Skip to content

Commit 7e196f3

Browse files
authored
Merge pull request #188228 from MicrosoftDocs/main
2/10 AM Publish
2 parents 8055cfa + afbe6ee commit 7e196f3

File tree

68 files changed

+1204
-369
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+1204
-369
lines changed

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,9 @@ To secure your cloud resource, set up a claims rule so that Active Directory Fed
4343
6. Give your rule a name.
4444
7. Select **Authentication Methods References** as the Incoming claim type.
4545
8. Select **Pass through all claim values**.
46+
4647
![Screenshot shows Add Transform Claim Rule Wizard where you select Pass through all claim values.](./media/howto-mfa-adfs/configurewizard.png)
48+
4749
9. Click **Finish**. Close the AD FS Management console.
4850

4951
## Trusted IPs for federated users
@@ -59,25 +61,34 @@ The first thing we need to do is to configure the AD FS claims. Create two claim
5961
1. Open AD FS Management.
6062
2. On the left, select **Relying Party Trusts**.
6163
3. Right-click on **Microsoft Office 365 Identity Platform** and select **Edit Claim Rules…**
64+
6265
![ADFS Console - Edit Claim Rules](./media/howto-mfa-adfs/trustedip1.png)
66+
6367
4. On Issuance Transform Rules, click **Add Rule.**
68+
6469
![Adding a Claim Rule](./media/howto-mfa-adfs/trustedip2.png)
70+
6571
5. On the Add Transform Claim Rule Wizard, select **Pass Through or Filter an Incoming Claim** from the drop-down and click **Next**.
72+
6673
![Screenshot shows Add Transform Claim Rule Wizard where you select Pass Through or Filter an Incoming Claim.](./media/howto-mfa-adfs/trustedip3.png)
74+
6775
6. In the box next to Claim rule name, give your rule a name. For example: InsideCorpNet.
6876
7. From the drop-down, next to Incoming claim type, select **Inside Corporate Network**.
77+
6978
![Adding Inside Corporate Network claim](./media/howto-mfa-adfs/trustedip4.png)
79+
7080
8. Click **Finish**.
7181
9. On Issuance Transform Rules, click **Add Rule**.
7282
10. On the Add Transform Claim Rule Wizard, select **Send Claims Using a Custom Rule** from the drop-down and click **Next**.
7383
11. In the box under Claim rule name: enter *Keep Users Signed In*.
7484
12. In the Custom rule box, enter:
7585

76-
```ad-fs-claim-rule
86+
```ad-fs-claim-rule
7787
c:[Type == "http://schemas.microsoft.com/2014/03/psso"]
78-
=> issue(claim = c);
88+
=> issue(claim = c);
89+
```
90+
7991
![Create custom claim to keep users signed in](./media/howto-mfa-adfs/trustedip5.png)
80-
```
8192
8293
13. Click **Finish**.
8394
14. Click **Apply**.
@@ -97,4 +108,4 @@ Now that the claims are in place, we can configure trusted IPs.
97108
4. On the Service Settings page, under **trusted IPs**, select **Skip multi-factor-authentication for requests from federated users on my intranet**.
98109
5. Click **save**.
99110
100-
That's it! At this point, federated Microsoft 365 users should only have to use MFA when a claim originates from outside the corporate intranet.
111+
That's it! At this point, federated Microsoft 365 users should only have to use MFA when a claim originates from outside the corporate intranet.

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The Office 365 suite makes it possible to target these services all at once. We
7878

7979
Targeting this group of applications helps to avoid issues that may arise because of inconsistent policies and dependencies. For example: The Exchange Online app is tied to traditional Exchange Online data like mail, calendar, and contact information. Related metadata may be exposed through different resources like search. To ensure that all metadata is protected by as intended, administrators should assign policies to the Office 365 app.
8080

81-
Administrators can exclude specific apps from policy if they wish, including the Office 365 suite and excluding the specific apps in policy.
81+
Administrators can exclude the entire Office 365 suite or specific Office 365 client apps from the Conditional Access policy.
8282

