Skip to content

Commit 630b839

Browse files
authored
Merge pull request #185053 from MicrosoftDocs/master
1/13 PM Publish
2 parents 46bb5da + a60170f commit 630b839

File tree

153 files changed

+3413
-484
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

153 files changed

+3413
-484
lines changed

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ To enable [self-service password reset](add-password-reset-policy.md) for the si
104104

105105
1. Select the sign-up or sign-in user flow you created.
106106
1. Under **Settings** in the left menu, select **Properties**.
107-
1. Under **Password complexity**, select **Self-service password reset**.
107+
1. Under **Password configuration**, select **Self-service password reset**.
108108
1. Select **Save**.
109109

110110
### Test the user flow

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ To complete this tutorial, you need the following resources and privileges:
4444
* If needed, [create and configure an Azure Active Directory Domain Services managed domain][create-azure-ad-ds-instance].
4545
* The *LDP.exe* tool installed on your computer.
4646
* If needed, [install the Remote Server Administration Tools (RSAT)][rsat] for *Active Directory Domain Services and LDAP*.
47+
* You need global administrator privileges in your Azure AD tenant to enable secure LDAP.
4748

4849
## Sign in to the Azure portal
4950

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: arvinh
1515

1616
# Enable accidental deletions prevention in the Azure AD provisioning service (Preview)
1717

18-
The Azure AD provisioning service includes a feature to help avoid accidental deletions. This feature ensures that users are not disabled or deleted in an application unexpectedly.
18+
The Azure AD provisioning service includes a feature to help avoid accidental deletions. This feature ensures that users aren't disabled or deleted in an application unexpectedly.
1919

2020
The feature lets you specify a deletion threshold, above which an admin
2121
needs to explicitly choose to allow the deletions to be processed.

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ Organizations may choose to use one or more of the following methods to enable t
7272

7373
To enable the use of security keys using Intune, complete the following steps:
7474

75-
1. Sign in to the [Azure portal](https://portal.azure.com).
75+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
7676
1. Browse to **Microsoft Intune** > **Device enrollment** > **Windows enrollment** > **Windows Hello for Business** > **Properties**.
7777
1. Under **Settings**, set **Use security keys for sign-in** to **Enabled**.
7878

@@ -82,13 +82,13 @@ Configuration of security keys for sign-in isn't dependent on configuring Window
8282

8383
To target specific device groups to enable the credential provider, use the following custom settings via Intune:
8484

85-
1. Sign in to the [Azure portal](https://portal.azure.com).
86-
1. Browse to **Microsoft Intune** > **Device configuration** > **Profiles** > **Create profile**.
85+
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
86+
1. Browse to **Device** > **Windows** > **Configuration Profiles** > **Create profile**.
8787
1. Configure the new profile with the following settings:
8888
- Name: Security Keys for Windows Sign-In
8989
- Description: Enables FIDO Security Keys to be used during Windows Sign In
9090
- Platform: Windows 10 and later
91-
- Profile type: Custom
91+
- Profile type: Template > Custom
9292
- Custom OMA-URI Settings:
9393
- Name: Turn on FIDO Security Keys for Windows Sign-In
9494
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
@@ -158,4 +158,4 @@ If you'd like to share feedback or encounter issues about this feature, share vi
158158

159159
[Learn more about device registration](../devices/overview.md)
160160

161-
[Learn more about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
161+
[Learn more about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ All users start out *Disabled*. When you enroll users in per-user Azure AD Multi
5353

5454
To view and manage user states, complete the following steps to access the Azure portal page:
5555

56-
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
56+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global administrator.
5757
1. Search for and select *Azure Active Directory*, then select **Users** > **All users**.
58-
1. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
58+
1. Select **Per-user MFA**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
5959
[![Select Multi-Factor Authentication from the Users window in Azure AD.](media/howto-mfa-userstates/selectmfa-cropped.png)](media/howto-mfa-userstates/selectmfa.png#lightbox)
6060
1. A new page opens that displays the user state, as shown in the following example.
6161
![Screenshot that shows example user state information for Azure AD Multi-Factor Authentication](./media/howto-mfa-userstates/userstate1.png)
@@ -120,4 +120,4 @@ To configure Azure AD Multi-Factor Authentication settings, see [Configure Azur
120120

121121
To manage user settings for Azure AD Multi-Factor Authentication, see [Manage user settings with Azure AD Multi-Factor Authentication](howto-mfa-userdevicesettings.md).
122122

123-
To understand why a user was prompted or not prompted to perform MFA, see [Azure AD Multi-Factor Authentication reports](howto-mfa-reporting.md).
123+
To understand why a user was prompted or not prompted to perform MFA, see [Azure AD Multi-Factor Authentication reports](howto-mfa-reporting.md).

