Skip to content

Commit 73f3e3c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into april3updates
2 parents 0ac74d1 + 70df1a9 commit 73f3e3c

File tree

735 files changed

+14956
-4923
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

735 files changed

+14956
-4923
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,11 @@
163163
"url": "https://github.com/Azure/azure-functions-templates",
164164
"branch": "dev"
165165
},
166+
{
167+
"path_to_root": "functions-quickstart-java",
168+
"url": "https://github.com/Azure-Samples/functions-quickstarts-java",
169+
"branch": "master"
170+
},
166171
{
167172
"path_to_root": "functions-docs-csharp",
168173
"url": "https://github.com/Azure-Samples/functions-docs-csharp",

.openpublishing.redirection.json

Lines changed: 37 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -345,6 +345,17 @@
345345
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/dsvm-tools-languages",
346346
"redirect_document_id": true
347347
},
348+
{
349+
"source_path": "articles/machine-learning/data-science-virtual-machine/reference-centos-vm.md",
350+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
351+
"redirect_document_id": false
352+
},
353+
{
354+
"source_path": "articles/machine-learning/data-science-virtual-machine/linux-dsvm-intro.md",
355+
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
356+
"redirect_document_id": true
357+
},
358+
348359
{
349360
"source_path": "articles/machine-learning/service/how-to-understand-accuracy-metrics.md",
350361
"redirect_url": "/azure/machine-learning/service/how-to-understand-automated-ml",
@@ -4055,11 +4066,21 @@
40554066
"redirect_url": "/azure/azure-government/documentation-government-welcome",
40564067
"redirect_document_id": false
40574068
},
4069+
{
4070+
"source_path": "articles/azure-government/documentation-government-k8.md",
4071+
"redirect_url": "/azure/azure-government",
4072+
"redirect_document_id": false
4073+
},
40584074
{
40594075
"source_path": "articles/azure-portal/resource-group-portal-linked-resources.md",
40604076
"redirect_url": "/azure/azure-portal/azure-portal-dashboards",
40614077
"redirect_document_id": false
40624078
},
4079+
{
4080+
"source_path": "articles/azure-resource-manager/templates/template-tutorial-create-linked-templates.md",
4081+
"redirect_url": "/azure/azure-resource-manager/templates/deployment-tutorial-linked-template",
4082+
"redirect_document_id": false
4083+
},
40634084
{
40644085
"source_path": "articles/azure-resource-manager/templates/template-tutorial-create-encrypted-storage-accounts.md",
40654086
"redirect_url": "/azure/azure-resource-manager/templates/template-tutorial-use-template-reference",
@@ -7586,7 +7607,7 @@
75867607
},
75877608
{
75887609
"source_path": "articles/azure-functions/functions-add-output-binding-storage-queue-python.md",
7589-
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli.md?pivots=programming-language-python",
7610+
"redirect_url": "/azure/azure-functions/functions-add-output-binding-storage-queue-cli?pivots=programming-language-python",
75907611
"redirect_document_id": false
75917612
},
75927613
{
@@ -7619,6 +7640,11 @@
76197640
"redirect_url": "/azure/python/tutorial-vs-code-serverless-python-01",
76207641
"redirect_document_id": false
76217642
},
7643+
{
7644+
"source_path": "articles/azure-functions/functions-create-first-java-maven.md",
7645+
"redirect_url": "/azure/azure-functions/functions-create-first-java-gradle",
7646+
"redirect_document_id": false
7647+
},
76227648
{
76237649
"source_path": "articles/azure-functions/scripts/functions-cli-configure-custom-domain.md",
76247650
"redirect_url": "/azure/app-service/scripts/cli-configure-custom-domain?toc=%2fcli%2fazure%2ftoc.json",
@@ -19184,6 +19210,11 @@
1918419210
"redirect_url": "/azure/backup/backup-overview",
1918519211
"redirect_document_id": false
1918619212
},
19213+
{
19214+
"source_path": "articles/backup/tutorial-backup-azure-files.md",
19215+
"redirect_url": "/azure/backup/backup-afs",
19216+
"redirect_document_id": false
19217+
},
1918719218
{
1918819219
"source_path": "articles/backup/backup-azure-backup-ibiza-faq.md",
1918919220
"redirect_url": "/azure/backup/backup-azure-backup-faq",
@@ -47004,6 +47035,11 @@
4700447035
"redirect_url": "/azure/iot-fundamentals/iot-services-and-technologies/",
4700547036
"redirect_document_id": false
4700647037
},
47038+
{
47039+
"source_path": "articles/iot-central/core/tutorial-connect-device.md",
47040+
"redirect_url": "/azure/iot-central/core/tutorial-connect-device-nodejs/",
47041+
"redirect_document_id": true
47042+
},
4700747043
{
4700847044
"source_path": "articles/iot-accelerators/iot-accelerators-arduino-iot-devkit-az3166-devkit-remote-monitoringV2.md",
4700947045
"redirect_url": "/azure/iot-accelerators/iot-accelerators-arduino-iot-devkit-az3166-devkit-remote-monitoring-v2",

