Skip to content

Commit 78beb05

Browse files
authored
Merge pull request #199202 from MicrosoftDocs/main
5/24 PM Publish
2 parents b0de694 + f2f1372 commit 78beb05

File tree

758 files changed

+13710
-6493
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

758 files changed

+13710
-6493
lines changed

.openpublishing.redirection.json

Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17833,6 +17833,26 @@
1783317833
"redirect_url": "/azure/iot-dps/quick-setup-auto-provision-cli",
1783417834
"redirect_document_id": false
1783517835
},
17836+
{
17837+
"source_path_from_root": "/articles/iot-dps/tutorial-net-provision-device-to-hub.md",
17838+
"redirect_url": "/azure/iot-dps/",
17839+
"redirect_document_id": false
17840+
},
17841+
{
17842+
"source_path_from_root": "/articles/iot-dps/tutorial-provision-device-to-hub.md",
17843+
"redirect_url": "/azure/iot-dps/quick-create-simulated-device-symm-key",
17844+
"redirect_document_id": false
17845+
},
17846+
{
17847+
"source_path_from_root": "/articles/iot-dps/tutorial-set-up-cloud.md",
17848+
"redirect_url": "/azure/iot-dps/quick-create-simulated-device-symm-key",
17849+
"redirect_document_id": false
17850+
},
17851+
{
17852+
"source_path_from_root": "/articles/iot-dps/tutorial-set-up-device.md",
17853+
"redirect_url": "/azure/iot-dps/quick-create-simulated-device-symm-key",
17854+
"redirect_document_id": false
17855+
},
1783617856
{
1783717857
"source_path_from_root": "/articles/security/fundamentals/iot-overview.md",
1783817858
"redirect_url": "/azure/iot-fundamentals/iot-security-architecture",
@@ -21204,6 +21224,16 @@
2120421224
"redirect_url": "/azure/machine-learning/v1/reference-pipeline-yaml",
2120521225
"redirect_document_id": false
2120621226
},
21227+
{
21228+
"source_path_from_root": "/articles/machine-learning/how-to-create-register-datasets.md",
21229+
"redirect_url": "/azure/machine-learning/how-to-create-register-data-assets",
21230+
"redirect_document_id": false
21231+
},
21232+
{
21233+
"source_path_from_root": "/articles/machine-learning/how-to-access-data.md",
21234+
"redirect_url": "/azure/machine-learning/how-to-datastore",
21235+
"redirect_document_id": false
21236+
},
2120721237
{
2120821238
"source_path_from_root": "/articles/machine-learning/how-to-deploy-azure-container-instance.md",
2120921239
"redirect_url": "/azure/machine-learning/v1/how-to-deploy-azure-container-instance",
@@ -42774,6 +42804,11 @@
4277442804
"redirect_url": "/azure/aks/open-service-mesh-integrations",
4277542805
"redirect_document_id": false
4277642806
},
42807+
{
42808+
"source_path_from_root": "/articles/aks/spark-job.md",
42809+
"redirect_url": "/azure/aks/integrations#open-source-and-third-party-integrations",
42810+
"redirect_document_id": false
42811+
},
4277742812
{
4277842813
"source_path_from_root": "/articles/iot-dps/quick-create-device-symmetric-key-csharp.md",
4277942814
"redirect_url": "/azure/iot-dps/quick-create-simulated-device-symm-key",
@@ -43253,6 +43288,26 @@
4325343288
"source_path_from_root": "/articles/cognitive-services/language-service/text-summarization/quickstart.md",
4325443289
"redirect_url": "/azure/cognitive-services/language-service/summarization/quickstart",
4325543290
"redirect_document_id": true
43291+
},
43292+
{
43293+
"source_path_from_root": "/articles/virtual-network/nat-gateway/tutorial-create-nat-gateway-portal.md",
43294+
"redirect_url": "/azure/virtual-network/nat-gateway/quickstart-create-nat-gateway-portal",
43295+
"redirect_document_id": true
43296+
},
43297+
{
43298+
"source_path_from_root": "/articles/virtual-network/nat-gateway/tutorial-create-nat-gateway-powershell.md",
43299+
"redirect_url": "/azure/virtual-network/nat-gateway/quickstart-create-nat-gateway-powershell",
43300+
"redirect_document_id": true
43301+
},
43302+
{
43303+
"source_path_from_root": "/articles/virtual-network/nat-gateway/tutorial-create-nat-gateway-cli.md",
43304+
"redirect_url": "/azure/virtual-network/nat-gateway/quickstart-create-nat-gateway-cli",
43305+
"redirect_document_id": true
43306+
},
43307+
{
43308+
"source_path_from_root": "/articles/aks/web-app-routing.md",
43309+
"redirect_url": "/azure/aks/intro-kubernetes",
43310+
"redirect_document_id":false
4325643311
}
4325743312
]
4325843313
}

