Skip to content

Commit 813afb3

Browse files
authored
Merge pull request #243081 from MicrosoftDocs/main
Publish to Live Tuesday 4AM PST, 06/27
2 parents ae6f703 + d521b1b commit 813afb3

File tree

426 files changed

+3133
-1446
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

426 files changed

+3133
-1446
lines changed

.openpublishing.redirection.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14038,6 +14038,56 @@
1403814038
"redirect_url": "/azure/load-balancer/tutorial-load-balancer-standard-public-zone-redundant-portal",
1403914039
"redirect_document_id": false
1404014040
},
14041+
{
14042+
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-sample-zone-redundant-frontend.md",
14043+
"redirect_url": "/azure/load-balancer/tutorial-multi-availability-sets-portal",
14044+
"redirect_document_id": false
14045+
},
14046+
{
14047+
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-load-balance-multiple-websites-vm.md",
14048+
"redirect_url": "/azure/load-balancer/load-balancer-multiple-ip",
14049+
"redirect_document_id": false
14050+
},
14051+
{
14052+
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-sample-nlb.md",
14053+
"redirect_url": "/azure/load-balancer/tutorial-multi-availability-sets-portal",
14054+
"redirect_document_id": false
14055+
},
14056+
{
14057+
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-linux-cli-sample-zonal-frontend.md",
14058+
"redirect_url": "/azure/load-balancer/tutorial-load-balancer-standard-public-zonal-portal",
14059+
"redirect_document_id": false
14060+
},
14061+
{
14062+
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-windows-powershell-sample-nlb.md",
14063+
"redirect_url": "/azure/load-balancer/tutorial-multi-availability-sets-portal",
14064+
"redirect_document_id": false
14065+
},
14066+
{
14067+
"source_path_from_root": "/articles/load-balancer/scripts/load-balancer-windows-powershell-load-balance-multiple-websites-vm.md",
14068+
"redirect_url": "/azure/load-balancer/load-balancer-multiple-ip",
14069+
"redirect_document_id": false
14070+
},
14071+
{
14072+
"source_path_from_root": "/articles/load-balancer/cli-samples.md",
14073+
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-cli",
14074+
"redirect_document_id": false
14075+
},
14076+
{
14077+
"source_path_from_root": "/articles/load-balancer/powershell-samples.md",
14078+
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-powershell",
14079+
"redirect_document_id": false
14080+
},
14081+
{
14082+
"source_path_from_root": "/articles/load-balancer/python-samples.md",
14083+
"redirect_url": "/samples/azure-samples/azure-samples-python-management/network-python-manage-loadbalancer/",
14084+
"redirect_document_id": false
14085+
},
14086+
{
14087+
"source_path_from_root": "/articles/load-balancer-windows-powershell-load-balance-multiple-websites-vm.md",
14088+
"redirect_url": "/azure/load-balancer/load-balancer-multiple-ip-powershell",
14089+
"redirect_document_id": false
14090+
},
1404114091
{
1404214092
"source_path_from_root": "/articles/dms/tutorial-sql-server-azure-sql-online.md",
1404314093
"redirect_url": "/azure/dms/tutorial-sql-server-to-azure-sql",

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 06/01/2023
4+
ms.date: 06/21/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The following table lists each setting that can be set to Microsoft managed and
5757
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5858
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5959
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Disabled |
60-
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Disabled |
60+
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Enabled |
6161

6262
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
6363

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ We recommend that you don't sync your on-prem Active Directory admin accounts wi
231231

232232
### Environments with multiple identity management systems
233233

234-
Some environments have multiple identity management systems. On-premises identity managers like Oracle AM and SiteMinder, require synchronization with AD for passwords. You can do this using a tool like the Password Change Notification Service (PCNS) with Microsoft Identity Manager (MIM). To find information on this more complex scenario, see the article [Deploy the MIM Password Change Notification Service on a domain controller](/microsoft-identity-manager/deploying-mim-password-change-notification-service-on-domain-controller).
234+
Some environments have multiple identity management systems. On-premises identity managers like Oracle IAM and SiteMinder, require synchronization with AD for passwords. You can do this using a tool like the Password Change Notification Service (PCNS) with Microsoft Identity Manager (MIM). To find information on this more complex scenario, see the article [Deploy the MIM Password Change Notification Service on a domain controller](/microsoft-identity-manager/deploying-mim-password-change-notification-service-on-domain-controller).
235235

236236
## Plan Testing and Support
237237

articles/active-directory/develop/migrate-off-email-claim-authorization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This risk of unauthorized access has only been found in multi-tenant apps, as a
4343

