Skip to content

Commit 9559b8b

Browse files
authored
Merge pull request #236017 from MicrosoftDocs/main
4/26 PM Publish
2 parents 7f51655 + 30ae3ca commit 9559b8b

File tree

98 files changed

+1876
-1261
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+1876
-1261
lines changed

.openpublishing.redirection.azure-productivity.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,11 @@
149149
"source_path": "articles/lab-services/classroom-labs-faq.yml",
150150
"redirect_url": "/azure/lab-services/lab-services-overview",
151151
"redirect_document_id": false
152-
}
152+
},
153+
{
154+
"source_path": "articles/lab-services/how-to-enable-nested-virtualization-template-vm-ui.md",
155+
"redirect_url": "/azure/lab-services/how-to-enable-nested-virtualization-template-vm-using-script",
156+
"redirect_document_id": false
157+
}
153158
]
154159
}

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/15/2023
9+
ms.date: 04/25/2023
1010

1111
ms.author: justinha
1212
author: sabina-smith
@@ -30,6 +30,10 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
3030
## Prerequisites
3131

3232
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for some users or groups by using the Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
33+
34+
>[!TIP]
35+
>We recommend that you also enable [system-preferred multifactor authentication (MFA)](concept-system-preferred-multifactor-authentication.md) when you enable Authenticator Lite. With system-preferred MFA enabled, users try to sign-in with Authenticator Lite before they try less secure telephony methods like SMS or voice call.
36+
3337
- If your organization is using the Active Directory Federation Services (AD FS) adapter or Network Policy Server (NPS) extensions, upgrade to the latest versions for a consistent experience.
3438
- Users enabled for shared device mode on Outlook mobile aren't eligible for Authenticator Lite.
3539
- Users must run a minimum Outlook mobile version.
@@ -125,7 +129,7 @@ If enabled for Authenticator Lite, users are prompted to register their account
125129
:::image type="content" border="true" source="./media/how-to-mfa-authenticator-lite/registration.png" alt-text="Screenshot of how to register Authenticator Lite.":::
126130

127131
>[!NOTE]
128-
>Users with no MFA methods registered will be prompted to download the Authenticator App when they begin registration flow. For the most seamless Authenticator Lite registration experience, [provision your users a TAP](https://learn.microsoft.com/azure/active-directory/authentication/howto-authentication-temporary-access-pass) (temporary access pass) which they can use during registration.
132+
>If they don't have any MFA methods registered, users are prompted to download Authenticator when they begin the registration flow. For the most seamless experience, provision users with a [Temporary Access Pass (TAP)](howto-authentication-temporary-access-pass.md) that they can use during Authenticator Lite registration.
129133
130134

131135
## Monitoring Authenticator Lite usage

articles/active-directory/authentication/howto-sspr-authenticationdata.md

Lines changed: 25 additions & 63 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 04/26/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -82,45 +82,46 @@ The following fields can be set through PowerShell:
8282
> [!IMPORTANT]
8383
> Azure AD PowerShell is planned for deprecation. You can start using [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) to interact with Azure AD as you would in Azure AD PowerShell, or use the [Microsoft Graph REST API for managing authentication methods](/graph/api/resources/authenticationmethods-overview).
8484
85-
### Use Azure AD PowerShell version 1
85+
### Use Microsoft Graph PowerShell
8686

87-
To get started, [download and install the Azure AD PowerShell module](/previous-versions/azure/jj151815(v=azure.100)#bkmk_installmodule). After it's installed, use the following steps to configure each field.
87+
To get started, [download and install the Microsoft Graph PowerShell module](/powershell/microsoftgraph/overview).
8888

89-
#### Set the authentication data with Azure AD PowerShell version 1
89+
To quickly install from recent versions of PowerShell that support `Install-Module`, run the following commands. The first line checks to see if the module is already installed:
9090

9191
```PowerShell
92-
Connect-MsolService
93-
94-
Set-MsolUser -UserPrincipalName [email protected] -AlternateEmailAddresses @("[email protected]")
95-
Set-MsolUser -UserPrincipalName [email protected] -MobilePhone "+1 4251234567"
96-
Set-MsolUser -UserPrincipalName [email protected] -PhoneNumber "+1 4252345678"
97-
98-
Set-MsolUser -UserPrincipalName [email protected] -AlternateEmailAddresses @("[email protected]") -MobilePhone "+1 4251234567" -PhoneNumber "+1 4252345678"
92+
Get-Module Microsoft.Graph
93+
Install-Module Microsoft.Graph
94+
Select-MgProfile -Name "beta"
95+
Connect-MgGraph -Scopes "User.ReadWrite.All"
9996
```
10097

