Skip to content

Commit 707844d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into anf-avs-ga-8nov2022
2 parents 6b92d19 + 597a41a commit 707844d

File tree

1,323 files changed

+12776
-7400
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,323 files changed

+12776
-7400
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,12 @@
164164
"branch": "dev",
165165
"branch_mapping": {}
166166
},
167+
{
168+
"path_to_root": "functions-quickstart-templates-v1",
169+
"url": "https://github.com/Azure/azure-functions-templates",
170+
"branch": "v1.x",
171+
"branch_mapping": {}
172+
},
167173
{
168174
"path_to_root": "azure-functions-samples-java",
169175
"url": "https://github.com/Azure-Samples/azure-functions-samples-java",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -798,6 +798,16 @@
798798
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
799799
"redirect_document_id": false
800800
},
801+
{
802+
"source_path_from_root": "/articles/aks/dapr-troubleshooting.md",
803+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
804+
"redirect_document_id": false
805+
},
806+
{
807+
"source_path_from_root": "/articles/aks/csi-secrets-store-troubleshooting.md",
808+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
809+
"redirect_document_id": false
810+
},
801811
{
802812
"source_path_from_root": "/articles/cdn/index.yml",
803813
"redirect_url": "/azure/frontdoor",

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2022
12+
ms.date: 11/07/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -50,8 +50,6 @@ In a self-asserted technical profile, you can use the **InputClaims** and **Inpu
5050

5151
## Display claims
5252

53-
The display claims feature is currently in **preview**.
54-
5553
The **DisplayClaims** element contains a list of claims to be presented on the screen for collecting data from the user. To prepopulate the values of display claims, use the input claims that were previously described. The element may also contain a default value.
5654

5755
The order of the claims in **DisplayClaims** specifies the order in which Azure AD B2C renders the claims on the screen. To force the user to provide a value for a specific claim, set the **Required** attribute of the **DisplayClaim** element to `true`.
@@ -133,7 +131,7 @@ Use output claims when:
133131
- **Claims are output by output claims transformation**.
134132
- **Setting a default value in an output claim** without collecting data from the user or returning the data from the validation technical profile. The `LocalAccountSignUpWithLogonEmail` self-asserted technical profile sets the **executed-SelfAsserted-Input** claim to `true`.
135133
- **A validation technical profile returns the output claims** - Your technical profile may call a validation technical profile that returns some claims. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. For example, when signing in with a local account, the self-asserted technical profile named `SelfAsserted-LocalAccountSignin-Email` calls the validation technical profile named `login-NonInteractive`. This technical profile validates the user credentials and also returns the user profile. Such as 'userPrincipalName', 'displayName', 'givenName' and 'surName'.
136-
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. The display control feature is currently in **preview**.
134+
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey.
137135

138136
The following example demonstrates the use of a self-asserted technical profile that uses both display claims and output claims.
139137

articles/active-directory/app-provisioning/known-issues.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,9 @@ If a user and their manager are both in scope for provisioning, the service prov
9595

9696
The global reader role is unable to read the provisioning configuration. Please create a custom role with the `microsoft.directory/applications/synchronization/standard/read` permission in order to read the provisioning configuration from the Azure Portal.
9797

98+
#### Microsoft Azure Government Cloud
99+
Credentials, including the secret token, notification email, and SSO certificate notification emails together have a 1KB limit in the Microsoft Azure Government Cloud.
100+
98101
## On-premises application provisioning
99102
The following information is a current list of known limitations with the Azure AD ECMA Connector Host and on-premises application provisioning.
100103

@@ -139,4 +142,4 @@ The following attributes and objects aren't supported:
139142
The ECMA host does not support updating the password in the connectivity page of the wizard. Please create a new connector when changing the password.
140143

141144
## Next steps
142-
[How provisioning works](how-provisioning-works.md)
145+
[How provisioning works](how-provisioning-works.md)

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 08/26/2022
10+
ms.date: 11/04/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -93,7 +93,7 @@ You can define one or more matching attribute(s) and prioritize them based on th
9393
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
9494
- Reducing the distance between the two ends of the hop.
9595
- Choosing the right network to traverse. For example, traversing a private network rather than the public internet might be faster because of dedicated links.
96-
96+
- The agent and ECMA Host rely on a certificate for communication. The self-signed certificate generated by the ECMA host should only be used for testing purposes. The self-signed certificate expires in two years by default and cannot be revoked. Microsoft recommends using a certificiate from a trusted CA for production use cases.
9797

9898

9999
## Provisioning agent questions

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 10/17/2022
11+
ms.date: 11/04/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -1315,16 +1315,7 @@ Applications that support the SCIM profile described in this article can be conn
13151315

