Skip to content

Commit 61e754b

Browse files
committed
2 parents 47d98ea + 60a8ee5 commit 61e754b

File tree

720 files changed

+13654
-56344
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

720 files changed

+13654
-56344
lines changed

.openpublishing.redirection.json

Lines changed: 2171 additions & 46476 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-ui-customization-custom.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -141,19 +141,19 @@ To configure UI customization, you copy the **ContentDefinition** and its child
141141

142142
1. Save the extensions file.
143143

144-
## Upload your updated custom policy
144+
## Upload and test your updated custom policy
145+
146+
### Upload the custom policy
145147

146148
1. Make sure you're using the directory that contains your Azure AD B2C tenant by selecting the **Directory + subscription** filter in the top menu and choosing the directory that contains your tenant.
147-
1. Choose **All services** in the top-left corner of the Azure portal, and then search for and select **Azure AD B2C**.
148-
1. Select **Identity Experience Framework**.
149-
1. Click **All Policies**.
150-
1. Click **Upload Policy**.
149+
1. Search for and select **Azure AD B2C**.
150+
1. Under **Policies**, select **Identity Experience Framework**.
151+
1. Select **Upload custom policy**.
151152
1. Upload the extensions file that you previously changed.
152153

153-
## Test the custom policy by using **Run now**
154+
### Test the custom policy by using **Run now**
154155

155-
1. On the **Azure AD B2C** page, go to **All policies**.
156-
1. Select the custom policy that you uploaded, and click the **Run now** button.
156+
1. Select the policy that you uploaded, and then select **Run now**.
157157
1. You should be able to sign up by using an email address.
158158

159159
## Reference

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following example shows the content definition identifier and the definition
3333
<Metadata>
3434
<Item Key="DisplayName">Local account sign up page</Item>
3535
</Metadata>
36-
<LoalizedResourcesReferences MergeBehavior="Prepend">
36+
<LocalizedResourcesReferences MergeBehavior="Prepend">
3737
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.localaccountsignup.en" />
3838
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.localaccountsignup.es" />
3939
...

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -122,10 +122,10 @@ The technical profile also returns claims, that aren't returned by the identity
122122
| --------- | -------- | ----------- |
123123
| ServiceUrl | Yes | The URL of the REST API endpoint. |
124124
| AuthenticationType | Yes | The type of authentication being performed by the RESTful claims provider. Possible values: `None`, `Basic`, `Bearer`, or `ClientCertificate`. The `None` value indicates that the REST API is not anonymous. The `Basic` value indicates that the REST API is secured with HTTP basic authentication. Only verified users, including Azure AD B2C, can access your API. The `ClientCertificate` (recommended) value indicates that the REST API restricts access by using client certificate authentication. Only services that have the appropriate certificates, for example Azure AD B2C, can access your API. The `Bearer` value indicates that the REST API restricts access using client OAuth2 Bearer token. |
125-
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. |
125+
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126126
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127127
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128-
| DebugMode | No | Runs the technical profile in debug mode. In debug mode, the REST API can return more information. See the returning error message section. |
128+
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
129129

130130
## Cryptographic keys
131131

@@ -212,7 +212,7 @@ If the type of authentication is set to `Bearer`, the **CryptographicKeys** elem
212212

213213
## Returning error message
214214

215-
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. In an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
215+
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
216216

217217
| Attribute | Required | Description |
218218
| --------- | -------- | ----------- |

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ If your MFA provider is not linked to an Azure AD tenant, or you link the new MF
4545
> [!CAUTION]
4646
> There is no confirmation when deleting an authentication provider. Selecting **Delete** is a permanent process.
4747
48-
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
48+
Authentication providers can be found in the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers**. Click on listed providers to see details and configurations associated with that provider.
4949

5050
Before removing an authentication provider, take note of any customized settings configured in your provider. Decide what settings need to be migrated to general MFA settings from your provider and complete the migration of those settings.
5151

52-
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
52+
Azure MFA Servers linked to providers will need to be reactivated using credentials generated under **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Server settings**. Before reactivating, the following files must be deleted from the `\Program Files\Multi-Factor Authentication Server\Data\` directory on Azure MFA Servers in your environment:
5353

5454
- caCert
5555
- cert
@@ -61,7 +61,7 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
6161

6262
![Delete an auth provider from the Azure portal](./media/concept-mfa-authprovider/authentication-provider-removal.png)
6363

64-
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
64+
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
6565

6666
> [!WARNING]
6767
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The first thing we need to do is to configure the AD FS claims. Create two claim
8383
Now that the claims are in place, we can configure trusted IPs.
8484

