Skip to content

Commit 899e32a

Browse files
committed
fixing merge conflicts
2 parents 435660a + 8b897d9 commit 899e32a

File tree

39 files changed

+151
-64
lines changed

39 files changed

+151
-64
lines changed

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 06/29/2022
9+
ms.date: 08/05/2022
1010
ms.author: joflore
1111
author: MicrosoftGuyJFlo
1212
manager: karenhoran
@@ -188,6 +188,10 @@ The following restrictions apply when you configure a policy by using the passwo
188188

189189
If your organization has created terms of use, other options might be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources that the policy protects. You can find more information about terms of use in [Azure Active Directory terms of use](terms-of-use.md).
190190

191+
### Custom controls (preview)
192+
193+
Custom controls is a preview capability of the Azure Active Directory. When using custom controls, your users are redirected to a compatible service to satisfy authentication requirements outside of Azure Active Directory. For more information, check out the [Custom controls](controls.md) article.
194+
191195
## Next steps
192196

193197
- [Conditional Access: Session controls](concept-conditional-access-session.md)

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 01/11/2022
9+
ms.date: 08/05/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -29,18 +29,21 @@ If a policy where "Require one of the selected controls" is selected, we prompt
2929

3030
All policies are enforced in two phases:
3131

32-
- Phase 1: Collect session details
32+
- **Phase 1**: Collect session details
3333
- Gather session details, like network location and device identity that will be necessary for policy evaluation.
3434
- Phase 1 of policy evaluation occurs for enabled policies and policies in [report-only mode](concept-conditional-access-report-only.md).
35-
- Phase 2: Enforcement
35+
- **Phase 2**: Enforcement
3636
- Use the session details gathered in phase 1 to identify any requirements that haven't been met.
3737
- If there's a policy that is configured to block access, with the block grant control, enforcement will stop here and the user will be blocked.
3838
- The user will be prompted to complete more grant control requirements that weren't satisfied during phase 1 in the following order, until policy is satisfied:
39-
- Multi-factor authentication​
40-
- Approved client app/app protection policy​
41-
- Managed device (compliant or hybrid Azure AD join)​
42-
- Terms of use
43-
- Custom controls
39+
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multifactor-authentication)
40+
- [Device to be marked as compliant](./concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant)
41+
- [Hybrid Azure AD joined device](./concept-conditional-access-grant.md#require-hybrid-azure-ad-joined-device)
42+
- [Approved client app](./concept-conditional-access-grant.md#require-approved-client-app)
43+
- [App protection policy](./concept-conditional-access-grant.md#require-app-protection-policy)
44+
- [Password change](./concept-conditional-access-grant.md#require-password-change)
45+
- [Terms of use](concept-conditional-access-grant.md#terms-of-use)
46+
- [Custom controls](./concept-conditional-access-grant.md#custom-controls-preview)
4447
- Once all grant controls have been satisfied, apply session controls (App Enforced, Microsoft Defender for Cloud Apps, and token Lifetime)
4548
- Phase 2 of policy evaluation occurs for all enabled policies.
4649

@@ -76,7 +79,7 @@ Location data is provided by IP geolocation data. Administrators can choose to d
7679

7780
#### Client apps
7881

79-
By default, all newly created Conditional Access policies will apply to all client app types even if the client apps condition isn't configured.
82+
The software the user is employing to access the cloud app. For example, 'Browser', and 'Mobile apps and desktop clients'. By default, all newly created Conditional Access policies will apply to all client app types even if the client apps condition isn't configured.
8083

8184
The behavior of the client apps condition was updated in August 2020. If you have existing Conditional Access policies, they'll remain unchanged. However, if you select on an existing policy, the configure toggle has been removed and the client apps the policy applies to are selected.
8285

@@ -104,7 +107,7 @@ Block access does just that, it will block access under the specified assignment
104107

105108
The grant control can trigger enforcement of one or more controls.
106109

107-
- Require multi-factor authentication (Azure AD Multi-Factor Authentication)
110+
- Require multi-factor authentication
108111
- Require device to be marked as compliant (Intune)
109112
- Require Hybrid Azure AD joined device
110113
- Require approved client app
@@ -123,7 +126,7 @@ Administrators can choose to require one of the previous controls or all selecte
123126