101-
#### Read the authentication data with Azure AD PowerShell version 1
98+
After the module is installed, use the following steps to configure each field.
99+
100+
#### Set the authentication data with Microsoft Graph PowerShell
102101

103102
```PowerShell
104-
Connect-MsolService
103+
Connect-MgGraph -Scopes "User.ReadWrite.All"
105104
106-
Get-MsolUser -UserPrincipalName [email protected] | select AlternateEmailAddresses
107-
Get-MsolUser -UserPrincipalName [email protected] | select MobilePhone
108-
Get-MsolUser -UserPrincipalName [email protected] | select PhoneNumber
105+
Update-MgUser -UserId '[email protected]' -otherMails @("[email protected]")
106+
Update-MgUser -UserId '[email protected]' -mobilePhone "+1 4251234567"
107+
Update-MgUser -UserId '[email protected]' -businessPhones "+1 4252345678"
109108
110-
Get-MsolUser | select DisplayName,UserPrincipalName,AlternateEmailAddresses,MobilePhone,PhoneNumber | Format-Table
109+
Update-MgUser -UserId '[email protected]' -otherMails @("[email protected]") -mobilePhone "+1 4251234567" -businessPhones "+1 4252345678"
111110
```
112111

113-
#### Read the Authentication Phone and Authentication Email options
114-
115-
To read the **Authentication Phone** and **Authentication Email** when you use PowerShell version 1, use the following commands:
112+
#### Read the authentication data with Microsoft Graph PowerShell
116113

117114
```PowerShell
118-
Connect-MsolService
119-
Get-MsolUser -UserPrincipalName [email protected] | select -Expand StrongAuthenticationUserDetails | select PhoneNumber
120-
Get-MsolUser -UserPrincipalName [email protected] | select -Expand StrongAuthenticationUserDetails | select Email
115+
Connect-MgGraph -Scopes "User.Read.All"
116+
117+
Get-MgUser -UserId '[email protected]' | select otherMails
118+
Get-MgUser -UserId '[email protected]' | select mobilePhone
119+
Get-MgUser -UserId '[email protected]' | select businessPhones
120+
121+
Get-MgUser -UserId '[email protected]' | Select businessPhones, mobilePhone, otherMails | Format-Table
121122
```
122123

123-
### Use Azure AD PowerShell version 2
124+
### Use Azure AD PowerShell
124125

125126
To get started, [download and install the Azure AD version 2 PowerShell module](/powershell/module/azuread/).
126127

@@ -158,45 +159,6 @@ Get-AzureADUser -ObjectID [email protected] | select TelephoneNumber
158159
Get-AzureADUser | select DisplayName,UserPrincipalName,otherMails,Mobile,TelephoneNumber | Format-Table
159160
```
160161

161-
### Use Microsoft Graph PowerShell
162-
163-
To get started, [download and install the Microsoft Graph PowerShell module](/powershell/microsoftgraph/overview).
164-
165-
To quickly install from recent versions of PowerShell that support `Install-Module`, run the following commands. The first line checks to see if the module is already installed:
166-
167-
```PowerShell
168-
Get-Module Microsoft.Graph
169-
Install-Module Microsoft.Graph
170-
Select-MgProfile -Name "beta"
171-
Connect-MgGraph -Scopes "User.ReadWrite.All"
172-
```
173-
174-
After the module is installed, use the following steps to configure each field.
175-
176-
#### Set the authentication data with Microsoft Graph PowerShell
177-
178-
```PowerShell
179-
Connect-MgGraph -Scopes "User.ReadWrite.All"
180-
181-
Update-MgUser -UserId '[email protected]' -otherMails @("[email protected]")
182-
Update-MgUser -UserId '[email protected]' -mobilePhone "+1 4251234567"
183-
Update-MgUser -UserId '[email protected]' -businessPhones "+1 4252345678"
184-
185-
Update-MgUser -UserId '[email protected]' -otherMails @("[email protected]") -mobilePhone "+1 4251234567" -businessPhones "+1 4252345678"
186-
```
187-
188-
#### Read the authentication data with Microsoft Graph PowerShell
189-
190-
```PowerShell
191-
Connect-MgGraph -Scopes "User.Read.All"
192-
193-
Get-MgUser -UserId '[email protected]' | select otherMails
194-
Get-MgUser -UserId '[email protected]' | select mobilePhone
195-
Get-MgUser -UserId '[email protected]' | select businessPhones
196-
197-
Get-MgUser -UserId '[email protected]' | Select businessPhones, mobilePhone, otherMails | Format-Table
198-
```
199-
200162
## Next steps
201163

202164
Once authentication contact information is pre-populated for users, complete the following tutorial to enable self-service password reset:

articles/active-directory/fundamentals/multi-tenant-user-management-introduction.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,9 @@ Most documentation for B2B refers to an external user as a guest user. It confla
5555

5656
[Cross-tenant synchronization](../multi-tenant-organizations/cross-tenant-synchronization-overview.md) enables multi-tenant organizations to provide seamless access and collaboration experiences to end users, leveraging existing B2B external collaboration capabilities. The feature doesn't allow cross-tenant synchronization across Microsoft sovereign clouds (such as Microsoft 365 US Government GCC High, DOD or Office 365 in China). See [Common considerations for multi-tenant user management](multi-tenant-common-considerations.md#cross-tenant-synchronization) for help with automated and custom cross-tenant synchronization scenarios.
5757

58-
Watch John Savill talk about the cross-tenant sync capability in Azure AD (embedded below).
58+
Watch Arvind Harinder talk about the cross-tenant sync capability in Azure AD (embedded below).
5959

60-
> [!VIDEO https://www.youtube.com/embed/z0J5kteqUVQ]
60+
> [!VIDEO https://www.youtube.com/embed/7B-PQwNfGBc]
6161
6262
The following conceptual and how-to articles provide information about Azure AD B2B collaboration and cross-tenant synchronization.
6363

@@ -119,7 +119,7 @@ Organizations initially focus on requirements that they want in place for immedi
119119
- **Single Sign On:** Enable users to access resources across the organization without the need to enter more credentials.
120120
### Patterns for account creation
121121

122-
Microsoft mechanisms for creating and managing the lifecycle of your external user accounts follow three common patterns. You can use these patterns to help define and implement your requirements. Choose the pattern that best aligns with your scenario and then focus on the pattern details.
122+
Microsoft mechanisms for creating and managing the lifecycle of your external user accounts follow three common patterns. You can use these patterns to help define and implement your requirements. Choose the pattern that best aligns with your scenario and then focus on the pattern details.
123123

124124
| Mechanism | Description | Best when |
125125
| - | - | - |

articles/active-directory/reports-monitoring/howto-manage-inactive-user-accounts.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,16 @@ This article explains a method to handle obsolete user accounts in Azure Active
2222

2323
## What are inactive user accounts?
2424

25-
Inactive accounts are user accounts that aren't required anymore by members of your organization to gain access to your resources. One key identifier for inactive accounts is that they haven't been used *for a while* to sign in to your environment. Because inactive accounts are tied to the sign-in activity, you can use the timestamp of the last sign-in that was successful to detect them.
25+
Inactive accounts are user accounts that aren't required anymore by members of your organization to gain access to your resources. One key identifier for inactive accounts is that they haven't been used *for a while* to sign in to your environment. Because inactive accounts are tied to the sign-in activity, you can use the timestamp of the last time an account attempted to sign in to detect inactive accounts.
2626

2727
The challenge of this method is to define what *for a while* means for your environment. For example, users might not sign in to an environment *for a while*, because they are on vacation. When defining what your delta for inactive user accounts is, you need to factor in all legitimate reasons for not signing in to your environment. In many organizations, the delta for inactive user accounts is between 90 and 180 days.
