Skip to content

Commit 87b8bff

Browse files
authored
Merge branch 'main' into fw-basic
2 parents a115743 + 4045674 commit 87b8bff

File tree

1,058 files changed

+60276
-43307
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,058 files changed

+60276
-43307
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -374,12 +374,6 @@
374374
"branch": "master",
375375
"branch_mapping": {}
376376
},
377-
{
378-
"path_to_root": "media-services-v3-dotnet-quickstarts",
379-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-quickstarts",
380-
"branch": "master",
381-
"branch_mapping": {}
382-
},
383377
{
384378
"path_to_root": "media-services-v3-dotnet-tutorials",
385379
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-tutorials",

.openpublishing.redirection.json

Lines changed: 34271 additions & 34266 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.virtual-desktop.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,16 @@
1919
"source_path_from_root": "/articles/virtual-desktop/create-profile-container-adds.md",
2020
"redirect_url": "/azure/virtual-desktop/fslogix-profile-container-configure-azure-files-active-directory",
2121
"redirect_document_id": true
22+
},
23+
{
24+
"source_path_from_root": "/articles/virtual-desktop/shortpath.md",
25+
"redirect_url": "/azure/virtual-desktop/rdp-shortpath",
26+
"redirect_document_id": true
27+
},
28+
{
29+
"source_path_from_root": "/articles/virtual-desktop/shortpath-public.md",
30+
"redirect_url": "/azure/virtual-desktop/rdp-shortpath",
31+
"redirect_document_id": false
2232
}
2333
]
2434
}

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,11 @@ sections:
164164
How are Windows Updates applied in Azure AD Domain Services?
165165
answer: |
166166
Domain controllers in a managed domain automatically apply required Windows updates. There's nothing for you to configure or administer here. Make sure you don't create network security group rules that block outbound traffic to Windows Updates. For your own VMs joined to the managed domain, you are responsible for configuring and applying any required OS and application updates.
167+
168+
- question: |
169+
Why do my domain controllers change names?
170+
answer: |
171+
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
167172
168173
- name: Billing and availability
169174
questions:

articles/active-directory/authentication/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
href: tutorial-enable-sspr.md
1212
- name: Enable Azure AD Multi-Factor Authentication
1313
href: tutorial-enable-azure-mfa.md
14-
- name: Enable cloud sync password writeback (preview)
14+
- name: Enable cloud sync password writeback
1515
href: tutorial-enable-cloud-sync-sspr-writeback.md
1616
- name: Enable password writeback to on-premises
1717
href: tutorial-enable-sspr-writeback.md

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ manager: amycolannino
1414
ms.reviewer: annaba
1515

1616
ms.collection: M365-identity-device-management
17-
ms.custom: has-adal-ref
17+
1818
---
1919
# Get started with certificate-based authentication in Azure Active Directory with federation
2020

@@ -37,7 +37,7 @@ This topic:
3737

3838
To configure CBA with federation, the following statements must be true:
3939

40-
- CBA with federation is only supported for Federated environments for browser applications, native clients using modern authentication (ADAL), or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts. To configure Azure AD CBA without needing federation, see [How to configure Azure AD certificate-based authentication](how-to-certificate-based-authentication.md).
40+
- CBA with federation is only supported for Federated environments for browser applications, native clients using modern authentication, or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts. To configure Azure AD CBA without needing federation, see [How to configure Azure AD certificate-based authentication](how-to-certificate-based-authentication.md).
4141
- The root certificate authority and any intermediate certificate authorities must be configured in Azure Active Directory.
4242
- Each certificate authority must have a certificate revocation list (CRL) that can be referenced via an internet-facing URL.
4343
- You must have at least one certificate authority configured in Azure Active Directory. You can find related steps in the [Configure the certificate authorities](#step-2-configure-the-certificate-authorities) section.

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/17/2022
9+
ms.date: 09/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -66,7 +66,7 @@ The following table outlines when an authentication method can be used during a
6666
| Windows Hello for Business | Yes | MFA\* |
6767
| Microsoft Authenticator app | Yes | MFA and SSPR |
6868
| FIDO2 security key | Yes | MFA |
69-
| Certificate-based authentication (preview) | Yes | MFA and SSPR |
69+
| Certificate-based authentication (preview) | Yes | No |
7070
| OATH hardware tokens (preview) | No | MFA and SSPR |
7171
| OATH software tokens | No | MFA and SSPR |
7272
| SMS | Yes | MFA and SSPR |

articles/active-directory/authentication/concept-fido2-hardware-vendor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.date: 08/02/2021
55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
8-
author: knicholasa
9-
ms.author: nichola
8+
author: martincoetzer
9+
ms.author: martinco
1010
ms.topic: conceptual
1111
ms.collection: M365-identity-device-management
1212
---

0 commit comments

Comments
 (0)