articles/active-directory-b2c/partner-xid.md

Lines changed: 159 additions & 41 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -288,17 +288,10 @@ Make sure that enough DCs are patched to respond in time to service your resourc
288288
> [!NOTE]
289289
> The `/keylist` switch in the `nltest` command is available in client Windows 10 v2004 and later.
290290
291-
### What if I have a CloudTGT but it never gets exchange for a OnPremTGT when I am using Windows Hello for Business Cloud Trust?
292-
293-
Make sure that the user you are signed in as, is a member of the groups of users that can use FIDO2 as an authentication method, or enable it for all users.
294-
295-
> [!NOTE]
296-
> Even if you are not explicitly using a security key to sign-in to your device, the underlying technology is dependent on the FIDO2 infrastructure requirements.
297-
298291
### Do FIDO2 security keys work in a Windows login with RODC present in the hybrid environment?
299292

300293
An FIDO2 Windows login looks for a writable DC to exchange the user TGT. As long as you have at least one writable DC per site, the login works fine.
301294

302295
## Next steps
303296

304-
[Learn more about passwordless authentication](concept-authentication-passwordless.md)
297+
[Learn more about passwordless authentication](concept-authentication-passwordless.md)

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ For more information about these authentication protocols and services, see [Sig
8585

8686
Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you're using legacy authentication.
8787

88-
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
88+
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-in logs**.
8989
1. Add the Client App column if it isn't shown by clicking on **Columns** > **Client App**.
9090
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog box to apply your selections and close the dialog box.
9191
1. If you've activated the [new sign-in activity reports preview](../reports-monitoring/concept-all-sign-ins.md), repeat the above steps also on the **User sign-ins (non-interactive)** tab.

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ The Azure Active Directory (Azure AD) default configuration for user sign-in fre
3636

3737
It might sound alarming to not ask for a user to sign back in, in reality any violation of IT policies will revoke the session. Some examples include (but aren't limited to) a password change, an incompliant device, or account disable. You can also explicitly [revoke users’ sessions using PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken). The Azure AD default configuration comes down to “don’t ask users to provide their credentials if security posture of their sessions hasn't changed”.
3838

39-
The sign-in frequency setting works with apps that have implemented OAUTH2 or OIDC protocols according to the standards. Most Microsoft native apps for Windows, Mac, and Mobile including the following web applications comply with the setting.
39+
The sign-in frequency setting works with apps that have implemented OAuth2 or OIDC protocols according to the standards. Most Microsoft native apps for Windows, Mac, and Mobile including the following web applications comply with the setting.
4040

4141
- Word, Excel, PowerPoint Online
4242
- OneNote Online
@@ -48,7 +48,7 @@ The sign-in frequency setting works with apps that have implemented OAUTH2 or OI
4848
- Dynamics CRM Online
4949
- Azure portal
5050

51-
The sign-in frequency setting works with SAML applications as well, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
51+
The sign-in frequency setting works with 3rd party SAML applications and apps that have implemented OAuth2 or OIDC protocols, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
5252

5353
### User sign-in frequency and multi-factor authentication
5454

articles/active-directory/develop/active-directory-v2-protocols.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,11 @@ https://login.microsoftonline.com/<issuer>/oauth2/v2.0/token
7777

7878
# NOTE: These are examples. Endpoint URI format may vary based on application type,
7979
# sign-in audience, and Azure cloud instance (global or national cloud).
80+
81+
# The {issuer} value in the path of the request can be used to control who can sign into the application.
82+
# The allowed values are **common** for both Microsoft accounts and work or school accounts,
83+
# **organizations** for work or school accounts only, **consumers** for Microsoft accounts only,
84+
# and **tenant identifiers** such as the tenant ID or domain name.
8085
```
8186

8287
To find the endpoints for an application you've registered, in the [Azure portal](https://portal.azure.com) navigate to:

articles/active-directory/develop/sample-v2-code.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ The following samples show an application that accesses the Microsoft Graph API
108108
> |.NET Core| &#8226; [Call Microsoft Graph](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/1-Call-MSGraph) <br/> &#8226; [Call web API](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/2-Call-OwnApi)<br/> &#8226; [Call own web API](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/4-Call-OwnApi-Pop) <br/> &#8226; [Using managed identity and Azure key vault](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/3-Using-KeyVault)| MSAL.NET | Client credentials grant|
109109
> | ASP.NET|[Multi-tenant with Microsoft identity platform endpoint](https://github.com/Azure-Samples/ms-identity-aspnet-daemon-webapp) | MSAL.NET | Client credentials grant|
110110
> | Java | &#8226; [Call Microsoft Graph with Secret](https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/1.%20Server-Side%20Scenarios/msal-client-credential-secret) <br/> &#8226; [Call Microsoft Graph with Certificate](https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/1.%20Server-Side%20Scenarios/msal-client-credential-certificate)| MSAL Java | Client credentials grant|
111-
> | Node.js | [Sign in users and call web API](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-console) | MSAL Node | Client credentials grant |
111+
> | Node.js | [Call Microsoft Graph with secret](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-console) | MSAL Node | Client credentials grant |
112112
> | Python | &#8226; [Call Microsoft Graph with secret](https://github.com/Azure-Samples/ms-identity-python-daemon/tree/master/1-Call-MsGraph-WithSecret) <br/> &#8226; [Call Microsoft Graph with certificate](https://github.com/Azure-Samples/ms-identity-python-daemon/tree/master/2-Call-MsGraph-WithCertificate) | MSAL Python| Client credentials grant|
113113
114114
## Azure Functions as web APIs

articles/active-directory/develop/scenario-protected-web-api-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ You can create a web API from scratch by using Microsoft.Identity.Web project te
117117

118118
#### Starting from an existing ASP.NET Core 3.1 application
119119

120-
ASP.NET Core 3.1 uses the Microsoft.AspNetCore.AzureAD.UI library. The middleware is initialized in the Startup.cs file.
120+
ASP.NET Core 3.1 uses the Microsoft.AspNetCore.Authentication.JwtBearer library. The middleware is initialized in the Startup.cs file.
121121

122122
```csharp
123123
using Microsoft.AspNetCore.Authentication.JwtBearer;