2828

29-
The last successful sign-in provides potential insights into a user's continued need for access to resources. It can help with determining if group membership or app access is still needed or could be removed. For external user management, you can understand if an external user is still active within the tenant or should be cleaned up.
29+
The last sign-in provides potential insights into a user's continued need for access to resources. It can help with determining if group membership or app access is still needed or could be removed. For external user management, you can understand if an external user is still active within the tenant or should be cleaned up.
3030

3131
## Detect inactive user accounts with Microsoft Graph
3232
<a name="how-to-detect-inactive-user-accounts"></a>
3333

34-
You can detect inactive accounts by evaluating the `lastSignInDateTime` property exposed by the `signInActivity` resource type of the **Microsoft Graph API**. The `lastSignInDateTime` property shows the last time a user made a successful interactive sign-in to Azure AD. Using this property, you can implement a solution for the following scenarios:
34+
You can detect inactive accounts by evaluating the `lastSignInDateTime` property exposed by the `signInActivity` resource type of the **Microsoft Graph API**. The `lastSignInDateTime` property shows the last time a user attempted to make an interactive sign-in attempt in Azure AD. Using this property, you can implement a solution for the following scenarios:
3535

3636
- **Last sign-in date and time for all users**: In this scenario, you need to generate a report of the last sign-in date of all users. You request a list of all users, and the last `lastSignInDateTime` for each respective user:
3737
- `https://graph.microsoft.com/v1.0/users?$select=displayName,signInActivity`
@@ -59,11 +59,11 @@ The following details relate to the `lastSignInDateTime` property.
5959
- AuditLog.Read.All
6060
- User.Read.All
6161

62-
- Each interactive sign-in that was successful results in an update of the underlying data store. Typically, successful sign-ins show up in the related sign-in report within 10 minutes.
62+
- Each interactive sign-in attempt results in an update of the underlying data store. Typically, sign-ins show up in the related sign-in report within 6 hours.
6363

64-
- To generate a `lastSignInDateTime` timestamp, you need a successful sign-in. The value of the `lastSignInDateTime` property may be blank if:
65-
- The last successful sign-in of a user took place before April 2020.
66-
- The affected user account was never used for a successful sign-in.
64+
- To generate a `lastSignInDateTime` timestamp, you an attempted sign-in. The value of the `lastSignInDateTime` property may be blank if:
65+
- The last attempted sign-in of a user took place before April 2020.
66+
- The affected user account was never used for a sign-in attempt.
6767

6868
- The last sign-in date is associated with the user object. The value is retained until the next sign-in of the user.
6969

articles/aks/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -490,6 +490,8 @@
490490
href: azure-files-csi.md
491491
- name: Provision Azure Files storage
492492
href: azure-csi-files-storage-provision.md
493+
- name: Azure Files and Azure NetApp Files comparison
494+
href: ../storage/files/storage-files-netapp-comparison.md?toc=/azure/aks/toc.json&bc=/azure/aks/breadcrumb/toc.json
493495
- name: Provision Azure NetApp Files storage
494496
href: azure-netapp-files.md
495497
- name: Block storage
@@ -498,6 +500,8 @@
498500
href: azure-disk-csi.md
499501
- name: Provision Azure Disks storage
500502
href: azure-csi-disk-storage-provision.md
503+
- name: Use Azure Premium SSD v2 disks
504+
href: use-premium-v2-disks.md
501505
- name: Use Azure ultra disks
502506
href: use-ultra-disks.md
503507
- name: Other storage options

articles/aks/azure-csi-files-storage-provision.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 01/18/2023
99

1010
# Create and use a volume with Azure Files in Azure Kubernetes Service (AKS)
1111

12-
A persistent volume represents a piece of storage that has been provisioned for use with Kubernetes pods. A persistent volume can be used by one or many pods, and can be dynamically or statically provisioned. If multiple pods need concurrent access to the same storage volume, you can use Azure Files to connect using the [Server Message Block (SMB) protocol][smb-overview]. This article shows you how to dynamically create an Azure Files share for use by multiple pods in an Azure Kubernetes Service (AKS) cluster.
12+
A persistent volume represents a piece of storage that has been provisioned for use with Kubernetes pods. A persistent volume can be used by one or many pods, and can be dynamically or statically provisioned. If multiple pods need concurrent access to the same storage volume, you can use Azure Files to connect using the [Server Message Block (SMB) protocol][smb-overview]. This article shows you how to dynamically create an Azure file share for use by multiple pods in an Azure Kubernetes Service (AKS) cluster.
1313

1414
This article shows you how to:
1515

@@ -474,7 +474,7 @@ kubectl apply -f azurefiles-mount-options-pvc.yaml
474474

475475
## Next steps
476476

477-
For Azure File CSI driver parameters, see [CSI driver parameters][CSI driver parameters].
477+
For Azure Files CSI driver parameters, see [CSI driver parameters][CSI driver parameters].
478478

479479
For associated best practices, see [Best practices for storage and backups in AKS][operator-best-practices-storage].
480480

0 commit comments

Comments
 (0)