articles/active-directory-b2c/analytics-with-application-insights.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 03/24/2020
12+
ms.date: 04/05/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515

@@ -128,6 +128,7 @@ Add the profiles to the *TrustFrameworkExtensions.xml* file from the starter pac
128128
<InputClaim ClaimTypeReferenceId="PolicyId" PartnerClaimType="{property:Policy}" DefaultValue="{Policy:PolicyId}" />
129129
<InputClaim ClaimTypeReferenceId="CorrelationId" PartnerClaimType="{property:CorrelationId}" DefaultValue="{Context:CorrelationId}" />
130130
<InputClaim ClaimTypeReferenceId="Culture" PartnerClaimType="{property:Culture}" DefaultValue="{Culture:RFC5646}" />
131+
</InputClaims>
131132
</TechnicalProfile>
132133

133134
<TechnicalProfile Id="AppInsights-SignInRequest">
@@ -236,4 +237,4 @@ Add claim types and events to your user journey to fit your needs. You can use [
236237

237238
## Next steps
238239

239-
- Learn more about [Application Insights](application-insights-technical-profile.md) technical profile in the IEF reference.
240+
- Learn more about [Application Insights](application-insights-technical-profile.md) technical profile in the IEF reference.

articles/active-directory-b2c/customize-ui-overview.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/19/2020
12+
ms.date: 04/04/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -87,7 +87,10 @@ Review the following guidance before using your own HTML and CSS files to custom
8787

8888
When using your own HTML and CSS files to customize the UI, you can host your UI content on any publicly available HTTPS endpoint that supports CORS. For example, [Azure Blob storage](../storage/blobs/storage-blobs-introduction.md), web servers, CDNs, AWS S3, or file sharing systems.
8989

90-
The important point is that you host the content on a publicly available HTTPS endpoint with CORS enabled. You must use an absolute URL when you specify it in your content.
90+
The important point is that you host the content on a publicly available HTTPS endpoint with [CORS enabled](https://enable-cors.org/server.html). You must use an absolute URL when you specify it in your content.
91+
92+
> [!NOTE]
93+
> For details about creating HTML content, uploading content to Azure Blob storage, and configuring CORS, see the [Custom page content walkthrough](custom-policy-ui-customization.md#custom-page-content-walkthrough) section in the UI customization article.
9194
9295
## Get started with custom HTML and CSS
9396

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ To support bearer token authentication in your custom policy, modify the REST AP
268268
1. Ensure you add the claim used above as an input claim:
269269

270270
```xml
271-
<InputClaim ClaimTyeReferenceId="bearerToken"/>
271+
<InputClaim ClaimTypeReferenceId="bearerToken"/>
272272
```
273273

274274
After you add the above snippets, your technical profile should look like the following XML code:
@@ -288,7 +288,7 @@ After you add the above snippets, your technical profile should look like the fo
288288
<Item Key="AllowInsecureAuthInProduction">false</Item>
289289
</Metadata>
290290
<InputClaims>
291-
<InputClaim ClaimTyeReferenceId="bearerToken"/>
291+
<InputClaim ClaimTypeReferenceId="bearerToken"/>
292292
</InputClaims>
293293
...
294294
</TechnicalProfile>

articles/active-directory-domain-services/troubleshoot-account-lockout.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: troubleshooting
12-
ms.date: 10/02/2019
12+
ms.date: 04/06/2020
1313
ms.author: iainfou
1414