articles/active-directory/enterprise-users/directory-delete-howto.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ You can put a subscription into the **Deprovisioned** state to be deleted in thr
9393

9494
If you have an Active or Cancelled Azure Subscription associated to your Azure AD Tenant then you would not be able to delete Azure AD Tenant. After you cancel, billing is stopped immediately. However, Microsoft waits 30 - 90 days before permanently deleting your data in case you need to access it or you change your mind. We don't charge you for keeping the data.
9595

96-
- If you have a free trial or pay-as-you-go subscription, you don't have to wait 90 days for the subscription to automatically delete. You can delete your subscription three days after you cancel it. The Delete subscription option isn't available until three days after you cancel your subscription. For more details please read through [Delete free trial or pay-as-you-go subscriptions](../../cost-management-billing/manage/cancel-azure-subscription.md#delete-free-trial-or-pay-as-you-go-subscriptions).
96+
- If you have a free trial or pay-as-you-go subscription, you don't have to wait 90 days for the subscription to automatically delete. You can delete your subscription three days after you cancel it. The Delete subscription option isn't available until three days after you cancel your subscription. For more details please read through [Delete free trial or pay-as-you-go subscriptions](../../cost-management-billing/manage/cancel-azure-subscription.md#delete-subscriptions).
9797
- All other subscription types are deleted only through the [subscription cancellation](../../cost-management-billing/manage/cancel-azure-subscription.md#cancel-subscription-in-the-azure-portal) process. In other words, you can't delete a subscription directly unless it's a free trial or pay-as-you-go subscription. However, after you cancel a subscription, you can create an [Azure support request](https://go.microsoft.com/fwlink/?linkid=2083458) to ask to have the subscription deleted immediately.
9898
- Alternatively, you can also move/transfer the Azure subscription to another Azure AD tenant account. When you transfer billing ownership of your subscription to an account in another Azure AD tenant, you can move the subscription to the new account's tenant. Additionally, perfoming Switch Directory on the subscription would not help as the billing would still be aligned with Azure AD Tenant which was used to sign up for the subscription. For more information review [Transfer a subscription to another Azure AD tenant account](../../cost-management-billing/manage/billing-subscription-transfer.md#transfer-a-subscription-to-another-azure-ad-tenant-account)
9999

@@ -156,4 +156,4 @@ You can put a self-service sign-up product like Microsoft Power BI or Azure Righ
156156

157157
## Next steps
158158

159-
[Azure Active Directory documentation](../index.yml)
159+
[Azure Active Directory documentation](../index.yml)

articles/active-directory/external-identities/b2b-direct-connect-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ B2B direct connect requires a mutual trust relationship between two Azure AD org
2424

2525
Currently, B2B direct connect capabilities work with Teams shared channels. When B2B direct connect is established between two organizations, users in one organization can create a shared channel in Teams and invite an external B2B direct connect user to it. Then from within Teams, the B2B direct connect user can seamlessly access the shared channel in their home tenant Teams instance, without having to manually sign in to the organization hosting the shared channel.
2626

27-
For licensing and pricing information related to B2B direct connect users, refer to [Azure Active Directory pricing](https://azure.microsoft.com/pricing/details/active-directory/).
27+
For licensing and pricing information related to B2B direct connect users, refer to [Azure Active Directory External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/).
2828

2929
## Managing cross-tenant access for B2B direct connect
3030

0 commit comments

Comments
 (0)