Skip to content

Commit 8d39fa8

Browse files
Merge pull request #246972 from MicrosoftGuyJFlo/ConditionalaccessToConditionalAccess
[Microsoft Entra ID] Conditioanl Access bulk casing fix
2 parents 4780440 + 05d79e6 commit 8d39fa8

30 files changed

+38
-38
lines changed

articles/active-directory/architecture/multi-tenant-user-management-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ The following conceptual and how-to articles provide information about Azure AD
6767
- [B2B and Office 365 external sharing](../external-identities/o365-external-user.md) explains the similarities and differences among sharing resources through B2B, Office 365, and SharePoint/OneDrive.
6868
- [Properties on an Azure AD B2B collaboration user](../external-identities/user-properties.md) describes the properties and states of the external user object in Azure AD. The description provides details before and after invitation redemption.
6969
- [B2B user tokens](../external-identities/user-token.md) provides examples of the bearer tokens for B2B for an external user.
70-
- [Conditional access for B2B](../external-identities/authentication-conditional-access.md) describes how Conditional Access and MFA work for external users.
70+
- [Conditional Access for B2B](../external-identities/authentication-conditional-access.md) describes how Conditional Access and MFA work for external users.
7171
- [Cross-tenant access settings](../external-identities/cross-tenant-access-overview.md) provides granular control over how external Azure AD organizations collaborate with you (inbound access) and how your users collaborate with external Azure AD organizations (outbound access).
7272
- [Cross-tenant synchronization overview](../multi-tenant-organizations/cross-tenant-synchronization-overview.md) explains how to automate creating, updating, and deleting Azure AD B2B collaboration users across tenants in an organization.
7373

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The following table provides a list of the features that are available in the va
5353
| Trusted IPs | | | |||
5454
| Remember MFA for trusted devices | |||||
5555
| MFA for on-premises applications | | | |||
56-
| Conditional access | | | |||
56+
| Conditional Access | | | |||
5757
| Risk-based Conditional Access | | | | ||
5858

5959
## Compare multi-factor authentication policies

articles/active-directory/authentication/tutorial-enable-azure-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ If you no longer want to use the Conditional Access policy that you configured a
188188

189189
1. Search for and select **Azure Active Directory**, and then select **Security** from the menu on the left-hand side.
190190

191-
1. Select **Conditional access**, and then select the policy that you created, such as **MFA Pilot**.
191+
1. Select **Conditional Access**, and then select the policy that you created, such as **MFA Pilot**.
192192

193193
1. select **Delete**, and then confirm that you want to delete the policy.
194194

articles/active-directory/conditional-access/troubleshoot-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,11 +59,11 @@ To find out which Conditional Access policy or policies applied and why do the f
5959
1. Find the event for the sign-in to review. Add or remove filters and columns to filter out unnecessary information.
6060
1. Add filters to narrow the scope:
6161
1. **Correlation ID** when you have a specific event to investigate.
62-
1. **Conditional access** to see policy failure and success. Scope your filter to show only failures to limit results.
62+
1. **Conditional Access** to see policy failure and success. Scope your filter to show only failures to limit results.
6363
1. **Username** to see information related to specific users.
6464
1. **Date** scoped to the time frame in question.
6565

66-
![Screenshot showing selecting the Conditional access filter in the sign-ins log.](./media/troubleshoot-conditional-access/image3.png)
66+
![Screenshot showing selecting the Conditional Access filter in the sign-ins log.](./media/troubleshoot-conditional-access/image3.png)
6767

6868
1. Once the sign-in event that corresponds to the user's sign-in failure has been found select the **Conditional Access** tab. The Conditional Access tab shows the specific policy or policies that resulted in the sign-in interruption.
6969
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that didn't meet compliance requirements.

articles/active-directory/develop/apple-sso-plugin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ Use the following configuration to enable Just in Time Registration for iOS/iPad
308308

309309
Learn more about Just in Time Registration [here](https://techcommunity.microsoft.com/t5/intune-customer-success/just-in-time-registration-for-ios-ipados-with-microsoft-intune/ba-p/3660843).
310310

311-
#### Conditional access policies and password changes
311+
#### Conditional Access policies and password changes
312312
Microsoft Enterprise SSO plug-in for Apple devices is compatible with various [Azure AD Conditional Access policies](/azure/active-directory/conditional-access/overview) and password change events. `browser_sso_interaction_enabled` is required to be enabled to achieve compatibility.
313313

314314
Compatible events and policies are documented in the following sections:

articles/active-directory/develop/includes/error-handling-and-tips/error-handling-claims-challenges.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: include
88
# Purpose:
99
# Ingested by Microsoft identity platform articles in /articles/active-directory/develop/* that document the error handling Conditional Access and claims challenges for the different platforms.
1010
---
11-
## Conditional access and claims challenges
11+
## Conditional Access and claims challenges
1212

