Skip to content

Commit 5e54164

Browse files
authored
Merge pull request #180194 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents ac695eb + b415ed9 commit 5e54164

File tree

446 files changed

+3413
-2341
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

446 files changed

+3413
-2341
lines changed

articles/active-directory/authentication/how-to-authentication-find-coverage-gaps.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,16 +47,14 @@ Based on gaps you found, require administrators to use multi-factor authenticati
4747

4848
- Run the [MFA enablement wizard](https://aka.ms/MFASetupGuide) to choose your MFA policy.
4949

50-
- If you assign custom or built-in admin roles in [Privileged Identity Management](https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure), require multi-factor authentication upon role activation.
50+
- If you assign custom or built-in admin roles in [Privileged Identity Management](../privileged-identity-management/pim-configure.md), require multi-factor authentication upon role activation.
5151

5252
## Use Passwordless and phishing resistant authentication methods for your administrators
5353

5454
After your admins are enforced for multi-factor authentication and have been using it for a while, it is time to raise the bar on strong authentication and use Passwordless and phishing resistant authentication method:
5555

5656
- [Phone Sign-in (with Microsoft Authenticator)](concept-authentication-authenticator-app.md)
5757
- [FIDO2](concept-authentication-passwordless.md#fido2-security-keys)
58-
- [Windows Hello for Business](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-overview)
59-
60-
You can read more about these authentication methods and their security considerations in [Azure AD authentication methods](concept-authentication-methods.md).
61-
58+
- [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
6259

60+
You can read more about these authentication methods and their security considerations in [Azure AD authentication methods](concept-authentication-methods.md).

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.subservice: develop
1111
ms.custom: aaddev
1212
ms.workload: identity
1313
ms.topic: how-to
14-
ms.date: 02/15/2021
14+
ms.date: 11/11/2021
1515
ms.author: jeedes
1616
---
1717

@@ -90,6 +90,9 @@ Use this feature if your application expects custom roles in the SAML response r
9090

9191
If you're using the custom app (not the Azure Marketplace app), you see two default roles: user and msiam_access. For the Marketplace app, msiam_access is the only default role. You don't need to make any changes in the default roles.
9292

93+
> [!NOTE]
94+
> When you are creating multiple roles, please don't modify the default role content just add the new msiam_access block of code for the new role.
95+
9396
1. Generate new roles for your application.
9497

9598
The following JSON is an example of the **appRoles** object. Create a similar object to add the roles that you want for your application.

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ This article assumes that you have [configured hybrid Azure AD-joined devices](h
3434

3535

3636
> [!NOTE]
37-
> To troubleshoot the common device registration issues, use [Device Registration Troubleshooter Tool](https://aka.ms/DSRegTool).
37+
> To troubleshoot the common device registration issues, use [Device Registration Troubleshooter Tool](/samples/azure-samples/dsregtool/dsregtool/).
3838
3939

4040
## Troubleshoot join failures
@@ -520,4 +520,4 @@ Use Event Viewer to look for the log entries that are logged by the Azure AD Clo
520520
## Next steps
521521

522522
- [Troubleshoot devices by using the `dsregcmd` command](troubleshoot-device-dsregcmd.md).
523-
- Go to the [Microsoft Error Lookup Tool](/windows/win32/debug/system-error-code-lookup-tool).
523+
- Go to the [Microsoft Error Lookup Tool](/windows/win32/debug/system-error-code-lookup-tool).

articles/active-directory/external-identities/faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ sections:
188188
- question: |
189189
Can B2B collaboration users sign in with their non-UPN email address?
190190
answer: |
191-
Yes. For more information about email as an alternate login ID for B2B collaboration, see [B2B guest user sign-in with an email address](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-use-email-signin#b2b-guest-user-sign-in-with-an-email-address).
191+
Yes. For more information about email as an alternate login ID for B2B collaboration, see [B2B guest user sign-in with an email address](../authentication/howto-authentication-use-email-signin.md#b2b-guest-user-sign-in-with-an-email-address).
192192
193193
additionalContent: |
194194

articles/active-directory/fundamentals/whats-new.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Previously, we announced that starting October 31, 2021, Microsoft Azure Active
6363
**Service category:** Conditional Access
6464
**Product capability:** End User Experiences
6565

