Skip to content

Commit 6017f52

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into work-scaling-updates
2 parents 7f683cd + 3c5f6d3 commit 6017f52

File tree

166 files changed

+932
-574
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

166 files changed

+932
-574
lines changed

articles/active-directory-b2c/custom-policy-keep-me-signed-in.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/24/2020
11+
ms.date: 03/26/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -48,9 +48,27 @@ To enable KMSI, set the content definition `DataUri` element to [page identifier
4848
</BuildingBlocks>
4949
```
5050

51-
1. Save the extensions file.
51+
## Add the metadata to the self-asserted technical profile
52+
53+
To add the KMSI checkbox to the sign-up and sign-in page, set the `setting.enableRememberMe` metadata to false. Override the SelfAsserted-LocalAccountSignin-Email technical profiles in the extension file.
54+
55+
1. Find the ClaimsProviders element. If the element doesn't exist, add it.
56+
1. Add the following claims provider to the ClaimsProviders element:
5257

58+
```XML
59+
<ClaimsProvider>
60+
<DisplayName>Local Account</DisplayName>
61+
<TechnicalProfiles>
62+
<TechnicalProfile Id="SelfAsserted-LocalAccountSignin-Email">
63+
<Metadata>
64+
<Item Key="setting.enableRememberMe">True</Item>
65+
</Metadata>
66+
</TechnicalProfile>
67+
</TechnicalProfiles>
68+
</ClaimsProvider>
69+
```
5370

71+
1. Save the extensions file.
5472

5573
## Configure a relying party file
5674

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/16/2020
12+
ms.date: 03/26/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -198,6 +198,7 @@ You can also call a REST API technical profile with your business logic, overwri
198198
| setting.showContinueButton | No | Displays the continue button. Possible values: `true` (default), or `false` |
199199
| setting.showSignupLink <sup>2</sup>| No | Displays the sign-up button. Possible values: `true` (default), or `false` |
200200
| setting.forgotPasswordLinkLocation <sup>2</sup>| No| Displays the forgot password link. Possible values: `AfterInput` (default) the link is displayed at the bottom of the page, or `None` removes the forgot password link.|
201+
| setting.enableRememberMe <sup>2</sup>| No| Displays the [Keep me signed in](custom-policy-keep-me-signed-in.md) checkbox. Possible values: `true` , or `false` (default). |
201202
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
202203

203204
Notes:

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,9 @@ The following providers offer FIDO2 security keys of different form factors that
115115
| Ensurity | [https://www.ensurity.com/contact](https://www.ensurity.com/contact) |
116116
| eWBM | [https://www.ewbm.com/support](https://www.ewbm.com/support) |
117117
| AuthenTrend | [https://authentrend.com/about-us/#pg-35-3](https://authentrend.com/about-us/#pg-35-3) |
118+
| Gemalto (Thales Group) | [https://safenet.gemalto.com/multi-factor-authentication/authenticators/passwordless-authentication/](https://safenet.gemalto.com/multi-factor-authentication/authenticators/passwordless-authentication/) |
119+
| OneSpan Inc. | [https://www.onespan.com/sites/default/files/2019-08/Digipass-SecureClick_datasheet.pdf](https://www.onespan.com/sites/default/files/2019-08/Digipass-SecureClick_datasheet.pdf) |
120+
| IDmelon Technologies Inc. | [https://www.idmelon.com/#idmelon](https://www.idmelon.com/#idmelon) |
118121

119122
> [!NOTE]
120123
> If you purchase and plan to use NFC-based security keys, you need a supported NFC reader for the security key. The NFC reader isn't an Azure requirement or limitation. Check with the vendor for your NFC-based security key for a list of supported NFC readers.

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To correctly work with SSPR writeback, the account specified in Azure AD Connect
5252
* **Reset password**
5353
* **Write permissions** on `lockoutTime`
5454
* **Write permissions** on `pwdLastSet`
55-
* **Extended rights** on either:
55+
* **Extended rights** for "Unexpire Password" on either:
5656
* The root object of *each domain* in that forest
5757
* The user organizational units (OUs) you want to be in scope for SSPR
5858

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/25/2020
9+
ms.date: 03/26/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -73,6 +73,8 @@ The following options are considered legacy authentication protocols
7373
- Reporting Web Services - Used to retrieve report data in Exchange Online.
7474
- Other clients - Other protocols identified as utilizing legacy authentication.
7575

76+
For more information about these authentication protocols and services, see [Sign-in activity reports in the Azure Active Directory portal](../reports-monitoring/concept-sign-ins.md#filter-sign-in-activities).
77+
7678
### Identify legacy authentication use
7779

7880
Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you're using legacy authentication.

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 03/04/2020
9+
ms.date: 03/25/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -64,6 +64,8 @@ Organizations can choose to use the device identity as part of their Conditional
6464

6565
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client apps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
6666

67+
In order to leverage this grant control, Conditional Access requires that the device be registered in Azure Active Directory which requires the use of a broker app. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices. If a broker app is not installed on the device when the user attempts to authenticate, the user gets redirected to the app store to install the broker app.
68+
6769
This setting applies to the following iOS and Android apps:
6870

6971
- Microsoft Azure Information Protection
@@ -95,12 +97,14 @@ This setting applies to the following iOS and Android apps:
9597
- Microsoft Visio
9698
- Microsoft Word
9799
- Microsoft Yammer
100+
- Microsoft Whiteboard
98101

99102
**Remarks**
100103

101104
- The approved client apps support the Intune mobile application management feature.
102105
- The **Require approved client app** requirement:
103106
- Only supports the iOS and Android for device platform condition.
107+
- A broker app is required to register the device. On iOS, the broker app is Microsoft Authenticator and on Android, it is Intune Company Portal app.