1515
#Customer intent: As a directory administrator, I want to troubleshoot why user accounts are locked out in an Azure Active Directory Domain Services managed domain.
@@ -31,11 +31,11 @@ The default account lockout thresholds are configured using fine-grained passwor
3131

3232
### Fine-grained password policy
3333

34-
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. FGPP only affects users created in Azure AD DS. Cloud users and domain users synchronized into the Azure AD DS managed domain from Azure AD aren't affected by the password policies.
34+
Fine-grained password policies (FGPPs) let you apply specific restrictions for password and account lockout policies to different users in a domain. FGPP only affects users within an Azure AD DS managed domain. Cloud users and domain users synchronized into the Azure AD DS managed domain from Azure AD are only affected by the password policies within Azure AD DS. Their accounts in Azure AD or an on-premises directory aren't impacted.
3535

3636
Policies are distributed through group association in the Azure AD DS managed domain, and any changes you make are applied at the next user sign-in. Changing the policy doesn't unlock a user account that's already locked out.
3737

38-
For more information on fine-grained password policies, see [Configure password and account lockout policies][configure-fgpp].
38+
For more information on fine-grained password policies, and the differences between users created directly in Azure AD DS versus synchronized in from Azure AD, see [Configure password and account lockout policies][configure-fgpp].
3939

4040
## Common account lockout reasons
4141

articles/active-directory-domain-services/tutorial-configure-password-hash-sync.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ With Azure AD Connect installed and configured to synchronize with Azure AD, now
6666

6767
In this example screenshot, the following connectors are used:
6868

69-
* The Azure AD connector is named *aaddscontoso.onmicrosoft.com - AAD*
69+
* The Azure AD connector is named *contoso.onmicrosoft.com - AAD*
7070
* The on-premises AD DS connector is named *onprem.contoso.com*
7171

7272
1. Copy and paste the following PowerShell script to the computer with Azure AD Connect installed. The script triggers a full password sync that includes legacy password hashes. Update the `$azureadConnector` and `$adConnector` variables with the connector names from the previous step.

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ Use the following table to choose which method will support your requirements an
159159

160160
## Next steps
161161

162-
[Enable FIDO2 security key passwordlesss options in your organization](howto-authentication-passwordless-security-key.md)
162+
[Enable FIDO2 security key passwordless options in your organization](howto-authentication-passwordless-security-key.md)
163163

164164
[Enable phone-based passwordless options in your organization](howto-authentication-passwordless-phone.md)
165165

Lines changed: 34 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: How it works Azure MFA - Azure Active Directory
3-
description: Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
2+
title: Azure Multi-Factor Authentication overview
3+
description: Learn how Azure Multi-Factor Authentication helps safeguard access to data and applications while meeting user demand for a simple sign-in process.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/21/2019
9+
ms.date: 04/03/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -17,40 +17,50 @@ ms.collection: M365-identity-device-management
1717
---
1818
# How it works: Azure Multi-Factor Authentication
1919

20-
The security of two-step verification lies in its layered approach. Compromising multiple authentication factors presents a significant challenge for attackers. Even if an attacker manages to learn the user's password, it is useless without also having possession of the additional authentication method. It works by requiring two or more of the following authentication methods:
20+
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
2121

22-
* Something you know (typically a password)
23-
* Something you have (a trusted device that is not easily duplicated, like a phone)
24-
* Something you are (biometrics)
22+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
2523

26-
<center>
24+
![Conceptual image of the different forms of multi-factor authentication](./media/concept-mfa-howitworks/methods.png)
2725

28-
![Conceptual authentication methods image](./media/concept-mfa-howitworks/methods.png)</center>
26+
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
2927

30-
Azure Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
28+
* Something you know, typically a password.
29+
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
30+
* Something you are - biometrics like a fingerprint or face scan.
3131

