Skip to content

Commit 95d552f

Browse files
committed
2 parents 20b1e26 + 14bcc50 commit 95d552f

File tree

710 files changed

+7807
-4134
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

710 files changed

+7807
-4134
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,16 @@
3535
"redirect_url": "/azure/azure-monitor/change/change-analysis",
3636
"redirect_document_id": false
3737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/javascript.md",
40+
"redirect_url": "/azure/azure-monitor/app/javascript-sdk",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/azure-monitor/app/source-map-support.md",
45+
"redirect_url": "/azure/azure-monitor/app/javascript-sdk-advanced",
46+
"redirect_document_id": false
47+
},
3848
{
3949
"source_path_from_root": "/articles/azure-monitor/app/release-notes.md",
4050
"redirect_url": "/azure/azure-monitor/app/app-insights-overview",

articles/active-directory-b2c/custom-policies-series-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ In Azure Active Directory B2C (Azure AD B2C), you can create user experiences by
2222

2323
User flows are already customizable such as [changing UI](customize-ui.md), [customizing language](language-customization.md) and using [custom attributes](user-flow-custom-attributes.md). However, these customizations might not cover all your business specific needs, which is the reason why you need custom policies.
2424

25-
While you can use pre-made [custom policy starter pack](/azure/active-directory-b2c/tutorial-create-user-flows?pivots=b2c-custom-policy#custom-policy-starter-pack), it's important for you understand how custom policy is built from scratch. In this how-to guide series, you'll learn what you need to understand for you to customize the behavior of your user experience by using custom policies. At the end of this how-to guide series, you should be able to read and understand existing custom policies or write your own from scratch.
25+
While you can use pre-made [custom policy starter pack](./tutorial-create-user-flows.md?pivots=b2c-custom-policy#custom-policy-starter-pack), it's important for you understand how custom policy is built from scratch. In this how-to guide series, you'll learn what you need to understand for you to customize the behavior of your user experience by using custom policies. At the end of this how-to guide series, you should be able to read and understand existing custom policies or write your own from scratch.
2626

2727
## Prerequisites
2828

@@ -48,4 +48,4 @@ This how-to guide series consists of multiple articles. We recommend that you st
4848

4949
- Learn about [Azure AD B2C TrustFrameworkPolicy BuildingBlocks](buildingblocks.md)
5050

51-
- [Write your first Azure Active Directory B2C custom policy - Hello World!](custom-policies-series-hello-world.md)
51+
- [Write your first Azure Active Directory B2C custom policy - Hello World!](custom-policies-series-hello-world.md)

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/10/2023
11+
ms.date: 03/14/2023
1212
ms.author: justinha
1313
---
1414

@@ -177,10 +177,11 @@ Before you begin the migration process, complete the following initial checks an
177177
| Source | Source service tag | Source port ranges | Destination | Service | Destination port ranges | Protocol | Action | Required | Purpose |
178178
|:-----------:|:----------------------------------:|:------------------:|:-------------:|:-------:|:-----------------------:|:--------:|:------:|:--------:|:--------|
179179
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 5986 | TCP | Allow | Yes | Management of your domain |
180-
| Service tag | CorpNetSaw | * | Any | WinRM | 3389 | TCP | Allow | Optional | Debugging for support |
181-
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 636 | TCP | Allow | Optional | Secure LDAP |
180+
| Service tag | CorpNetSaw | * | Any | RDP | 3389 | TCP | Allow | Optional | Debugging for support |
181+
182+
Make a note of the target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
182183

183-
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
184+
Note that the **CorpNetSaw** service tag isn't available by using Azure portal, and the network security group rule for **CorpNetSaw** has to be added by using [PowerShell](powershell-create-instance.md#create-a-network-security-group).
184185

185186
1. Check the managed domain health in the Azure portal. If you have any alerts for the managed domain, resolve them before you start the migration process.
186187
1. Optionally, if you plan to move other resources to the Resource Manager deployment model and virtual network, confirm that those resources can be migrated. For more information, see [Platform-supported migration of IaaS resources from Classic to Resource Manager][migrate-iaas].

articles/active-directory-domain-services/network-considerations.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,9 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 01/29/2023
12+
ms.date: 03/14/2023
1313
ms.author: justinha
14+
ms.reviewer: xyuan
1415

1516
---
1617
# Virtual network design considerations and configuration options for Azure Active Directory Domain Services
@@ -110,10 +111,13 @@ The following sections cover network security groups and Inbound and Outbound po
110111

111112
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet for your managed domain.
112113

113-
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
114-
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
115-
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
116-
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
114+
| Source | Source service tag | Source port ranges | Destination | Service | Destination port ranges | Protocol | Action | Required | Purpose |
115+
|:-----------:|:----------------------------------:|:------------------:|:-------------:|:-------:|:-----------------------:|:--------:|:------:|:--------:|:--------|
116+
| Service tag | AzureActiveDirectoryDomainServices | * | Any | WinRM | 5986 | TCP | Allow | Yes | