Skip to content

Commit 8863316

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-agent-reformatting
2 parents 2126853 + 33011af commit 8863316

File tree

1,178 files changed

+5162
-33021
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,178 files changed

+5162
-33021
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,12 +72,12 @@
7272
},
7373
{
7474
"source_path_from_root": "/articles/azure-monitor/app/correlation.md",
75-
"redirect_url": "/previous-versions/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
75+
"redirect_url": "/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
7676
"redirect_document_id": false
7777
},
7878
{
7979
"source_path_from_root": "/articles/azure-monitor/app/distributed-tracing.md",
80-
"redirect_url": "/previous-versions/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
80+
"redirect_url": "/azure/azure-monitor/app/distributed-tracing-telemetry-correlation",
8181
"redirect_document_id": false
8282
},
8383
{

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22538,6 +22538,11 @@
2253822538
"redirect_url": "/azure/communication-services/concepts/call-automation/call-recording/bring-your-own-storage",
2253922539
"redirect_document_id": false
2254022540
},
22541+
{
22542+
"source_path_from_root": "/articles/openshift/howto-configure-ovn-kubernetes.md",
22543+
"redirect_url": "/azure/openshift/concepts-ovn-kubernetes",
22544+
"redirect_document_id": false
22545+
},
2254122546
{
2254222547
"source_path_from_root": "/articles/sentinel/data-connectors/microsoft-defender-threat-intelligence.md",
2254322548
"redirect_url": "/azure/sentinel/understand-threat-intelligence",
@@ -22547,6 +22552,11 @@
2254722552
"source_path_from_root": "/articles/principles-for-ai-generated-content.md",
2254822553
"redirect_url": "https://aka.ms/ai-content-principles",
2254922554
"redirect_document_id": false
22550-
}
22555+
},
22556+
{
22557+
"source_path_from_root": "/articles/azure-monitor/app/java-standalone-arguments.md",
22558+
"redirect_url": "/azure/azure-monitor/app/java-get-started-supplemental",
22559+
"redirect_document_id": true
22560+
}
2255122561
]
2255222562
}

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ The Authenticator app can help prevent unauthorized access to accounts and stop
4343

4444
![Screenshot of example web browser prompt for Authenticator app notification to complete sign-in process.](media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-browser-prompt.png)
4545

46+
In some rare instances where the relevant Google or Apple service responsible for push notifications is down, users may not receive their push notifications. In these cases users should manually navigate to the Microsoft Authenticator app (or relevant companion app like Outlook), refresh by either pulling down or hitting the refresh button, and approve the request.
47+
4648
> [!NOTE]
4749
> If your organization has staff working in or traveling to China, the *Notification through mobile app* method on Android devices doesn't work in that country/region as Google play services(including push notifications) are blocked in the region. However iOS notification do work. For Android devices ,alternate authentication methods should be made available for those users.
4850

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ If enabled for Authenticator Lite, users are prompted to register their account
138138
GET auditLogs/signIns
139139
```
140140

141-
If the sign-in was done by phone app notification, under **authenticationAppDeivceDetails** the **clientApp** field returns **microsoftAuthenticator** or **Outlook**.
141+
If the sign-in was done by phone app notification, under **authenticationAppDeviceDetails** the **clientApp** field returns **microsoftAuthenticator** or **Outlook**.
142142

143143
If a user has registered Authenticator Lite, the user’s registered authentication methods include **Microsoft Authenticator (in Outlook)**.
144144

articles/active-directory/develop/includes/web-app/quickstart-nodejs.md

Lines changed: 0 additions & 120 deletions
This file was deleted.

articles/active-directory/devices/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,8 @@
5858
href: troubleshoot-device-dsregcmd.md
5959
- name: Troubleshoot hybrid Azure AD joined down level Windows devices
6060
href: troubleshoot-hybrid-join-windows-legacy.md
61+
- name: Local Administrator Password Solution
62+
href: howto-manage-local-admin-passwords.md
6163
- name: Manage device identities
6264
href: device-management-azure-portal.md
6365
- name: Troubleshooting Windows devices

articles/active-directory/devices/concept-primary-refresh-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ A PRT is invalidated in the following scenarios:
142142

143143
* **Invalid user**: If a user is deleted or disabled in Azure AD, their PRT is invalidated and can't be used to obtain tokens for applications. If a deleted or disabled user already signed in to a device before, cached sign-in would log them in, until CloudAP is aware of their invalid state. Once CloudAP determines that the user is invalid, it blocks subsequent logons. An invalid user is automatically blocked from sign in to new devices that don’t have their credentials cached.
144144
* **Invalid device**: If a device is deleted or disabled in Azure AD, the PRT obtained on that device is invalidated and can't be used to obtain tokens for other applications. If a user is already signed in to an invalid device, they can continue to do so. But all tokens on the device are invalidated and the user doesn't have SSO to any resources from that device.
145-
* **Password change**: After a user changes their password, the PRT obtained with the previous password is invalidated by Azure AD. Password change results in the user getting a new PRT. This invalidation can happen in two different ways:
145+
* **Password change**: If a user obtained the PRT with their password, the PRT is invalidated by Azure AD when the user changes their password. Password change results in the user getting a new PRT. This invalidation can happen in two different ways:
146146
* If user signs in to Windows with their new password, CloudAP discards the old PRT and requests Azure AD to issue a new PRT with their new password. If user doesn't have an internet connection, the new password can't be validated, Windows may require the user to enter their old password.
147147
* If a user has logged in with their old password or changed their password after signing into Windows, the old PRT is used for any WAM-based token requests. In this scenario, the user is prompted to reauthenticate during the WAM token request and a new PRT is issued.
148148
* **TPM issues**: Sometimes, a device’s TPM can falter or fail, leading to inaccessibility of keys secured by the TPM. In this case, the device is incapable of getting a PRT or requesting tokens using an existing PRT as it can't prove possession of the cryptographic keys. As a result, any existing PRT is invalidated by Azure AD. When Windows 10 detects a failure, it initiates a recovery flow to re-register the device with new cryptographic keys. With Hybrid Azure Ad join, just like the initial registration, the recovery happens silently without user input. For Azure AD joined or Azure AD registered devices, the recovery needs to be performed by a user who has administrator privileges on the device. In this scenario, the recovery flow is initiated by a Windows prompt that guides the user to successfully recover the device.

0 commit comments

Comments
 (0)