Skip to content

Commit 6c4c245

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into tutorial-incremental-copy-change-tracking-feature-portal
2 parents c0818e9 + 1858995 commit 6c4c245

File tree

918 files changed

+9036
-5885
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

918 files changed

+9036
-5885
lines changed

.openpublishing.publish.config.json

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -849,9 +849,15 @@
849849
"branch_mapping": {}
850850
},
851851
{
852-
"path_to_root": "azure-cosmos-dotnet-v3",
853-
"url": "https://github.com/Azure-Samples/cosmos-db-sql-api-dotnet-samples",
854-
"branch": "v3",
852+
"path_to_root": "cosmos-db-nosql-dotnet-samples",
853+
"url": "https://github.com/azure-samples/cosmos-db-nosql-dotnet-samples",
854+
"branch": "main",
855+
"branch_mapping": {}
856+
},
857+
{
858+
"path_to_root": "cosmos-db-nosql-python-samples",
859+
"url": "https://github.com/azure-samples/cosmos-db-nosql-python-samples",
860+
"branch": "main",
855861
"branch_mapping": {}
856862
},
857863
{

.openpublishing.redirection.azure-productivity.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,11 @@
2929
"source_path_from_root": "/articles/devtest-labs/scripts/set-allowed-vm-sizes-in-lab.md",
3030
"redirect_url": "/azure/devtest-labs/samples-powershell",
3131
"redirect_document_id": false
32-
}
32+
},
33+
{
34+
"source_path": "articles/dev-box/tutorial-connect-to-dev-box-with-remote-desktop-app.md",
35+
"redirect_url": "/azure/dev-box/quickstart-connect-to-dev-box-with-remote-desktop-app",
36+
"redirect_document_id": false
37+
}
3338
]
3439
}

.openpublishing.redirection.communication-services.json

Lines changed: 0 additions & 9 deletions
This file was deleted.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29363,6 +29363,11 @@
2936329363
"source_path_from_root": "/articles/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6.md",
2936429364
"redirect_url": "/azure/virtual-network/ip-services/create-custom-ip-address-prefix-ipv6-powershell",
2936529365
"redirect_document_id": false
29366+
},
29367+
{
29368+
"source_path_from_root": "/articles/cloud-shell/example-terraform-bash.md",
29369+
"redirect_url": "/azure/developer/terraform/quickstart-configure",
29370+
"redirect_document_id": false
2936629371
}
2936729372
]
2936829373
}

articles/active-directory-b2c/identity-provider-azure-ad-single-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ If you want to get the `family_name` and `given_name` claims from Azure AD, you
8181
1. Select **Add optional claim**.
8282
1. For the **Token type**, select **ID**.
8383
1. Select the optional claims to add, `family_name` and `given_name`.
84-
1. Select **Add**. If **Turn on the Microsoft Graph email permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
84+
1. Select **Add**. If **Turn on the Microsoft Graph profile permission (required for claims to appear in token)** appears, enable it, and then select **Add** again.
8585
8686
## [Optional] Verify your app authenticity
8787

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/12/2022
4+
ms.date: 11/04/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 10/27/2022
7+
ms.date: 11/03/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
1717

1818
>[!NOTE]
19-
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will begin to be enabled by default for all users starting February 28, 2023.<br>
19+
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will begin to be enabled by default for all users starting February 27, 2023.<br>
2020
>We highly recommend enabling number matching in the near-term for improved sign-in security.
2121
2222
## Prerequisites
@@ -358,11 +358,11 @@ To enable number matching in the Azure AD portal, complete the following steps:
358358

359359
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
360360

361-
Number match will be enabled for all users of Microsoft Authenticator app after February 28, 2023. Relevant services will begin deploying these changes after February 28, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
361+
Number match will be enabled for all users of Microsoft Authenticator app after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
362362

363363
### Can I opt out of number matching?
364364

365-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 28, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
365+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
366366

367367
### What about my Apple Watch?
368368

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/13/2022
9+
ms.date: 10/18/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -46,7 +46,7 @@ The following limitations apply to using SSPR from the Windows sign-in screen:
4646
- Explorer.exe is replaced with a custom shell
4747
- Interactive logon: Require smart card is set to enabled or 1
4848
- The combination of the following specific three settings can cause this feature to not work.
49-
- Interactive logon: Do not require CTRL+ALT+DEL = Disabled
49+
- Interactive logon: Do not require CTRL+ALT+DEL = Disabled (only for Windows 10 version 1710 and earlier)
5050
- *DisableLockScreenAppNotifications* = 1 or Enabled
5151
- Windows SKU is Home edition
5252

articles/active-directory/authentication/multi-factor-authentication-faq.yml

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: faq
10-
ms.date: 07/14/2020
10+
ms.date: 11/03/2022
1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
@@ -18,12 +18,7 @@ summary: |
1818
This FAQ answers common questions about Azure AD Multi-Factor Authentication and using the Multi-Factor Authentication service. It's broken down into questions about the service in general, billing models, user experiences, and troubleshooting.
1919
2020
> [!IMPORTANT]
21-
> As of July 1, 2019, Microsoft will no longer offer MFA Server for new deployments. New customers who would like to require multi-factor authentication from their users should use cloud-based Azure AD Multi-Factor Authentication. Existing customers who have activated MFA Server prior to July 1 will be able to download the latest version, future updates and generate activation credentials as usual.
22-
>
23-
> The information shared below regarding the Azure Multi-Factor Authentication Server is only applicable for users who already have the MFA server running.
24-
>
25-
> Consumption-based licensing is no longer available to new customers effective September 1, 2018.
26-
> Effective September 1, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
21+
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
2722
2823
2924
sections:

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,6 @@ The following client apps are confirmed to support this setting:
161161
- Microsoft Teams
162162
- Microsoft To Do
163163
- Microsoft Word
164-
- Microsoft Power Apps
165164
- Microsoft Field Service (Dynamics 365)
166165
- MultiLine for Intune
167166
- Nine Mail - Email and Calendar

0 commit comments

Comments
 (0)