66-
If there's no trust relation between a home and resource tenant, a guest user would have previously been asked to re-register their device, which would break the previous registration. However, the user would end up in a registration loop because only home tenant device registration is supported. In this specific scenario, instead of this loop, we have created a new conditional access blocking page. The page tells the end user that they can't get access to conditional access protected resources as a guest user. [Learn more](https://docs.microsoft.com/azure/active-directory/external-identities/b2b-quickstart-add-guest-users-portal#prerequisites).
66+
If there's no trust relation between a home and resource tenant, a guest user would have previously been asked to re-register their device, which would break the previous registration. However, the user would end up in a registration loop because only home tenant device registration is supported. In this specific scenario, instead of this loop, we have created a new conditional access blocking page. The page tells the end user that they can't get access to conditional access protected resources as a guest user. [Learn more](../external-identities/b2b-quickstart-add-guest-users-portal.md#prerequisites).
6767

6868
---
6969

@@ -111,7 +111,7 @@ Flagged sign-ins is a feature that will increase the signal to noise ratio for u
111111
**Service category:** Device Registration and Management
112112
**Product capability:** Device Lifecycle Management
113113

114-
The new Device Overview feature provides actionable insights about devices in your tenant. [Learn more](https://docs.microsoft.com/azure/active-directory/devices/device-management-azure-portal).
114+
The new Device Overview feature provides actionable insights about devices in your tenant. [Learn more](../devices/device-management-azure-portal.md).
115115

116116
---
117117

@@ -170,7 +170,7 @@ We now support native single sign-on (SSO) support and device-based Conditional
170170
**Service category:** My Apps
171171
**Product capability:** End User Experiences
172172

173-
Apps that have been recently assigned to the user show up with a "new" indicator. When the app is launched or the page is refreshed, this indicator disappears. [Learn more](https://docs.microsoft.com/azure/active-directory/user-help/my-apps-portal-end-user-access).
173+
Apps that have been recently assigned to the user show up with a "new" indicator. When the app is launched or the page is refreshed, this indicator disappears. [Learn more](/azure/active-directory/user-help/my-apps-portal-end-user-access).
174174

175175
---
176176

@@ -180,7 +180,7 @@ Apps that have been recently assigned to the user show up with a "new" indicator
180180
**Service category:** B2C - Consumer Identity Management
181181
**Product capability:** B2B/B2C
182182

183-
Azure AD B2C customers can now enable custom domains so their end-users are redirected to a custom URL domain for authentication. This is done via integration with Azure Front Door's custom domains capability. [Learn more](https://docs.microsoft.com/azure/active-directory-b2c/custom-domain?pivots=b2c-user-flow).
183+
Azure AD B2C customers can now enable custom domains so their end-users are redirected to a custom URL domain for authentication. This is done via integration with Azure Front Door's custom domains capability. [Learn more](../../active-directory-b2c/custom-domain.md?pivots=b2c-user-flow).
184184

185185
---
186186

@@ -191,7 +191,7 @@ Azure AD B2C customers can now enable custom domains so their end-users are redi
191191
**Product capability:** Access Control
192192

193193

194-
Users in this role can create and manage the enterprise site list required for Internet Explorer mode on Microsoft Edge. This role grants permissions to create, edit, and publish the site list and additionally allows access to manage support tickets. [Learn more](https://docs.microsoft.com/deployedge/edge-ie-mode-cloud-site-list-mgmt)
194+
Users in this role can create and manage the enterprise site list required for Internet Explorer mode on Microsoft Edge. This role grants permissions to create, edit, and publish the site list and additionally allows access to manage support tickets. [Learn more](/deployedge/edge-ie-mode-cloud-site-list-mgmt)
195195

196196
---
197197

@@ -1268,5 +1268,4 @@ A previous version of the PIM API under `/privilegedaccess` will continue to fun
12681268

12691269
A new role, Identity Governance Administrator, has recently been introduced. This role will be the replacement for the User Administrator role in managing catalogs and access packages in Azure AD entitlement management. If you have assigned administrators to the User Administrator role or have them activate this role to manage access packages in Azure AD entitlement management, switch to the Identity Governance Administrator role instead. The User Administrator role will no longer be providing administrative rights to catalogs or access packages. [Learn more](../governance/identity-governance-overview.md#appendix---least-privileged-roles-for-managing-in-identity-governance-features).
12701270

