Identity Protection - This method uses the Azure AD Identity
3838

3939
User accounts in Azure Multi-Factor Authentication have the following three distinct states:
4040

41+
> [!IMPORTANT]
42+
> Enabling Azure MFA through a Conditional Access policy will not change the state of the user. Do not be alarmed users appear disabled. Conditional Access does not change the state. **Organizations should not enable or enforce users if they are utilizing Conditional Access policies.**
43+
4144
| Status | Description | Non-browser apps affected | Browser apps affected | Modern authentication affected |
42-
|:---:|:---:|:---:|:--:|:--:|
43-
| Disabled |The default state for a new user not enrolled in Azure MFA. |No |No |No |
44-
| Enabled |The user has been enrolled in Azure MFA, but has not registered. They receive a prompt to register the next time they sign in. |No. They continue to work until the registration process is completed. | Yes. After the session expires, Azure MFA registration is required.| Yes. After the access token expires, Azure MFA registration is required. |
45-
| Enforced |The user has been enrolled and has completed the registration process for Azure MFA. |Yes. Apps require app passwords. |Yes. Azure MFA is required at login. | Yes. Azure MFA is required at login. |
45+
|:---:| --- |:---:|:--:|:--:|
46+
| Disabled | The default state for a new user not enrolled in Azure MFA. | No | No | No |
47+
| Enabled | The user has been enrolled in Azure MFA, but has not registered. They receive a prompt to register the next time they sign in. | No. They continue to work until the registration process is completed. | Yes. After the session expires, Azure MFA registration is required.| Yes. After the access token expires, Azure MFA registration is required. |
48+
| Enforced | The user has been enrolled and has completed the registration process for Azure MFA. | Yes. Apps require app passwords. | Yes. Azure MFA is required at login. | Yes. Azure MFA is required at login. |
4649

4750
A user's state reflects whether an admin has enrolled them in Azure MFA, and whether they completed the registration process.
4851

articles/active-directory/conditional-access/concept-conditional-access-security-defaults.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,20 @@ To enable security defaults in your directory:
123123
1. Set the **Enable security defaults** toggle to **Yes**.
124124
1. Select **Save**.
125125

126+
## Disabling security defaults
127+
128+
Organizations that choose to implement Conditional Access policies that replace security defaults must disable security defaults.
129+
130+
![Warning message disable security defaults to enable Conditional Access](./media/concept-conditional-access-security-defaults/security-defaults-disable-before-conditional-access.png)
131+
132+
To disable security defaults in your directory:
133+
134+
1. Sign in to the [Azure portal](https://portal.azure.com) as a security administrator, Conditional Access administrator, or global administrator.
135+
1. Browse to **Azure Active Directory** > **Properties**.
136+
1. Select **Manage security defaults**.
137+
1. Set the **Enable security defaults** toggle to **No**.
138+
1. Select **Save**.
139+
126140
## Next steps
127141

128142
[Common Conditional Access policies](concept-conditional-access-policy-common.md)
Loading

articles/active-directory/manage-apps/configure-admin-consent-workflow.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -29,10 +29,10 @@ To approve requests, a reviewer must be a global administrator, cloud applicatio
2929

3030
To enable the admin consent workflow and choose reviewers:
3131

32-
1. Sign in to the[Azure portal](https://portal.azure.com)as a global administrator.
33-
2. Click**All services**at the top of the left-hand navigation menu. The**Azure Active Directory Extension**opens.
34-
3. In the filter search box, type"**Azure Active Directory**"and select **theAzure Active Directory**item.
35-
4. From the navigation menu, click**Enterprise applications**.
32+
1. Sign in to the [Azure portal](https://portal.azure.com) as a global administrator.
33+
2. Click **All services** at the top of the left-hand navigation menu. The **Azure Active Directory Extension** opens.
34+
3. In the filter search box, type "**Azure Active Directory**" and select **the Azure Active Directory** item.
35+
4. From the navigation menu, click **Enterprise applications**.
3636
5. Under **Manage**, select **User settings**.
3737
6. Under **Admin consent requests (Preview)**, set **Users can request admin consent to apps they are unable to consent to** to **Yes**.
3838

@@ -70,10 +70,10 @@ After the admin consent workflow is enabled, users can request admin approval fo
7070

7171
To review the admin consent requests and take action:
7272

73-
1. Sign in to the[Azure portal](https://portal.azure.com)as one of the registered reviewers of the admin consent workflow.
74-
2. Select **All services**at the top of the left-hand navigation menu. The**Azure Active Directory Extension**opens.
75-
3. In the filter search box, type"**Azure Active Directory**"and select the**Azure Active Directory**item.
76-
4. From the navigation menu, click**Enterprise applications**.
73+
1. Sign in to the [Azure portal](https://portal.azure.com) as one of the registered reviewers of the admin consent workflow.
74+
2. Select **All services** at the top of the left-hand navigation menu. The **Azure Active Directory Extension** opens.
75+
3. In the filter search box, type "**Azure Active Directory**" and select the **Azure Active Directory** item.
76+
4. From the navigation menu, click **Enterprise applications**.
7777
5. Under **Activity**, select **Admin consent requests (Preview)**.
7878