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To make sure you understand the functionality and effects before you enable the
3131
To enable combined registration, complete these steps:
3232

3333
1. Sign in to the Azure portal as a user administrator or global administrator.
34-
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
34+
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature settings**.
3535
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
3636

3737
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)

articles/active-directory/authentication/tutorial-configure-custom-password-protection.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ To give you flexibility in what passwords are allowed, you can also define a cus
4949
* Locations, such as company headquarters
5050
* Company-specific internal terms
5151
* Abbreviations that have specific company meaning
52+
* Months and weekdays with your company's local languages
5253

5354
When a user attempts to reset a password to something that's on the global or custom banned password list, they see one of the following error messages:
5455

@@ -123,4 +124,4 @@ In this tutorial, you enabled and configured custom password protection lists fo
123124
> * Test password changes with a banned password
124125
125126
> [!div class="nextstepaction"]
126-
> [Enable risk-based Azure AD Multi-Factor Authentication](./tutorial-enable-azure-mfa.md)
127+
> [Enable risk-based Azure AD Multi-Factor Authentication](./tutorial-enable-azure-mfa.md)

articles/active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Azure Active Directory Connect cloud sync self-service password reset writeback
2626
- [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and [Hybrid Identity Administrator](../roles/permissions-reference.md#hybrid-identity-administrator) roles
2727
- [Global Administrator](../roles/permissions-reference.md#global-administrator) role
2828
- Azure AD configured for self-service password reset. If needed, complete this tutorial to enable Azure AD SSPR.
29-
- An on-premises AD DS environment configured with Azure AD Connect cloud sync version 1.1.587 or later. If needed, configure Azure AD Connect cloud sync using [this tutorial](tutorial-enable-sspr.md).
29+
- An on-premises AD DS environment configured with Azure AD Connect cloud sync version 1.1.587 or later. Learn how to [identify the agent's current version](../cloud-sync/how-to-automatic-upgrade.md). If needed, configure Azure AD Connect cloud sync using [this tutorial](tutorial-enable-sspr.md).
3030
- Enabling password writeback in Azure AD Connect cloud sync requires executing signed PowerShell scripts.
3131
- Ensure that the PowerShell execution policy will allow running of scripts.
3232
- The recommended execution policy during installation is "RemoteSigned".
@@ -45,7 +45,7 @@ Permissions for cloud sync are configured by default. If permissions need to be
4545

4646
### Enable password writeback in Azure AD Connect cloud sync
4747

48-
For public preview, you need to enable password writeback in Azure AD Connect cloud sync by using the Set-AADCloudSyncPasswordWritebackConfiguration cmdlet and tenant’s global administrator credentials:
48+
For public preview, you need to enable password writeback in Azure AD Connect cloud sync by using the Set-AADCloudSyncPasswordWritebackConfiguration cmdlet on the servers with the provisioning agents. You will need global administrator credentials:
4949

5050
```powershell
5151
Import-Module 'C:\\Program Files\\Microsoft Azure AD Connect Provisioning Agent\\Microsoft.CloudSync.Powershell.dll'

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ To correctly work with SSPR writeback, the account specified in Azure AD Connect
6060
* **Write permissions** on `pwdLastSet`
6161
* **Extended rights** for "Unexpire Password" on the root object of *each domain* in that forest, if not already set.
6262

63-
If you don't assign these permissions, writeback may appear to be configured correctly, but users encounter errors when they manage their on-premises passwords from the cloud. Permissions must be applied to **This object and all descendant objects** for "Unexpire Password" to appear.
63+
If you don't assign these permissions, writeback may appear to be configured correctly, but users encounter errors when they manage their on-premises passwords from the cloud. When setting "Unexpire Password" permissions in Active Directory, it must be applied to **This object and all descendant objects**, **This object only**, or **All descendant objects**, or the "Unexpire Password" permission can't be displayed.
6464

6565
> [!TIP]
6666
>

articles/active-directory/cloud-sync/concept-how-it-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
Cloud sync is built on top of the Azure AD services and has 2 key components:
2323

24-
- **Provisioning agent**: The Azure AD Connect cloud provisioning agent is the same agent as Workday inbound and built on the same server-side technology as app proxy and Pass Through Authentication. It requires and outbound connection only and agents are auto-updated.
24+
- **Provisioning agent**: The Azure AD Connect cloud provisioning agent is the same agent as Workday inbound and built on the same server-side technology as app proxy and Pass Through Authentication. It requires an outbound connection only and agents are auto-updated.
2525
- **Provisioning service**: Same provisioning service as outbound provisioning and Workday inbound provisioning which uses a scheduler-based model. In case of cloud sync, the changes are provisioned every 2 mins.
2626

2727

0 commit comments

Comments
 (0)