1271-
---
1272-
1271+
---

articles/active-directory/governance/entitlement-management-logic-apps-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.collection: M365-identity-device-management
2323
# Trigger custom Logic Apps with Azure AD entitlement management
2424

2525

26-
[Azure Logic Apps](https://docs.microsoft.com/azure/logic-apps/logic-apps-overview) can be used to automate custom workflows and connect apps and services in one place. Users can integrate Logic Apps with entitlement management to broaden their governance workflows beyond the core entitlement management use cases.
26+
[Azure Logic Apps](../../logic-apps/logic-apps-overview.md) can be used to automate custom workflows and connect apps and services in one place. Users can integrate Logic Apps with entitlement management to broaden their governance workflows beyond the core entitlement management use cases.
2727

2828
These Logic Apps can then be triggered to run in accordance with entitlement management use cases such as when an access package is granted or requested. For example, an admin could create and link a custom Logic App to entitlement management so that when a user requests an access package, a Logic App is triggered that ensures the user is also assigned certain characteristics in a 3rd party SAAS app (like Salesforce) or is sent a custom email.
2929

@@ -96,7 +96,7 @@ These triggers to Logic Apps are controlled in a new tab within access package p
9696

9797
1. Here, you can view all custom extensions (Logic Apps) that you have added to this Catalog. To edit a Logic App workflow, or to create a workflow for a newly-added Logic App, select the Logic App custom extension under **Endpoint**. This will open Logic App Designer and allow you to create your workflow.
9898

99-
For more information on creating Logic App workflows, see [Create automated workflows with Azure Logic Apps in the Azure portal](https://docs.microsoft.com/azure/logic-apps/quickstart-create-first-logic-app-workflow).
99+
For more information on creating Logic App workflows, see [Create automated workflows with Azure Logic Apps in the Azure portal](../../logic-apps/quickstart-create-first-logic-app-workflow.md).
100100

101101
## Add custom extension to access package policy
102102

articles/active-directory/identity-protection/concept-identity-protection-risks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Real-time detections may not show up in reporting for five to 10 minutes. Offlin
3737
3838
### User-linked detections
3939

40-
Risky activity can be detected for a user that isn't linked to a specific malicious sign-in but to the user itself. These risk detections are calculated offline using Microsoft's internal and external threat intelligence sources, like security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
40+
Risky activity can be detected for a user that isn't linked to a specific malicious sign-in but to the user itself.
4141

4242
These risks are calculated offline using Microsoft's internal and external threat intelligence sources including security researchers, law enforcement professionals, security teams at Microsoft, and other trusted sources.
4343

articles/active-directory/manage-apps/f5-big-ip-header-advanced.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Integrating BIG-IP published applications with Azure AD provides many benefits,
2626

2727
- Manage identities and access from a single control plane - The [Azure portal](https://azure.microsoft.com/features/azure-portal)
2828

29-
To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD integration](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-aad-integration) and [what is application access and single sign-on with Azure AD](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
29+
To learn about all of the benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-aad-integration.md) and [what is application access and single sign-on with Azure AD](/azure/active-directory/active-directory-appssoaccess-whatis).
3030

3131
## Scenario description
3232

@@ -67,7 +67,7 @@ Prior BIG-IP experience isn't necessary, but you'll need:
6767
- An Azure AD free subscription or above
6868

6969
- An existing BIG-IP or [deploy a BIG-IP Virtual Edition (VE) in
70-
Azure](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-bigip-deployment-guide)
70+
Azure](./f5-bigip-deployment-guide.md)
7171

7272
- Any of the following F5 BIG-IP license SKUs
7373

@@ -81,15 +81,15 @@ Prior BIG-IP experience isn't necessary, but you'll need:
8181
- 90-day BIG-IP full feature [trial
8282
license](https://www.f5.com/trial/big-ip-trial.php).
8383

84-
- User identities [synchronized](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-sync-whatis)
84+
- User identities [synchronized](../hybrid/how-to-connect-sync-whatis.md)
8585
from an on-premises directory to Azure AD
8686

87-
- An account with Azure AD application admin [permissions](https://docs.microsoft.com/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
87+
- An account with Azure AD application admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
8888