1313
When getting tokens silently, your application may receive errors when a [Conditional Access claims challenge](../../v2-conditional-access-dev-guide.md) such as MFA policy is required by an API you're trying to access.
1414

articles/active-directory/external-identities/customers/concept-supported-features-customers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Although workforce tenants and customer tenants are built on the same underlying
3838
| **Groups** | [Groups](../../fundamentals/active-directory-groups-create-azure-portal.md) can be used to manage administrative and user accounts.| Groups can be used to manage administrative accounts. Support for Azure AD groups and [application roles](how-to-use-app-roles-customers.md) is being phased into customer tenants. For the latest updates, see [Groups and application roles support](reference-group-app-roles-support.md). |
3939
| **Roles and administrators**| [Roles and administrators](../../fundamentals/active-directory-users-assign-role-azure-portal.md) are fully supported for administrative and user accounts. | Roles aren't supported with customer accounts. Customer accounts don't have access to tenant resources.|
4040
| **Custom domain names** | You can use [custom domains](../../fundamentals/add-custom-domain.md) for administrative accounts only. | Not currently supported. However, the URLs visible to customers in sign-up and sign-in pages are neutral, unbranded URLs. [Learn more](concept-branding-customers.md)|
41-
| **Conditional Access** | [Conditional Access](../../conditional-access/overview.md) is fully supported for administrative and user accounts. | A subset of the Azure AD Conditional access is available. Multifactor authentication (MFA) is supported with local accounts in customer tenants. [Learn more](concept-security-customers.md).|
41+
| **Conditional Access** | [Conditional Access](../../conditional-access/overview.md) is fully supported for administrative and user accounts. | A subset of the Azure AD Conditional Access is available. Multifactor authentication (MFA) is supported with local accounts in customer tenants. [Learn more](concept-security-customers.md).|
4242
| **Identity protection** | Provides ongoing risk detection for your Azure AD tenant. It allows organizations to discover, investigate, and remediate identity-based risks. | A subset of the Azure AD Identity Protection risk detections is available. [Learn more](how-to-identity-protection-customers.md). |
4343
| **Application registration** | SAML relying parties, OpenID Connect, and OAuth2 | OpenID Connect and OAuth2 |
4444
| **Custom authentication extension** | Add claims from external systems. | Add claims from external systems. |

articles/active-directory/external-identities/customers/quickstart-trial-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ During the free trial period, you'll have access to all product features with fe
3333
| **MFA** (With email OTP.) | :heavy_check_mark: | :heavy_check_mark: |
3434
| **Custom token augmentation** (From external sources.) | :heavy_check_mark: | :heavy_check_mark: |
3535
| **Social identity providers** | :heavy_check_mark: | :heavy_check_mark: |
36-
| **Identity Protection** (Conditional access for adaptive risk-based policies.) | :x: | :heavy_check_mark: |
36+
| **Identity Protection** (Conditional Access for adaptive risk-based policies.) | :x: | :heavy_check_mark: |
3737
| Default, least-access privileges for CIAM end-users. | :heavy_check_mark: | :heavy_check_mark: |
3838
| **Rich authorization** (Including group and role management.) | :heavy_check_mark: | :heavy_check_mark: |
3939
| **Customizable** (Sign-in/sign-up experiences - background, logo, strings.) | :heavy_check_mark: | :heavy_check_mark: |

articles/active-directory/fundamentals/compare.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Most IT administrators are familiar with Active Directory Domain Services concep
3737
| Mid-tier/Daemon services|Services running in on-premises environments normally use AD service accounts or group Managed Service Accounts (gMSA) to run. These apps will then inherit the permissions of the service account.| Azure AD provides [managed identities](../managed-identities-azure-resources/index.yml) to run other workloads in the cloud. The lifecycle of these identities is managed by Azure AD and is tied to the resource provider and it can't be used for other purposes to gain backdoor access.|
3838
| **Devices**|||
3939
| Mobile|Active Directory doesn't natively support mobile devices without third-party solutions.| Microsoft’s mobile device management solution, Microsoft Intune, is integrated with Azure AD. Microsoft Intune provides device state information to the identity system to evaluate during authentication. |
40-
| Windows desktops|Active Directory provides the ability to domain join Windows devices to manage them using Group Policy, System Center Configuration Manager, or other third-party solutions.|Windows devices can be [joined to Azure AD](../devices/index.yml). Conditional access can check if a device is Azure AD joined as part of the authentication process. Windows devices can also be managed with [Microsoft Intune](/intune/what-is-intune). In this case, Conditional Access, will consider whether a device is compliant (for example, up-to-date security patches and virus signatures) before allowing access to the apps.|
40+
| Windows desktops|Active Directory provides the ability to domain join Windows devices to manage them using Group Policy, System Center Configuration Manager, or other third-party solutions.|Windows devices can be [joined to Azure AD](../devices/index.yml). Conditional Access can check if a device is Azure AD joined as part of the authentication process. Windows devices can also be managed with [Microsoft Intune](/intune/what-is-intune). In this case, Conditional Access, will consider whether a device is compliant (for example, up-to-date security patches and virus signatures) before allowing access to the apps.|
4141
| Windows servers| Active Directory provides strong management capabilities for on-premises Windows servers using Group Policy or other management solutions.| Windows servers virtual machines in Azure can be managed with [Azure AD Domain Services](../../active-directory-domain-services/index.yml). [Managed identities](../managed-identities-azure-resources/index.yml) can be used when VMs need access to the identity system directory or resources.|
4242
| Linux/Unix workloads|Active Directory doesn't natively support non-Windows without third-party solutions, although Linux machines can be configured to authenticate with Active Directory as a Kerberos realm.|Linux/Unix VMs can use [managed identities](../managed-identities-azure-resources/index.yml) to access the identity system or resources. Some organizations, migrate these workloads to cloud container technologies, which can also use managed identities.|
4343

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -560,7 +560,7 @@ In the Azure portal, the required permissions list is under API Permissions with
560560

561561
---
562562

563-
### Public Preview - Conditional access Authentication strengths
563+
### Public Preview - Conditional Access Authentication strengths
564564

565565

566566

@@ -572,7 +572,7 @@ We're announcing Public preview of Authentication strength, a Conditional Access
572572

573573
---
574574

575-
### Public Preview - Conditional access authentication strengths for external identities
575+
### Public Preview - Conditional Access authentication strengths for external identities
576576

577577

578578
**Type:** New feature

0 commit comments

Comments
 (0)