32-
## How to get Multi-Factor Authentication?
32+
Users can register themselves for both self-service password reset and Azure Multi-Factor Authentication in one step to simplify the on-boarding experience. Administrators can define what forms of secondary authentication can be used. Azure Multi-Factor Authentication can also be required when users perform a self-service password reset to further secure that process.
3333

34-
Multi-Factor Authentication comes as part of the following offerings:
34+
![Authentication methods in use at the sign-in screen](media/concept-authentication-methods/overview-login.png)
3535

36-
* **Azure Active Directory Premium** or **Microsoft 365 Business** - Full featured use of Azure Multi-Factor Authentication using Conditional Access policies to require multi-factor authentication.
36+
Azure Multi-Factor Authentication helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring a second form of authentication and delivers strong authentication via a range of easy to use [authentication methods](concept-authentication-methods.md). Users may or may not be challenged for MFA based on configuration decisions that an administrator makes.
3737

38-
* **Azure AD Free** or standalone **Office 365** licenses - Use [Security Defaults](../fundamentals/concept-fundamentals-security-defaults.md) to require multi-factor authentication for your users and administrators.
38+
Your applications or services don't need to make any changes to use Azure Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in event, which automatically requests and processes the MFA challenge when required.
3939

40-
* **Azure Active Directory Global Administrators** - A subset of Azure Multi-Factor Authentication capabilities are available as a means to protect global administrator accounts.
40+
## Available verification methods
4141

42-
> [!NOTE]
43-
> New customers may no longer purchase Azure Multi-Factor Authentication as a standalone offering effective September 1st, 2018. Multi-factor authentication will continue to be an available feature in Azure AD Premium licenses.
42+
When a user signs in to an application or service and receive an MFA prompt, they can choose from one of their registered forms of additional verification. An administrator could require registration of these Azure Multi-Factor Authentication verification methods, or the user can access their own [My Profile](https://myprofile.microsoft.com) to edit or add verification methods.
4443

45-
## Supportability
44+
The following additional forms of verification can be used with Azure Multi-Factor Authentication:
4645

47-
Since most users are accustomed to using only passwords to authenticate, it is important that your organization communicates to all users regarding this process. Awareness can reduce the likelihood that users call your help desk for minor issues related to MFA. However, there are some scenarios where temporarily disabling MFA is necessary. Use the following guidelines to understand how to handle those scenarios:
46+
* Microsoft Authenticator app
47+
* OATH Hardware token
48+
* SMS
49+
* Voice call
4850

49-
* Train your support staff to handle scenarios where the user can't sign in because they do not have access to their authentication methods or they are not working correctly.
50-
* Using Conditional Access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
51-
* Consider using Conditional Access named locations as a way to minimize two-step verification prompts. With this functionality, administrators can bypass two-step verification for users that are signing in from a secure trusted network location such as a network segment used for new user onboarding.
52-
* Deploy [Azure AD Identity Protection](../active-directory-identityprotection.md) and trigger two-step verification based on risk detections.
51+
## How to enable and use Azure Multi-Factor Authentication
52+
53+
Users and groups can be enabled for Azure Multi-Factor Authentication to prompt for additional verification during the sign-in event. [Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) are available for all Azure AD tenants to quickly enable the use of the Microsoft Authenticator app for all users.
54+
55+
For more granular controls, [Conditional Access](../conditional-access/overview.md) policies can be used to define events or applications that require MFA. These policies can allow regular sign-in events when the user is on the corporate network or a registered device, but prompt for additional verification factors when remote or on a personal device.
56+
57+
![Overview diagram of how Conditional Access works to secure the sign-in process](media/tutorial-enable-azure-mfa/conditional-access-overview.png)
5358

5459
## Next steps
5560

56-
- [Step-by-step Azure Multi-Factor Authentication deployment](howto-mfa-getstarted.md)
61+
To learn about licensing, see [Features and licenses for Azure Multi-Factor Authentication](concept-mfa-licensing.md).
62+
63+
To see MFA in action, enable Azure Multi-Factor Authentication for a set of test users in the following tutorial:
64+
65+
> [!div class="nextstepaction"]
66+
> [Enable Azure Multi-Factor Authentication](tutorial-mfa-applications.md)

0 commit comments

Comments
 (0)