8383
The following key applications are included in the Office 365 client app:
8484

articles/active-directory/hybrid/how-to-connect-pta-faq.yml

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ sections:
2525
- name: Ignored
2626
questions:
2727
- question: |
28-
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS), should I choose?
28+
Which of the methods to sign in to Azure AD, Pass-through Authentication, password hash synchronization, and Active Directory Federation Services (AD FS) should I choose?
2929
answer: |
3030
Review [this guide](./choose-ad-authn.md) for a comparison of the various Azure AD sign-in methods and how to choose the right sign-in method for your organization.
3131
@@ -180,20 +180,34 @@ sections:
180180
If you uninstall a Pass-through Authentication Agent from a server, it causes the server to stop accepting sign-in requests. To avoid breaking the user sign-in capability on your tenant, ensure that you have another Authentication Agent running before you uninstall a Pass-through Authentication Agent.
181181
182182
- question: |
183-
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
183+
I have an older tenant that was originally setup using AD FS. We recently migrated to PTA, but now are not seeing our UPN changes synchronizing to Azure AD. Why are our UPN changes not being synchronized?
184184
answer: |
185-
A: Under the following circumstances your on-premises UPN changes may not synchronize if:
185+
Under the following circumstances your on-premises UPN changes might not synchronize if:
186186
187-
- Your Azure AD tenant was created prior to June 15th 2015
188-
- You initially were federated with your Azure AD tenant using AD FS for authentication
189-
- You switched to having managed users using PTA as authentication
187+
- Your Azure AD tenant was created prior to June 15, 2015.
188+
- You initially were federated with your Azure AD tenant using AD FS for authentication.
189+
- You switched to having managed users using PTA as authentication.
190190
191-
This is because the default behavior of tenants created prior to June 15th 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlt:
191+
This is because the default behavior of tenants created prior to June 15, 2015 was to block UPN changes. If you need to un-block UPN changes you need to run the following PowerShell cmdlet:
192192
193193
`Set-MsolDirSyncFeature -Feature SynchronizeUpnForManagedUsers -Enable $True`
194194
195-
Tenants created after June 15th 2015 have the default behavior of synchronizing UPN changes.
195+
Tenants created after June 15, 2015 have the default behavior of synchronizing UPN changes.
196196
197+
- question: |
198+
How do I capture the PTA Agent ID from Azure AD sign-in logs and the PTA server to validate which PTA server was used for a sign-in event?
199+
answer: |
200+
To validate which local server or authentication agent was used for a specific sign-in event:
201+
202+
1. In the Azure portal, go to the sign-in event.
203+
2. Select **Authentication Details**. In the **Authentication Method Detail** column, Agent ID details are shown in the format "Pass-through Authentication; PTA AgentId: XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX".
204+
3. To get Agent ID details for the agent that's installed on your local server, log in to your local server and run following cmdlet:
205+
206+
`Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Azure AD Connect Agents\Azure AD Connect Authentication Agent' | Select *Instance*`
207+
208+
The GUID value that's returned is the Agent ID of the authentication agent that's installed on that specific server. If you have multiple agents in your environment, you can run this cmdlet on each agent server and capture the Agent ID details.
209+
4. Correlate the Agent ID that you get from the local server and from the Azure AD sign-in logs to validate which agent or server acknowledged the sign-request.
210+
197211
additionalContent: |
198212
199213
## Next steps

articles/active-directory/saas-apps/facebook-work-accounts-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040
## Step 1. Plan your provisioning deployment
4141
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
4242
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
43-
1. Determine what data to [map between Azure AD and Vonage](../app-provisioning/customize-application-attributes.md).
43+
1. Determine what data to [map between Azure AD and Facebook Work Accounts](../app-provisioning/customize-application-attributes.md).
4444

4545

4646
## Step 2. Add Facebook Work Accounts from the Azure AD application gallery

articles/active-directory/standards/configure-azure-active-directory-for-fedramp-high-impact.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following is a list of FedRAMP resources:
4242

4343
* [FedRAMP Security Assessment Framework](https://www.fedramp.gov/assets/resources/documents/FedRAMP_Security_Assessment_Framework.pdf)
4444

45-
* [Agency Guide for FedRAMP Authorizations](https://www.fedramp.gov/assets/resources/documents/Agency_Guide_for_Reuse_of_FedRAMP_Authorizations.pdf)
45+
* [Agency Guide for FedRAMP Authorizations](https://www.fedramp.gov/assets/resources/documents/Agency_Authorization_Playbook.pdf)
4646