104108
- Conditional Access cannot consider Microsoft Edge in InPrivate mode an approved client app.
105109

106110
See the article, [How to: Require approved client apps for cloud app access with Conditional Access](app-based-conditional-access.md) for configuration examples.
@@ -109,6 +113,8 @@ See the article, [How to: Require approved client apps for cloud app access with
109113

110114
In your Conditional Access policy, you can require an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
111115

116+
In order to leverage this grant control, Conditional Access requires that the device be registered in Azure Active Directory which requires the use of a broker app. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices. If a broker app is not installed on the device when the user attempts to authenticate, the user gets redirected to the app store to install the broker app.
117+
112118
This setting applies to the following client apps:
113119

114120
- Microsoft Cortana
@@ -121,6 +127,7 @@ This setting applies to the following client apps:
121127
- Apps for app protection policy support the Intune mobile application management feature with policy protection.
122128
- The **Require app protection policy** requirements:
123129
- Only supports the iOS and Android for device platform condition.
130+
- A broker app is required to register the device. On iOS, the broker app is Microsoft Authenticator and on Android, it is Intune Company Portal app.
124131

125132
See the article, [How to: Require app protection policy and an approved client app for cloud app access with Conditional Access](app-protection-based-conditional-access.md) for configuration examples.
126133

articles/active-directory/devices/troubleshoot-hybrid-join-windows-current.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -276,7 +276,7 @@ Use Event Viewer logs to locate the error code, suberror code, server error code
276276
- Reason: Connection with the auth endpoint was aborted.
277277
- Resolution: Retry after sometime or try joining from an alternate stable network location.
278278
- **ERROR_ADAL_INTERNET_SECURE_FAILURE** (0xcaa82f8f/-894947441)
279-
- Reason: The Secure Sockets Layer (SSL) certificate sent by the server could not be validated.
279+
- Reason: The Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), certificate sent by the server could not be validated.
280280
- Resolution: Check the client time skew. Retry after sometime or try joining from an alternate stable network location.
281281
- **ERROR_ADAL_INTERNET_CANNOT_CONNECT** (0xcaa82efd/-894947587)
282282
- Reason: The attempt to connect to `https://login.microsoftonline.com` failed.

articles/active-directory/user-help/my-apps-portal-end-user-access.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,8 @@ Download and install the extension, based on the browser you're using:
6464

6565
- **Mozilla Firefox** From the **Firefox Add-ons** page, go to the [My Apps Secure Sign-in Extension](https://addons.mozilla.org/firefox/addon/access-panel-extension/) feature, and then select **Add to Firefox**.
6666

67-
- **Microsoft Edge** From the Microsoft Store, go to the [My Apps Secure Sign-in Extension](https://www.microsoft.com/p/my-apps-secure-sign-in-extension/9pc9sckkzk84?rtc=1&activetab=pivot%3Aoverviewtab) feature, and then select **Get**.
67+
- **Microsoft Edge** From the Microsoft Store, go to the [My Apps Secure Sign-in Extension](https://www.microsoft.com/p/my-apps-secure-sign-in-extension/9pc9sckkzk84?rtc=1&activetab=pivot%3Aoverviewtab) feature, and then select **Get** to get the extension for Microsoft Edge legacy browser.
68+
If you are using the new Microsoft Edge browser (Edge on Chromium) then you can get the extenion from [Microsoft Edge Addons Store](https://microsoftedge.microsoft.com/addons/category/EdgeExtensionsEditorsPick).
6869

6970
An icon is added to the right of your **Address** bar, letting you sign-in and customize the extension.
7071

articles/application-gateway/application-gateway-probe-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Once the match criteria is specified, it can be attached to probe configuration
5959
| Probe URL |http://127.0.0.1:\<port\>/ |URL path |
6060
| Interval |30 |The amount of time in seconds to wait before the next health probe is sent.|
6161
| Time-out |30 |The amount of time in seconds the application gateway waits for a probe response before marking the probe as unhealthy. If a probe returns as healthy, the corresponding backend is immediately marked as healthy.|
62-
| Unhealthy threshold |3 |Governs how many probes to send in case there's a failure of the regular health probe. These additional health probes are sent in quick succession to determine the health of the backend quickly and don't wait for the probe interval. The back-end server is marked down after the consecutive probe failure count reaches the unhealthy threshold. |
62+
| Unhealthy threshold |3 |Governs how many probes to send in case there's a failure of the regular health probe. These additional health probes are sent in quick succession to determine the health of the backend quickly and don't wait for the probe interval. This behaivor is only v1 SKU. In the case of v2 SKU, the health probes wait the interval. The back-end server is marked down after the consecutive probe failure count reaches the unhealthy threshold. |
6363

6464
> [!NOTE]
6565
> The port is the same port as the back-end HTTP settings.

articles/azure-functions/durable/durable-functions-phone-verification.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ The complexity of this scenario is greatly reduced when you use Durable Function
3131
This article walks through the following functions in the sample app:
3232

3333
* `E4_SmsPhoneVerification`: An [orchestrator function](durable-functions-bindings.md#orchestration-trigger) that performs the phone verification process, including managing timeouts and retries.
34-
* `E4_SendSmsChallenge`: An [orchestrator function](durable-functions-bindings.md#activity-trigger) that sends a code via text message.
34+
* `E4_SendSmsChallenge`: An [activity function](durable-functions-bindings.md#activity-trigger) that sends a code via text message.
3535

3636
### E4_SmsPhoneVerification orchestrator function
3737

0 commit comments

Comments
 (0)