Skip to content

Commit 5d2694a

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into patricka-encryption-rest
2 parents 16db78d + d8a6a07 commit 5d2694a

File tree

39 files changed

+982
-250
lines changed

39 files changed

+982
-250
lines changed

articles/active-directory/fundamentals/custom-security-attributes-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Custom security attributes in Azure Active Directory (Azure AD) are business-spe
2323

2424
## Why use custom security attributes?
2525

26-
- Extend user profiles, such as add Employee Hire Date and Hourly Salary to all my employees.
26+
- Extend user profiles, such as add Hourly Salary to all my employees.
2727
- Ensure only administrators can see the Hourly Salary attribute in my employees' profiles.
2828
- Categorize hundreds or thousands of applications to easily create a filterable inventory for auditing.
2929
- Grant users access to the Azure Storage blobs belonging to a project.

articles/active-directory/hybrid/connect/how-to-connect-password-hash-synchronization.md

Lines changed: 17 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -93,49 +93,48 @@ If a user is in the scope of password hash synchronization, by default the cloud
9393

9494
You can continue to sign in to your cloud services by using a synchronized password that is expired in your on-premises environment. Your cloud password is updated the next time you change the password in the on-premises environment.
9595

96-
##### EnforceCloudPasswordPolicyForPasswordSyncedUsers
96+
##### CloudPasswordPolicyForPasswordSyncedUsersEnabled
9797

98-
If there are synchronized users that only interact with Azure AD integrated services and must also comply with a password expiration policy, you can force them to comply with your Azure AD password expiration policy by enabling the *EnforceCloudPasswordPolicyForPasswordSyncedUsers* feature.
98+
If there are synchronized users that only interact with Azure AD integrated services and must also comply with a password expiration policy, you can force them to comply with your Azure AD password expiration policy by enabling the *CloudPasswordPolicyForPasswordSyncedUsersEnabled* feature (in the deprecated MSOnline PowerShell module it was called *EnforceCloudPasswordPolicyForPasswordSyncedUsers*).
9999

100-
When *EnforceCloudPasswordPolicyForPasswordSyncedUsers* is disabled (which is the default setting), Azure AD Connect sets the PasswordPolicies attribute of synchronized users to "DisablePasswordExpiration". This is done every time a user's password is synchronized and instructs Azure AD to ignore the cloud password expiration policy for that user. You can check the value of the attribute using the Azure AD PowerShell module with the following command:
100+
When *CloudPasswordPolicyForPasswordSyncedUsersEnabled* is disabled (which is the default setting), Azure AD Connect sets the PasswordPolicies attribute of synchronized users to "DisablePasswordExpiration". This is done every time a user's password is synchronized and instructs Azure AD to ignore the cloud password expiration policy for that user. You can check the value of the attribute using the Azure AD PowerShell module with the following command:
101101

102-
`(Get-AzureADUser -objectID <User Object ID>).passwordpolicies`
102+
`(Get-MgUser -UserId <User Object ID> -Property PasswordPolicies).PasswordPolicies`
103103

104-
To enable the EnforceCloudPasswordPolicyForPasswordSyncedUsers feature, run the following command using the MSOnline PowerShell module as shown below. You would have to type yes for the Enable parameter as shown below:
104+
To enable the CloudPasswordPolicyForPasswordSyncedUsersEnabled feature, run the following commands using the Graph PowerShell module as shown below:
105105

106106
```
107-
Set-MsolDirSyncFeature -Feature EnforceCloudPasswordPolicyForPasswordSyncedUsers
108-
cmdlet Set-MsolDirSyncFeature at command pipeline position 1
109-
Supply values for the following parameters:
110-
Enable: yes
111-
Confirm
112-
Continue with this operation?
113-
[Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y
107+
$OnPremSync = Get-MgDirectoryOnPremiseSynchronization
108+
$OnPremSync.Features.CloudPasswordPolicyForPasswordSyncedUsersEnabled = $true
109+
110+
Update-MgDirectoryOnPremiseSynchronization `
111+
-OnPremisesDirectorySynchronizationId $OnPremSync.Id `
112+
-Features $OnPremSync.Features
114113
```
115114

116115
Once enabled, Azure AD does not go to each synchronized user to remove the `DisablePasswordExpiration` value from the PasswordPolicies attribute. Instead, the `DisablePasswordExpiration` value is removed from PasswordPolicies during the next password hash sync for each user, upon their next password change in on-premises AD.
117116

118-
After the *EnforceCloudPasswordPolicyForPasswordSyncedUsers* feature is enabled, new users are provisioned without a PasswordPolicies value.
117+
After the *CloudPasswordPolicyForPasswordSyncedUsersEnabled* feature is enabled, new users are provisioned without a PasswordPolicies value.
119118