7979
> [!NOTE]
@@ -116,12 +116,12 @@ The table below outlines the scenarios and audit values available for the admin
116116

117117
|Scenario |Audit Service |Audit Category |Audit Activity |Audit Actor |Audit log limitations |
118118
|---------|---------|---------|---------|---------|---------|
119-
|Admin enabling the consent request workflow   |Access Reviews |UserManagement |Create governance policy template |App context   |Currently you cannot find the user context   |
120-
|Admin disablingtheconsentrequest workflow |Access Reviews |UserManagement |Delete governance policy template |App context   |Currently you cannot find the user context |
121-
|Admin updating the consent workflow configurations   |Access Reviews |UserManagement |Update governance policy template |App context   |Currently you cannot find the user context |
122-
|End user creating anadmin consentrequestfor anapp |Access Reviews |Policy |Createrequest |App context   |Currently you cannot find the user context |
123-
|Reviewers approving anadmin consentrequest |Access Reviews |UserManagement |Approve all requests in business flow |App context   |Currentlyyou cannot find the user context or the app ID that was granted admin consent. |
124-
|Reviewers denying an admin consentrequest |Access Reviews |UserManagement |Approve all requests in business flow |App context   |Currentlyyou cannot find the user context of the actor that denied an admin consent request |
119+
|Admin enabling the consent request workflow |Access Reviews |UserManagement |Create governance policy template |App context |Currently you cannot find the user context |
120+
|Admin disabling the consent request workflow |Access Reviews |UserManagement |Delete governance policy template |App context |Currently you cannot find the user context |
121+
|Admin updating the consent workflow configurations |Access Reviews |UserManagement |Update governance policy template |App context |Currently you cannot find the user context |
122+
|End user creating an admin consent request for an app |Access Reviews |Policy |Create request |App context |Currently you cannot find the user context |
123+
|Reviewers approving an admin consent request |Access Reviews |UserManagement |Approve all requests in business flow |App context |Currently you cannot find the user context or the app ID that was granted admin consent. |
124+
|Reviewers denying an admin consent request |Access Reviews |UserManagement |Approve all requests in business flow |App context | Currently you cannot find the user context of the actor that denied an admin consent request |
125125

126126
## FAQ
127127

4.54 KB
Loading

articles/active-directory/manage-apps/what-is-single-sign-on.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/14/2019
11+
ms.date: 12/03/2019
1212
ms.author: mimart
1313
ms.reviewer: arvindh, japere
1414

articles/active-directory/saas-apps/kerbf5-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
269269

270270
![F5 (Kerberos) configuration](./media/kerbf5-tutorial/configure12.png)
271271

272-
1. Once the application has been click on **Finish**.
272+
1. Once the application has been configured click on **Finish**.
273273

274274
![F5 (Kerberos) configuration](./media/kerbf5-tutorial/configure13.png)
275275

articles/automation/shared-resources/modules.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Manage Modules in Azure Automation
33
description: This article describes how to manage modules in Azure Automation
44
services: automation
55
ms.service: automation
6-
author: bobbytreed
7-
ms.author: robreed
8-
ms.date: 06/05/2019
6+
author: mgoedtel
7+
ms.author: magoedte
8+
ms.date: 12/03/2019
99
ms.topic: conceptual
1010
manager: carmonm
1111
---
@@ -73,6 +73,10 @@ Remove-AzureRmAutomationModule -Name <moduleName> -AutomationAccountName <automa
7373

7474
The following is a listing of cmdlets in the internal `Orchestrator.AssetManagement.Cmdlets` module that is imported into every Automation Account. These cmdlets are accessible in your runbooks and DSC configurations and allow you to interact with your assets within your Automation Account. Additionally, the internal cmdlets allow you to retrieve secrets from encrypted **Variable** values, **Credentials**, and encrypted **Connection** fields. The Azure PowerShell cmdlets are not able to retrieve these secrets. These cmdlets do not require you to implicitly connect to Azure when using them, such as using a Run As Account to authenticate to Azure.
7575

76+
>[!NOTE]
77+
>These internal cmdlets are not available on a Hybrid Runbook Worker, they are only accessible from runbooks running in Azure. Use the corresponding [AzureRM.Automation](https://docs.microsoft.com/powershell/module/AzureRM.Automation/?view=azurermps-6.13.0) or [Az modules](../az-modules.md) for runbooks running directly on the computer or against resources in your environment.
78+
>
79+
7680
|Name|Description|
7781
|---|---|
7882
|Get-AutomationCertificate|`Get-AutomationCertificate [-Name] <string> [<CommonParameters>]`|

0 commit comments

Comments
 (0)