Skip to content

Commit 6b11260

Browse files
Merge pull request #229566 from Justinha/aads-pass
fixed typo
2 parents ee5e455 + df94e6d commit 6b11260

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/active-directory-domain-services/password-policy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,13 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 01/29/2023
13+
ms.date: 03/06/2023
1414
ms.author: justinha
1515

1616
---
1717
# Password and account lockout policies on Azure Active Directory Domain Services managed domains
1818

19-
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific groups of users.
19+
To manage user security in Azure Active Directory Domain Services (Azure AD DS), you can define fine-grained password policies that control account lockout settings or minimum password length and complexity. A default fine grained password policy is created and applied to all users in an Azure AD DS managed domain. To provide granular control and meet specific business or compliance needs, additional policies can be created and applied to specific users or groups.
2020

2121
This article shows you how to create and configure a fine-grained password policy in Azure AD DS using the Active Directory Administrative Center.
2222

@@ -110,15 +110,15 @@ To create a custom password policy, you use the Active Directory Administrative
110110

111111
![Select the users and groups to apply the password policy to](./media/password-policy/fgpp-applies-to.png)
112112

113-
1. Password policies can only be applied to groups. In the **Locations** dialog, expand the domain name, such as *aaddscontoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
113+
1. In the **Locations** dialog, expand the domain name, such as *aaddscontoso.com*, then select an OU, such as **AADDC Users**. If you have a custom OU that contains a group of users you wish to apply, select that OU.
114114

115115
![Select the OU that the group belongs to](./media/password-policy/fgpp-container.png)
116116

117-
1. Type the name of the group you wish to apply the policy to, then select **Check Names** to validate that the group exists.
117+
1. Type the name of the user or group you wish to apply the policy to. Select **Check Names** to validate the account.
118118

119119
![Search for and select the group to apply FGPP](./media/password-policy/fgpp-apply-group.png)
120120

121-
1. With the name of the group you selected now displayed in **Directly Applies To** section, select **OK** to save your custom password policy.
121+
1. Click **OK** to save your custom password policy.
122122

123123
## Next steps
124124

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about deployment considerations and strategy for successful i
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: how-to
7-
ms.date: 01/29/2023
7+
ms.date: 03/06/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -187,7 +187,7 @@ If the user does not have a backup method available, you can:
187187

188188
- Provide them a Temporary Access Pass so that they can manage their own authentication methods. You can also provide a Temporary Access Pass to enable temporary access to resources.
189189
- Update their methods as an administrator. To do so, select the user in the Azure portal, then select Authentication methods and update their methods.
190-
User communications
190+
191191

192192
## Plan integration with on-premises systems
193193

0 commit comments

Comments
 (0)