120119
>[!TIP]
121-
>It is recommended to enable *EnforceCloudPasswordPolicyForPasswordSyncedUsers* prior to enabling password hash sync, so that the initial sync of password hashes does not add the `DisablePasswordExpiration` value to the PasswordPolicies attribute for the users.
120+
>It is recommended to enable *CloudPasswordPolicyForPasswordSyncedUsersEnabled* prior to enabling password hash sync, so that the initial sync of password hashes does not add the `DisablePasswordExpiration` value to the PasswordPolicies attribute for the users.
122121
123-
The default Azure AD password policy requires users to change their passwords every 90 days. If your policy in AD is also 90 days, the two policies should match. However, if the AD policy is not 90 days, you can update the Azure AD password policy to match by using the Set-MsolPasswordPolicy PowerShell command.
122+
The default Azure AD password policy requires users to change their passwords every 90 days. If your policy in AD is also 90 days, the two policies should match. However, if the AD policy is not 90 days, you can update the Azure AD password policy to match by using the Update-MgDomain PowerShell command (previously: Set-MsolPasswordPolicy).
124123

125124
Azure AD supports a separate password expiration policy per registered domain.
126125

127126
Caveat: If there are synchronized accounts that need to have non-expiring passwords in Azure AD, you must explicitly add the `DisablePasswordExpiration` value to the PasswordPolicies attribute of the user object in Azure AD. You can do this by running the following command.
128127

129-
`Set-AzureADUser -ObjectID <User Object ID> -PasswordPolicies "DisablePasswordExpiration"`
128+
`Update-MgUser -UserID <User Object ID> -PasswordPolicies "DisablePasswordExpiration"`
130129

131130
> [!NOTE]
132131
> For hybrid users that have a PasswordPolicies value set to `DisablePasswordExpiration`, this value switches to `None` after a password change is executed on-premises.
133132
134133
> [!NOTE]
135-
> The Set-MsolPasswordPolicy PowerShell command will not work on federated domains.
134+
> Neither the Update-MgDomain, nor the deprecated Set-MsolPasswordPolicy PowerShell commands will work on federated domains.
136135
137136
> [!NOTE]
138-
> The Set-AzureADUser PowerShell command will not work on federated domains.
137+
> Neither the Set-MgUser, nor the deprecated Set-AzureADUser PowerShell commands will work on federated domains.
139138
140139
#### Synchronizing temporary passwords and "Force Password Change on Next Logon"
141140

articles/active-directory/hybrid/connect/how-to-connect-staged-rollout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ The following scenarios are not supported for Staged Rollout:
8686

8787
- When you first add a security group for Staged Rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
8888

89-
- While users are in Staged Rollout with Password Hash Synchronization (PHS), by default no password expiration is applied. Password expiration can be applied by enabling "EnforceCloudPasswordPolicyForPasswordSyncedUsers". When "EnforceCloudPasswordPolicyForPasswordSyncedUsers" is enabled, password expiration policy is set to 90 days from the time password was set on-prem with no option to customize it. Programmatically updating PasswordPolicies attribute is not supported while users are in Staged Rollout. To learn how to set 'EnforceCloudPasswordPolicyForPasswordSyncedUsers' see [Password expiration policy](./how-to-connect-password-hash-synchronization.md#enforcecloudpasswordpolicyforpasswordsyncedusers).
89+
- While users are in Staged Rollout with Password Hash Synchronization (PHS), by default no password expiration is applied. Password expiration can be applied by enabling "CloudPasswordPolicyForPasswordSyncedUsersEnabled". When "CloudPasswordPolicyForPasswordSyncedUsersEnabled" is enabled, password expiration policy is set to 90 days from the time password was set on-prem with no option to customize it. Programmatically updating PasswordPolicies attribute is not supported while users are in Staged Rollout. To learn how to set 'CloudPasswordPolicyForPasswordSyncedUsersEnabled' see [Password expiration policy](./how-to-connect-password-hash-synchronization.md#cloudpasswordpolicyforpasswordsyncedusersenabled).
9090

9191
- Windows 10 Hybrid Join or Azure AD Join primary refresh token acquisition for Windows 10 version older than 1903. This scenario will fall back to the WS-Trust endpoint of the federation server, even if the user signing in is in scope of Staged Rollout.
9292

articles/ai-services/openai/how-to/switching-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ from azure.identity import DefaultAzureCredential
8989
credential = DefaultAzureCredential()
9090
token = credential.get_token("https://cognitiveservices.azure.com/.default")
9191

92-
openai.api_type = "azuread"
92+
openai.api_type = "azure_ad"
9393
openai.api_key = token.token
9494
openai.api_base = "https://example-endpoint.openai.azure.com"
9595
openai.api_version = "2023-05-15" # subject to change

0 commit comments

Comments
 (0)