8585
1. Sign in to the [Azure portal](https://portal.azure.com).
86-
2. Select **Azure Active Directory** > **Conditional Access** > **Named locations**.
86+
2. Select **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**.
8787
3. From the **Conditional Access - Named locations** blade, select **Configure MFA trusted IPs**
8888

8989
![Azure AD Conditional Access named locations Configure MFA trusted IPs](./media/howto-mfa-adfs/trustedip6.png)

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -82,18 +82,18 @@ We recommend that organizations use Conditional Access to define their network u
8282
### Configuring a named location
8383

8484
1. Open **Azure Active Directory** in the Azure portal
85-
2. Click **Conditional Access**
86-
3. Click **Named Locations**
87-
4. Click **New Location**
85+
2. Select **Security**
86+
3. Under **Manage**, choose **Named Locations**
87+
4. Select **New Location**
8888
5. In the **Name** field, provide a meaningful name
89-
6. Select whether you are defining the location using IP ranges or Countries/Regions
90-
1. If using IP Ranges
91-
1. Decide whether to mark the location as Trusted. Signing in from a trusted location lowers a user's sign-in risk. Only mark this location as trusted if you know the IP ranges entered are established and credible in your organization.
89+
6. Select whether you are defining the location using *IP ranges* or *Countries/Regions*
90+
1. If using *IP Ranges*
91+
1. Decide whether to *Mark as trusted location*. Signing in from a trusted location lowers a user's sign-in risk. Only mark this location as trusted if you know the IP ranges entered are established and credible in your organization.
9292
2. Specify the IP Ranges
93-
2. If using Countries/Regions
93+
2. If using *Countries/Regions*
9494
1. Expand the drop-down menu and select the countries or regions you wish to define for this named location.
95-
2. Decide whether to Include unknown areas. Unknown areas are IP addresses that can't be mapped to a country/region.
96-
7. Click **Create**
95+
2. Decide whether to *Include unknown areas*. Unknown areas are IP addresses that can't be mapped to a country/region.
96+
7. Select **Create**
9797

9898
## Plan authentication methods
9999

@@ -218,7 +218,7 @@ It is important that you prevent being inadvertently locked out of your Azure AD
218218
### Create Conditional Access policy
219219

220220
1. Sign in to the [Azure portal](https://portal.azure.com) using a global administrator account.
221-
1. Browse to **Azure Active Directory**, **Conditional Access**.
221+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
222222
1. Select **New policy**.
223223
![Create a Conditional Access policy to enable MFA for Azure portal users in pilot group](media/howto-mfa-getstarted/conditionalaccess-newpolicy.png)
224224
1. Provide a meaningful name for your policy.

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,8 +93,8 @@ If you aren't using the Event Confirmation feature, and your users aren't using
9393
Follow these steps to download the Azure Multi-Factor Authentication Server from the Azure portal:
9494

9595
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
96-
2. Search for and select *Azure Active Directory*. Select **MFA Server**.
97-
3. Select **Server settings**.
96+
2. Search for and select *Azure Active Directory*. Select **Security** > **MFA**.
97+
3. Under **Manager MFA Server**, select **Server settings**.
9898
4. Select **Download** and follow the instructions on the download page to save the installer.
9999

100100
![Download MFA Server from the Azure portal](./media/howto-mfaserver-deploy/downloadportal.png)

articles/active-directory/authentication/howto-password-ban-bad-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Many organizations find their users create passwords using common local words su
2323

2424
Configuring the custom banned password list requires an Azure Active Directory Premium P1 or P2 license. For more detailed information about Azure Active Directory licensing, see the [Azure Active Directory pricing page](https://azure.microsoft.com/pricing/details/active-directory/).
2525

26-
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Authentication methods**, then **Password protection**.
26+
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Password protection**.
2727
1. Set the option **Enforce custom list**, to **Yes**.
2828
1. Add strings to the **Custom banned password list**, one string per line
2929
* The custom banned password list can contain up to 1000 terms.

articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Follow the guidance in the article [Configuring the custom banned password list]
2525

2626
## Enable Password Protection
2727

28-
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory**, **Security**,**Authentication methods**, then **Password Protection**.
28+
1. Sign in to the [Azure portal](https://portal.azure.com) and browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Password Protection**.
2929
1. Set **Enable Password Protection on Windows Server Active Directory** to **Yes**
3030
1. As mentioned in the [Deployment guide](howto-password-ban-bad-on-premises-deploy.md#deployment-strategy), it is recommended to initially set the **Mode** to **Audit**
3131
* After you are comfortable with the feature, you can switch the **Mode** to **Enforced**

0 commit comments

Comments
 (0)