4747
* [Managing compliance in the cloud at Microsoft](https://www.microsoft.com/trustcenter/common-controls-hub)
4848

articles/analysis-services/analysis-services-refresh-azure-automation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The Service Principal you create must have server administrator permissions on t
6262
4. Browse for the [Refresh-Model.ps1](#sample-powershell-runbook) file, provide a **Name** and **Description**, and then click **Create**.
6363

6464
> [!NOTE]
65-
> Use script from [Sample Powershell Runbook](#sample-powershell-runbook) section at the bottom of this document to create a file called Refresh-Model.ps1 and save to local machine to import into Runbook.
65+
> Use script from [Sample PowerShell Runbook](#sample-powershell-runbook) section at the bottom of this document to create a file called Refresh-Model.ps1 and save to local machine to import into Runbook.
6666
6767
![Import Runbook](./media/analysis-services-refresh-azure-automation/9.png)
6868

articles/api-management/api-management-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ sections:
103103
answer: |
104104
Yes. This can be done through PowerShell or by directly submitting to the API. This will disable certificate chain validation and will allow you to use self-signed or privately-signed certificates when communicating from API Management to the back end services.
105105
106-
### Powershell method
106+
### PowerShell method
107107
Use the [`New-AzApiManagementBackend`](/powershell/module/az.apimanagement/new-azapimanagementbackend) (for new back end) or [`Set-AzApiManagementBackend`](/powershell/module/az.apimanagement/set-azapimanagementbackend) (for existing back end) PowerShell cmdlets and set the `-SkipCertificateChainValidation` parameter to `True`.
108108
109109
```powershell

articles/api-management/automation-manage-api-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Reduce operational overhead and free up IT and DevOps staff to focus on work tha
2929
## How can Azure Automation help manage Azure API Management?
3030
API Management can be managed in Azure Automation by using the [Windows PowerShell cmdlets for Azure API Management API](/powershell/module/az.apimanagement). Within Azure Automation, you can write PowerShell workflow scripts to perform many of your API Management tasks using the cmdlets. You can also pair these cmdlets in Azure Automation with the cmdlets for other Azure services, to automate complex tasks across Azure services and 3rd party systems.
3131

32-
Here are some examples of using API Management with Powershell:
32+
Here are some examples of using API Management with PowerShell:
3333

3434
* [Azure PowerShell samples for API Management](./powershell-samples.md)
3535

articles/app-service/app-service-hybrid-connections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: madsd
55

66
ms.assetid: 66774bde-13f5-45d0-9a70-4e9536a4f619
77
ms.topic: article
8-
ms.date: 05/05/2021
8+
ms.date: 2/10/2022
99
ms.author: madsd
1010
ms.custom: seodec18, fasttrack-edit
1111
---
@@ -140,7 +140,7 @@ To support the Hybrid Connections it's configured with, HCM requires:
140140

141141
- TCP access to Azure over port 443.
142142
- TCP access to the Hybrid Connection endpoint.
143-
- The ability to do DNS look-ups on the endpoint host and the Service Bus namespace.
143+
- The ability to do DNS look-ups on the endpoint host and the Service Bus namespace. In other words, the hostname in the Azure relay connection should be resolvable from the machine hosting the HCM.
144144

145145
> [!NOTE]
146146
> Azure Relay relies on Web Sockets for connectivity. This capability is only available on Windows Server 2012 or later. Because of that, HCM is not supported on anything earlier than Windows Server 2012.

articles/app-service/environment/migrate.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Migrate to App Service Environment v3 by using the migration feature
33
description: Overview of the migration feature for migration to App Service Environment v3
44
author: seligj95
55
ms.topic: article
6-
ms.date: 2/2/2022
6+
ms.date: 2/10/2022
77
ms.author: jordanselig
88
ms.custom: references_regions
99
---
@@ -21,7 +21,6 @@ At this time, App Service Environment migrations to v3 using the migration featu
2121

2222
- West Central US
2323
- Canada Central
24-
- Canada East
2524
- UK South
2625
- Germany West Central
2726
- East Asia

0 commit comments

Comments
 (0)