124127
- Use app enforced restrictions
125128
- Currently works with Exchange Online and SharePoint Online only.
126-
- Passes device information to allow control of experience granting full or limited access.
129+
- Passes device information to allow control of experience granting full or limited access.
127130
- Use Conditional Access App Control
128131
- Uses signals from Microsoft Defender for Cloud Apps to do things like:
129132
- Block download, cut, copy, and print of sensitive documents.
@@ -133,6 +136,8 @@ Administrators can choose to require one of the previous controls or all selecte
133136
- Ability to change the default sign in frequency for modern authentication.
134137
- Persistent browser session
135138
- Allows users to remain signed in after closing and reopening their browser window.
139+
- Customize continuous access evaluation
140+
- Disable resilience defaults
136141

137142
## Simple policies
138143

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 06/01/2022
9+
ms.date: 08/05/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -33,9 +33,9 @@ The following options are available to include when creating a Conditional Acces
3333
- All users that exist in the directory including B2B guests.
3434
- Select users and groups
3535
- All guest and external users
36-
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
36+
- This selection includes any [B2B guests and external users](../external-identities/external-identities-overview.md) including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
3737
- Directory roles
38-
- Allows administrators to select specific built-in Azure AD directory roles used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
38+
- Allows administrators to select specific [built-in Azure AD directory roles](../roles/permissions-reference.md) used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
3939
- Users and groups
4040
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of user group in Azure AD, including dynamic or assigned security and distribution groups. Policy will be applied to nested users and groups.
4141

articles/active-directory/conditional-access/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 04/15/2022
9+
ms.date: 08/05/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -55,8 +55,8 @@ Common signals that Conditional Access can take in to account when making a poli
5555
- Application
5656
- Users attempting to access specific applications can trigger different Conditional Access policies.
5757
- Real-time and calculated risk detection
58-
- Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to change their password, do multi-factor authentication to reduce their risk level, or block access until an administrator takes manual action.
59-
- Microsoft Defender for Cloud Apps
58+
- Signals integration with [Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to change their password, do multi-factor authentication to reduce their risk level, or block access until an administrator takes manual action.
59+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
6060
- Enables user application access and sessions to be monitored and controlled in real time, increasing visibility and control over access to and activities done within your cloud environment.
6161

6262
## Common decisions

articles/active-directory/conditional-access/require-tou.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: conditional-access
77
ms.topic: quickstart
8-
ms.date: 11/21/2019
8+
ms.date: 08/05/2022
99
ms.author: joflore
1010
author: MicrosoftGuyJFlo
1111
manager: karenhoran
@@ -52,11 +52,11 @@ This section provides you with the steps to create a sample ToU. When you create
5252
1. In Microsoft Word, create a new document.
5353
1. Type **My terms of use**, and then save the document on your computer as **mytou.pdf**.
5454
1. Sign in to your [Azure portal](https://portal.azure.com) as global administrator, security administrator, or a Conditional Access administrator.
55-
1. In the Azure portal, on the left navbar, click **Azure Active Directory**.
55+
1. Search for and select **Azure Active Directory**. From the menu on the left-hand side select **Security**.
5656

5757
![Azure Active Directory](./media/require-tou/02.png)
5858

59-
1. On the **Azure Active Directory** page, in the **Security** section, click **Conditional Access**.
59+
1. Select **Conditional Access**.
6060

6161
![Conditional Access](./media/require-tou/03.png)
6262

articles/azure-cache-for-redis/cache-high-availability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Various high availability options are available in the Standard, Premium, and En
2222
| [Zone redundancy](#zone-redundancy) | Multi-node replicated configuration across Availability Zones, with automatic failover | 99.9% in Premium; 99.99% in Enterprise (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_1/)) |-|||
2323
| [Geo-replication](#geo-replication) | Linked cache instances in two regions, with user-controlled failover | Premium; Enterprise (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_1/)) |-|Passive|Active|
2424
| [Import/Export](#importexport) | Point-in-time snapshot of data in cache. | 99.9% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_1/)) |-|||
25-
| [Persistence](#persistence) | Periodic data saving to storage account. | 99.9% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_1/)) |-||-|
25+
| [Persistence](#persistence) | Periodic data saving to storage account. | 99.9% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_1/)) |-||Preview|
2626

2727
## Standard replication for high availability
2828

@@ -81,7 +81,7 @@ When a data node becomes unavailable or a network split happens, a failover simi
8181

8282
## Persistence
8383

84-
Applicable tiers: **Premium**
84+
Applicable tiers: **Premium**, **Enterprise (preview)**, **Enterprise Flash (preview)**
8585

