Skip to content

Commit 7e3da6c

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into plga
2 parents c3bee1a + 275b5fd commit 7e3da6c

37 files changed

+871
-410
lines changed

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,6 @@ There are multiple scenarios that organizations can now enable using filter for
3737

3838
Filter for devices is an option when creating a Conditional Access policy in the Azure portal or using the Microsoft Graph API.
3939

40-
> [!IMPORTANT]
41-
> Device state and filter for devices cannot be used together in Conditional Access policy.
42-
4340
The following steps will help create two Conditional Access policies to support the first scenario under [Common scenarios](#common-scenarios).
4441

4542
Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ When user risk is detected, administrators can employ the user risk policy condi
194194
When a user is prompted to change a password, they'll first be required to complete multifactor authentication. Make sure all users have registered for multifactor authentication, so they're prepared in case risk is detected for their account.
195195

196196
> [!WARNING]
197-
> Users must have previously registered for self-service password reset before triggering the user risk policy.
197+
> Users must have previously registered for multifactor authentication before triggering the user risk policy.
198198
199199
The following restrictions apply when you configure a policy by using the password change control:
200200

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,6 @@ The software the user is employing to access the cloud app. For example, 'Browse
8383

8484
The behavior of the client apps condition was updated in August 2020. If you have existing Conditional Access policies, they'll remain unchanged. However, if you select on an existing policy, the configure toggle has been removed and the client apps the policy applies to are selected.
8585

86-
#### Device state
87-
88-
This control is used to exclude devices that are hybrid Azure AD joined, or marked a compliant in Intune. This exclusion can be done to block unmanaged devices.
89-
9086
#### Filter for devices
9187

9288
This control allows targeting specific devices based on their attributes in a policy.

articles/active-directory/conditional-access/resilience-defaults.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ When resilience defaults are disabled, the Backup Authentication Service won't u
7373
7474
## Testing resilience defaults
7575

76-
It isn't possible to conduct a dry run using the Backup Authentication Service or simulate the result of a policy with resilience defaults enabled or disabled at this time. Azure AD will conduct monthly exercises using the Backup Authentication Service. The sign-in logs will display if the Backup Authentication Service was used to issue the access token.
76+
It isn't possible to conduct a dry run using the Backup Authentication Service or simulate the result of a policy with resilience defaults enabled or disabled at this time. Azure AD will conduct monthly exercises using the Backup Authentication Service. The sign-in logs will display if the Backup Authentication Service was used to issue the access token. In **Azure portal** > **Monitoring** > **Sign-in Logs** blade, you can add the filter "Token issuer type == Azure AD Backup Auth" to display the logs processed by Azure AD Backup Authentication service.
7777

7878
## Configuring resilience defaults
7979

articles/active-directory/identity-protection/howto-identity-protection-configure-notifications.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ Azure AD Identity Protection sends two types of automated notification emails to
2424

2525
This article provides you with an overview of both notification emails.
2626

27-
We don't support sending emails to users in group-assigned roles.
27+
> [!Note]
28+
> **We don't support sending emails to users in group-assigned roles.**
2829
2930
## Users at risk detected email
3031

articles/active-directory/identity-protection/howto-identity-protection-configure-risk-policies.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,23 +34,23 @@ Configured trusted [network locations](../conditional-access/location-condition.
3434

3535
### Risk remediation
3636

37-
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD multifactor authentication (MFA) and secure self-service password reset (SSPR).
37+
Organizations can choose to block access when risk is detected. Blocking sometimes stops legitimate users from doing what they need to. A better solution is to allow self-remediation using Azure AD multifactor authentication (MFA) and secure password change.
3838

3939
> [!WARNING]
40-
> Users must register for Azure AD MFA and SSPR before they face a situation requiring remediation. Users not registered are blocked and require administrator intervention.
40+
> Users must register for Azure AD MFA before they face a situation requiring remediation. For hybrid users that are synced from on-premises to cloud, password writeback must have been enabled on them. Users not registered are blocked and require administrator intervention.
4141
>
42-
> Password change (I know my password and want to change it to something new) outside of the risky user policy remediation flow does not meet the requirement for secure password reset.
42+
> Password change (I know my password and want to change it to something new) outside of the risky user policy remediation flow does not meet the requirement for secure password change.
4343
4444
### Microsoft's recommendation
4545

4646
Microsoft recommends the below risk policy configurations to protect your organization:
4747

4848
- User risk policy
49-
- Require a secure password reset when user risk level is **High**. Azure AD MFA is required before the user can create a new password with SSPR to remediate their risk.
49+
- Require a secure password change when user risk level is **High**. Azure AD MFA is required before the user can create a new password with password writeback to remediate their risk.
5050
- Sign-in risk policy
5151
- Require Azure AD MFA when sign-in risk level is **Medium** or **High**, allowing users to prove it's them by using one of their registered authentication methods, remediating the sign-in risk.
5252

53-
Requiring access control when risk level is low will introduce more user interrupts. Choosing to block access rather than allowing self-remediation options, like secure password reset and multifactor authentication, will impact your users and administrators. Weigh these choices when configuring your policies.
53+
Requiring access control when risk level is low will introduce more user interrupts. Choosing to block access rather than allowing self-remediation options, like secure password change and multifactor authentication, will impact your users and administrators. Weigh these choices when configuring your policies.
5454

5555
## Exclusions
5656

articles/active-directory/manage-apps/grant-admin-consent.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,13 +73,13 @@ When granting tenant-wide admin consent using either method described above, a w
7373
The tenant-wide admin consent URL follows the following format:
7474

7575
```http
76-
https://login.microsoftonline.com/{tenant-id}/adminconsent?client_id={client-id}
76+
https://login.microsoftonline.com/{organization}/adminconsent?client_id={client-id}
7777
```
7878