89-
- [SSL certificate](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-bigip-deployment-guide#ssl-profile)
89+
- [SSL certificate](./f5-bigip-deployment-guide.md#ssl-profile)
9090
for publishing services over HTTPS or use default certificates while testing
9191

92-
- An existing header-based application or [setup a simple IIS header app](https://docs.microsoft.com/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
92+
- An existing header-based application or [setup a simple IIS header app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
9393

9494
## Deployment modes
9595

@@ -105,7 +105,7 @@ should be replaced with those for your actual environment.
105105
## Adding F5 BIG-IP from the Azure AD gallery
106106

107107
Setting up a SAML federation trust between BIG-IP APM and Azure AD is one of the first step in implementing secure hybrid access. It establishes the integration required for BIG-IP to hand off pre-authentication and [conditional
108-
access](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) to Azure AD, before granting access to the published service.
108+
access](../conditional-access/overview.md) to Azure AD, before granting access to the published service.
109109

110110
1. Sign-in to the Azure AD portal using an account with application administrative rights.
111111

@@ -164,7 +164,7 @@ access](https://docs.microsoft.com/azure/active-directory/conditional-access/ove
164164

165165
![Screenshot shows user attributes and claims configuration](./media/f5-big-ip-header-advanced/user-attributes-claims.png)
166166

167-
Feel free to add any other specific claims your BIG-IP published application might expect as headers. Any claims defined in addition to the default set will only be issued if they exist in Azure AD. In the same way, Directory [roles or group](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-fed-group-claims)
167+
Feel free to add any other specific claims your BIG-IP published application might expect as headers. Any claims defined in addition to the default set will only be issued if they exist in Azure AD. In the same way, Directory [roles or group](../hybrid/how-to-connect-fed-group-claims.md)
168168
memberships also need defining against a user object in Azure AD before they can be issued as a claim.
169169

170170
9. In the **SAML Signing Certificate** section, select the
@@ -173,7 +173,7 @@ access](https://docs.microsoft.com/azure/active-directory/conditional-access/ove
173173
![Screenshot shows saml signing certificate](./media/f5-big-ip-header-advanced/saml-signing-certificate.png)
174174

175175
SAML signing certificates created by Azure AD have a lifespan of three years and should be managed using the published
176-
[guidance](https://docs.microsoft.com/azure/active-directory/manage-apps/manage-certificates-for-federated-single-sign-on).
176+
[guidance](./manage-certificates-for-federated-single-sign-on.md).
177177

178178
### Azure AD authorization
179179

@@ -431,7 +431,7 @@ For more information refer to these articles:
431431

432432
- [The end of passwords, go password-less](https://www.microsoft.com/security/business/identity/passwordless)
433433

434-
- [What is Conditional Access?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
434+
- [What is Conditional Access?](../conditional-access/overview.md)
435435

436436
- [Microsoft Zero Trust framework to enable remote
437-
work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
437+
work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)

articles/active-directory/reports-monitoring/overview-flagged-sign-ins.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Flagged Sign-ins query for specific user by UPN (e.g.: [email protected]):
8787
Flagged Sign-ins query for specific user and date greater than:
8888
`https://graph.microsoft.com/beta/auditLogs/signIns?&$filter=flaggedforReview eq true and createdDateTime ge 2021-10-01 and userPrincipalname eq '[email protected]'`
8989

90-
For more information on using the sign-ins Graph API, see [signIn resource type](https://docs.microsoft.com/graph/api/resources/signin?view=graph-rest-1.0&preserve-view=true).
90+
For more information on using the sign-ins Graph API, see [signIn resource type](/graph/api/resources/signin?preserve-view=true&view=graph-rest-1.0).
9191

9292

9393

@@ -117,4 +117,4 @@ While the names are similar, **flagged sign-ins** and **risky sign-ins** are dif
117117
## Next steps
118118

119119
- [Sign-in logs in Azure Active Directory](concept-sign-ins.md)
120-
- [Sign in diagnostics for Azure AD scenarios](concept-sign-in-diagnostics-scenarios.md)
120+
- [Sign in diagnostics for Azure AD scenarios](concept-sign-in-diagnostics-scenarios.md)

0 commit comments

Comments
 (0)