8686
Because your cache data is stored in memory, a rare and unplanned failure of multiple nodes can cause all the data to be dropped. To avoid losing data completely, [Redis persistence](https://redis.io/topics/persistence) allows you to take periodic snapshots of in-memory data, and store it to your storage account. If you experience a failure across multiple nodes causing data loss, your cache loads the snapshot from storage account. For more information, see [Configure data persistence for a Premium Azure Cache for Redis instance](cache-how-to-premium-persistence.md).
8787

articles/azure-monitor/app/sdk-support-guidance.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,17 @@ Support engineers are expected to provide SDK update guidance according to the f
2020

2121
|Current SDK version in use |Alternative version available |Update policy for support |
2222
|---------|---------|---------|
23-
|Latest stable minor version of a GA SDK | Newer supported stable version | **UPDATE REQUIRED** |
24-
|Unsupported ([support policy](/lifecycle/faq/azure)) | Any supported version | **UPDATE REQUIRED** |
25-
|Preview | Stable version | **UPDATE REQUIRED** |
26-
|Preview | Older stable version | **UPDATE RECOMMENDED** |
27-
|Preview | Newer preview version, no older stable version | **UPDATE RECOMMENDED** |
23+
|Latest GA SDK | No newer supported stable version | **NO UPDATE NECESSARY** |
24+
|Stable minor version of a GA SDK | Newer supported stable version | **UPDATE RECOMMENDED** |
25+
|Unsupported ([support policy](/lifecycle/faq/azure)) | Any supported version | **UPDATE REQUIRED** |
26+
|Preview | Stable version | **UPDATE REQUIRED** |
27+
|Preview | Older stable version | **UPDATE RECOMMENDED** |
28+
|Preview | Newer preview version, no older stable version | **UPDATE RECOMMENDED** |
2829

2930
> [!TIP]
3031
> Switching to [auto-instrumentation](codeless-overview.md) eliminates the need for manual SDK updates.
3132
3233
> [!WARNING]
3334
> Only commercially reasonable support is provided for Preview versions of the SDK. If a support incident requires escalation to development for further guidance, customers will be asked to use a fully supported SDK version to continue support. Commercially reasonable support does not include an option to engage Microsoft product development resources; technical workarounds may be limited or not possible.
3435
35-
To see the current version of Application Insights SDKs and previous versions release dates, reference the [release notes](release-notes.md).
36+
To see the current version of Application Insights SDKs and previous versions release dates, reference the [release notes](release-notes.md).

articles/azure-video-indexer/connect-to-azure.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ ms.custom: ignite-fall-2021
99

1010
# Create an Azure Video Indexer account
1111

12+
[!INCLUDE [Gate notice](./includes/face-limited-access.md)]
13+
1214
When creating an Azure Video Indexer account, you can choose a free trial account (where you get a certain number of free indexing minutes) or a paid option (where you're not limited by the quota). With a free trial, Azure Video Indexer provides up to 600 minutes of free indexing to users and up to 2400 minutes of free indexing to users that subscribe to the Azure Video Indexer API on the [developer portal](https://aka.ms/avam-dev-portal). With the paid options, Azure Video Indexer offers two types of accounts: classic accounts(General Availability), and ARM-based accounts(Public Preview). Main difference between the two is account management platform. While classic accounts are built on the API Management, ARM-based accounts management is built on Azure, which enables apply access control to all services with role-based access control (Azure RBAC) natively.
1315

1416
> [!NOTE]

articles/azure-video-indexer/create-account-portal.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ ms.date: 06/10/2022
88

99
# Get started with Azure Video Indexer in Azure portal
1010

11+
[!INCLUDE [Gate notice](./includes/face-limited-access.md)]
12+
1113
This Quickstart walks you through the steps to get started with Azure Video Indexer. You'll create an Azure Video Indexer account and its accompanying resources by using the Azure portal.
1214

1315
To start using Azure Video Indexer, you'll need to create an Azure Video Indexer account. The account needs to be associated with a [Media Services][docs-ms] resource and a [managed identity][docs-uami]. The managed identity will need to have Contributor permissions role on the Media Services.

articles/azure-video-indexer/customize-content-models-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@ ms.author: kumud
88

99
# Customizing content models in Azure Video Indexer
1010

11+
[!INCLUDE [Gate notice](./includes/face-limited-access.md)]
12+
1113
Azure Video Indexer allows you to customize some of its models to be adapted to your specific use case. These models include [brands](customize-brands-model-overview.md), [language](customize-language-model-overview.md), and [person](customize-person-model-overview.md). You can easily customize these models using the Azure Video Indexer website or API.
1214

1315
This article gives links to articles that explain the benefits of each type of customization. The article also links to how-to guides that show how you can implement the customization of each model.

0 commit comments

Comments
 (0)