4444
To secure applications from mistakes with unverified email addresses, all new multi-tenant applications are automatically opted-in to a new default behavior that removes email addresses with unverified domain owners from tokens as of June 2023. This behavior is not enabled for single-tenant applications and multi-tenant applications with previous sign-in activity with domain-owner unverified email addresses.
4545

46-
Depending on your scenario, you may determine that your application's tokens should continue receiving unverified emails. While not recommended for most applications, you may disable the default behavior by setting the `removeUnverifiedEmailClaim` property in the [Authentication Behaviors Microsoft Graph API](/graph/api/resources/authenticationbehaviors).
46+
Depending on your scenario, you may determine that your application's tokens should continue receiving unverified emails. While not recommended for most applications, you may disable the default behavior by setting the `removeUnverifiedEmailClaim` property in the [authenticationBehaviors object of the applications API in Microsoft Graph](/graph/applications-authenticationbehaviors).
4747

4848
By setting `removeUnverifiedEmailClaim` to `false`, your application will receive `email` claims that are potentially unverified and subject users to account takeover risk. If you're disabling this behavior in order to not break user login flows, it's highly recommended to migrate to a uniquely identifying token claim mapping as soon as possible, as described in the guidance below.
4949

@@ -125,4 +125,4 @@ If your application uses `email` (or any other mutable claim) for authorization
125125
## Next steps
126126

127127
- To learn more about using claims-based authorization securely, see [Secure applications and APIs by validating claims](claims-validation.md)
128-
- For more information about optional claims, see the [optional claims reference](./optional-claims-reference.md)
128+
- For more information about optional claims, see the [optional claims reference](./optional-claims-reference.md)

articles/active-directory/develop/msal-python-token-cache-serialization.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Custom token cache serialization (MSAL Python)
3-
description: Learn how to serializing the token cache for MSAL for Python
3+
description: Learn how to serialize token cache using MSAL for Python
44
services: active-directory
55
author: henrymbuguakiarie
66
manager: CelesteDG
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 11/13/2019
12+
ms.date: 06/26/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: nacanuma, rayluo
1515
ms.custom: aaddev, devx-track-python
@@ -18,15 +18,15 @@ ms.custom: aaddev, devx-track-python
1818

1919
# Custom token cache serialization in MSAL for Python
2020

21-
In MSAL Python, an in-memory token cache that persists for the duration of the app session, is provided by default when you create an instance of [ClientApplication](https://msal-python.readthedocs.io/en/latest/#confidentialclientapplication).
21+
In Microsoft Authentication Library (MSAL) for Python, an in-memory token cache that persists for the duration of the app session, is provided by default when you create an instance of [ClientApplication](/python/api/msal/msal.application.confidentialclientapplication).
2222

23-
Serialization of the token cache, so that different sessions of your app can access it, is not provided "out of the box." That's because MSAL Python can be used in app types that don't have access to the file system--such as Web apps. To have a persistent token cache in a MSAL Python app, you must provide custom token cache serialization.
23+
Serialization of the token cache, so that different sessions of your app can access it, isn't provided "out of the box." MSAL for Python can be used in app types that don't have access to the file system--such as Web apps. To have a persistent token cache in an app that uses MSAL for Python, you must provide custom token cache serialization.
2424

25-
The strategies for serializing the token cache differ depending on whether you are writing a public client application (Desktop), or a confidential client application (web app, web API, or daemon app).
25+
The strategies for serializing the token cache differ depending on whether you're writing a public client application (Desktop), or a confidential client application (web app, web API, or daemon app).
2626

2727
## Token cache for a public client application
2828

29-
Public client applications run on a user's device and manage tokens for a single user. In this case, you could serialize the entire cache into a file. Remember to provide file locking if your app, or another app, can access the cache concurrently. For a simple example of how to serialize a token cache to a file without locking, see the example in the [SerializableTokenCache](https://msal-python.readthedocs.io/en/latest/#msal.SerializableTokenCache) class reference documentation.
29+
Public client applications run on a user's device and manage tokens for a single user. In this case, you could serialize the entire cache into a file. Remember to provide file locking if your app, or another app, can access the cache concurrently. For a simple example of how to serialize a token cache to a file without locking, see the example in the [SerializableTokenCache](/python/api/msal/msal.token_cache.serializabletokencache) class reference documentation.
3030

3131
## Token cache for a Web app (confidential client application)
3232

0 commit comments

Comments
 (0)