7979
where:
8080

8181
- `{client-id}` is the application's client ID (also known as app ID).
82-
- `{tenant-id}` is your organization's tenant ID or any verified domain name.
82+
- `{organization}` is the tenant ID or any verified domain name of the tenant you want to consent the application in. You can use the value `common`, which will cause the consent to happen in the home tenant of the user you sign in with.
8383

8484
As always, carefully review the permissions an application requests before granting consent.
8585

articles/active-directory/saas-apps/introdus-pre-and-onboarding-platform-provisioning-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ The scenario outlined in this tutorial assumes that you already have the followi
3232

3333
* [An Azure AD tenant](../develop/quickstart-create-new-tenant.md)
3434
* A user account in Azure AD with [permission](../roles/permissions-reference.md) to configure provisioning (e.g. Application Administrator, Cloud Application administrator, Application Owner, or Global Administrator).
35-
* An introdus subscription, that includes Single Sign-On (SSO)
36-
* A valid introdus API Token. A guide on how to generate Token, can be found [here](https://api.introdus.dk/docs/#api-OpenAPI).
35+
* An introdus subscription, that includes single sign-on (SSO)
36+
* A valid introdus API Token.
3737

3838
## Step 1. Plan your provisioning deployment
3939
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
@@ -46,7 +46,7 @@ A subscription that allows SSO. No other configuration is necessary on introdus
4646

4747
## Step 3. Add introDus Pre and Onboarding Platform from the Azure AD application gallery
4848

49-
Add introDus Pre and Onboarding Platform from the Azure AD application gallery to start managing provisioning to introDus Pre and Onboarding Platform. If you have previously setup introDus Pre and Onboarding Platform for SSO you can use the same application. However it is recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
49+
Add introDus Pre and Onboarding Platform from the Azure AD application gallery to start managing provisioning to introDus Pre and Onboarding Platform. If you have previously setup introDus Pre and Onboarding Platform for SSO you can use the same application. However it's recommended that you create a separate app when testing out the integration initially. Learn more about adding an application from the gallery [here](../manage-apps/add-application-portal.md).
5050

5151
## Step 4. Define who will be in scope for provisioning
5252

@@ -91,7 +91,7 @@ This section guides you through the steps to configure the Azure AD provisioning
9191

9292
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to introDus Pre and Onboarding Platform**.
9393

94-
9. Review the user attributes that are synchronized from Azure AD to introDus Pre and Onboarding Platform in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in introDus Pre and Onboarding Platform for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the introDus Pre and Onboarding Platform API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
94+
9. Review the user attributes that are synchronized from Azure AD to introDus Pre and Onboarding Platform in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in introDus Pre and Onboarding Platform for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the introDus Pre and Onboarding Platform API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
9595

9696
|Attribute|Type|Supported for filtering|
9797
|---|---|---|
@@ -113,7 +113,7 @@ This section guides you through the steps to configure the Azure AD provisioning
113113

114114
![Provisioning Scope](common/provisioning-scope.png)
115115

116-
13. When you are ready to provision, click **Save**.
116+
13. When you're ready to provision, click **Save**.
117117

118118
![Saving Provisioning Configuration](common/provisioning-configuration-save.png)
119119

articles/aks/internal-lb.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -230,9 +230,9 @@ internal-app LoadBalancer 10.1.15.188 10.0.0.35 80:31669/TCP 1m
230230

231231
> [!NOTE]
232232
>
233-
> You may need to give the *Network Contributor* role to the resource group in which your Azure virtual network resources are deployed. You can view the cluster identity with [az aks show][az-aks-show], such as `az aks show --resource-group myResourceGroup --name myAKSCluster --query "identity"`. To create a role assignment, use the [az role assignment create][az-role-assignment-create] command.
233+
> You may need to assign a minimum of *Microsoft.Network/virtualNetworks/subnets/read* and *Microsoft.Network/virtualNetworks/subnets/join/action* permission to AKS MSI on the Azure Virtual Network resources. You can view the cluster identity with [az aks show][az-aks-show], such as `az aks show --resource-group myResourceGroup --name myAKSCluster --query "identity"`. To create a role assignment, use the [az role assignment create][az-role-assignment-create] command.
234234
235-
## Specify a different subnet
235+
### Specify a different subnet
236236

237237
Add the *azure-load-balancer-internal-subnet* annotation to your service to specify a subnet for your load balancer. The subnet specified must be in the same virtual network as your AKS cluster. When deployed, the load balancer *EXTERNAL-IP* address is part of the specified subnet.
238238

articles/aks/update-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To check the expiration date of your service principal, use the [az ad sp creden
4141
```azurecli
4242
SP_ID=$(az aks show --resource-group myResourceGroup --name myAKSCluster \
4343
--query servicePrincipalProfile.clientId -o tsv)
44-
az ad sp credential list --id "$SP_ID" --query "[].endDateTime" -o tsv
44+
az ad app credential list --id "$SP_ID" --query "[].endDateTime" -o tsv
4545
```
4646

4747
### Reset the existing service principal credential
@@ -59,7 +59,7 @@ SP_ID=$(az aks show --resource-group myResourceGroup --name myAKSCluster \
5959
With a variable set that contains the service principal ID, now reset the credentials using [az ad sp credential reset][az-ad-sp-credential-reset]. The following example lets the Azure platform generate a new secure secret for the service principal. This new secure secret is also stored as a variable.
6060

6161
```azurecli-interactive
62-
SP_SECRET=$(az ad sp credential reset --id "$SP_ID" --query password -o tsv)
62+
SP_SECRET=$(az ad app credential reset --id "$SP_ID" --query password -o tsv)
6363
```
6464

6565
Now continue on to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.

0 commit comments

Comments
 (0)