13161316
The following screenshot shows the Azure AD application gallery:
13171317

1318-
![Screenshot shows the Azure AD application gallery.](media/use-scim-to-provision-users-and-groups/scim-figure-2b-1.png)
1319-
1320-
1321-
> [!NOTE]
1322-
> If you are using the old app gallery experience, follow the screen guide below.
1323-
1324-
The following screenshot shows the Azure AD old app gallery experience:
1325-
1326-
![Screenshot shows the Azure AD old app gallery experience](media/use-scim-to-provision-users-and-groups/scim-figure-2a.png)
1327-
1318+
![Screenshot shows the Azure AD application gallery.](media/use-scim-to-provision-users-and-groups/scim-figure-2b-1.png)
13281319

13291320
1. In the app management screen, select **Provisioning** in the left panel.
13301321
1. In the **Provisioning Mode** menu, select **Automatic**.

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 27 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 11/03/2022
7+
ms.date: 11/04/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -17,7 +17,7 @@ This topic covers how to enable number matching in Microsoft Authenticator push
1717

1818
>[!NOTE]
1919
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will begin to be enabled by default for all users starting February 27, 2023.<br>
20-
>We highly recommend enabling number matching in the near-term for improved sign-in security.
20+
>We highly recommend enabling number matching in the near term for improved sign-in security.
2121
2222
## Prerequisites
2323

@@ -358,20 +358,40 @@ To enable number matching in the Azure AD portal, complete the following steps:
358358

359359
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
360360

361-
Number match will be enabled for all users of Microsoft Authenticator app after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
361+
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
362362

363-
### Can I opt out of number matching?
363+
### How should users be prepared for default number matching?
364364

365-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
365+
Here are differences in sign-in scenarios that Microsoft Authenticator users will see after number matching is enabled by default:
366+
367+
- Authentication flows will require users to do number match when using Microsoft Authenticator. If their version of Microsoft Authenticator doesn’t support number match, their authentication will fail.
368+
- Self-service password reset (SSPR) and combined registration will also require number match when using Microsoft Authenticator.
369+
- AD FS adapter will require number matching on [supported versions of Windows Server](#ad-fs-adapter). On earlier versions, users will continue to see the **Approve**/**Deny** experience and won’t see number matching until you upgrade.
370+
- NPS extension versions beginning 1.2.2131.2 will require users to do number matching. Because the NPS extension can’t show a number, the user will be asked to enter a One-Time Passcode (OTP). The user must have an OTP authentication method such as Microsoft Authenticator or software OATH tokens registered to see this behavior. If the user doesn’t have an OTP method registered, they’ll continue to get the **Approve**/**Deny** experience.
371+
372+
To create a registry key that overrides this behavior and prompts users with **Approve**/**Deny**:
373+
374+
1. On the NPS Server, open the Registry Editor.
375+
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
376+
1. Set the following Key Value Pair:
377+
Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP
378+
Value = FALSE
379+
1. Restart the NPS Service.
366380

367-
### What about my Apple Watch?
381+
- Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
368382

369-
Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
383+
### Can I opt out of number matching?
384+
385+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
370386

371387
### What happens if a user runs an older version of Microsoft Authenticator?
372388

373389
If a user is running an older version of Microsoft Authenticator that doesn't support number matching, authentication won't work if number matching is enabled. Users need to upgrade to the latest version of Microsoft Authenticator to use it for sign-in.
374390

391+
### Why is my user prompted to tap on one out of three numbers instead of entering the number in their Microsoft Authenticator app?
392+
393+
Older versions of Microsoft Authenticator prompt users to tap and select a number instead of entering the number in their Microsoft Authenticator app. These authentications won't fail, but we highly recommend that users update to the latest version of the app to be able to enter the number.
394+
375395

376396
## Next steps
377397

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -39,16 +39,16 @@ The [Azure portal](https://portal.azure.com/) now has a passwordless methods wiz
3939

4040
Microsoft's passwordless authentication methods enable many scenarios. Consider your organizational needs, prerequisites, and the capabilities of each authentication method to select your passwordless authentication strategy.
4141

42-
The following table lists the passwordless authentication methods by device types. Our recommendations are in **bold**.
42+
The following table lists the passwordless authentication methods by device types. Our recommendations are in ***bold italics***.
4343

4444
| Device types| Passwordless authentication method |
4545
| - | - |
46-
| Dedicated non-windows devices| <li> **Microsoft Authenticator** <li> Security keys |
47-
| Dedicated Windows 10 computers (version 1703 and later)| <li> **Windows Hello for Business** <li> Security keys |
48-
| Dedicated Windows 10 computers (before version 1703)| <li> **Windows Hello for Business** <li> Microsoft Authenticator app |
49-
| Shared devices: tablets, and mobile devices| <li> **Microsoft Authenticator** <li> One-time password sign-in |
50-
| Kiosks (Legacy)| **Microsoft Authenticator** |
51-
| Kiosks and shared computers ‎(Windows 10)| <li> **Security keys** <li> Microsoft Authenticator app |
46+
| Dedicated non-windows devices| <li> ***Microsoft Authenticator*** <li> Security keys |
47+
| Dedicated Windows 10 computers (version 1703 and later)| <li> ***Windows Hello for Business*** <li> Security keys |
48+
| Dedicated Windows 10 computers (before version 1703)| <li> ***Windows Hello for Business*** <li> Microsoft Authenticator app |
49+
| Shared devices: tablets, and mobile devices| <li> ***Microsoft Authenticator*** <li> One-time password sign-in |
50+
| Kiosks (Legacy)| ***Microsoft Authenticator*** |
51+
| Kiosks and shared computers ‎(Windows 10)| <li> ***Security keys*** <li> Microsoft Authenticator app |
5252

5353

5454
## Prerequisites

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ description: Learn about deployment considerations and strategy for successful i
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: how-to
7-
ms.date: 06/01/2022
8-
ms.author: mtillman
9-
author: mtillman
10-
manager: martinco
7+
ms.date: 11/04/2022
8+
ms.author: justinha
9+
author: justinha
10+
manager: amycolannino
1111
ms.reviewer: michmcla
1212
ms.collection: M365-identity-device-management
1313
---
@@ -246,7 +246,7 @@ You can monitor authentication method registration and usage across your organiz
246246

247247
The Azure AD sign-in reports include authentication details for events when a user is prompted for MFA, and if any Conditional Access policies were in use. You can also use PowerShell for reporting on users registered for Azure AD Multi-Factor Authentication.
248248

249-
NPS extension and AD FS logs can be viewed from **Security** > **MFA** > **Activity report**. Inclusion of this activity in the [Sign-in logs](../reports-monitoring/concept-sign-ins.md) is currently in Preview.
249+
NPS extension and AD FS logs for cloud MFA activity are now included in the [Sign-in logs](../reports-monitoring/concept-sign-ins.md), and no longer published to **Security** > **MFA** > **Activity report**.
250250

251251
For more information, and additional Azure AD Multi-Factor Authentication reports, see [Review Azure AD Multi-Factor Authentication events](howto-mfa-reporting.md#view-the-azure-ad-sign-ins-report).
252252

articles/active-directory/develop/active-directory-saml-protocol-reference.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/27/2021
12+
ms.date: 11/4/2022
1313
ms.author: kenwith
14-
ms.custom: aaddev
14+
ms.custom: aaddev, engagement-fy23
1515
ms.reviewer: paulgarn
1616
---
1717

@@ -23,14 +23,17 @@ The SAML protocol requires the identity provider (Microsoft identity platform) a
2323

2424
When an application is registered with Azure AD, the app developer registers federation-related information with Azure AD. This information includes the **Redirect URI** and **Metadata URI** of the application.
2525

26-
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. In the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>, you can open the app in **Azure Active Directory -> App registrations**, and then in **Manage -> Authentication**, you can update the Logout URL. This way the Microsoft identity platform can send the response to the correct URL.
26+
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. This way the Microsoft identity platform can send the response to the correct URL. In the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>;
2727

28-
Azure AD exposes tenant-specific and common (tenant-independent) SSO and single sign-out endpoints. These URLs represent addressable locations--they're not just identifiers--so you can go to the endpoint to read the metadata.
28+
- Open the app in **Azure Active Directory** and select **App registrations**
29+
- Under **Manage**, select **Authentication**. From there you can update the Logout URL.
2930

30-
- The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The _\<TenantDomainName>_ placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the contoso.com tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
31+
Azure AD exposes tenant-specific and common (tenant-independent) SSO and single sign-out endpoints. These URLs represent addressable locations, and aren't only identifiers. You can then go to the endpoint to read the metadata.
32+
33+
- The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The *\<TenantDomainName>* placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the `contoso.com` tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
3134

3235
- The tenant-independent endpoint is located at
33-
`https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml`. In this endpoint address, **common** appears instead of a tenant domain name or ID.
36+
`https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml`. In this endpoint address, *common* appears instead of a tenant domain name or ID.
3437

3538
## Next steps
3639

0 commit comments

Comments
 (0)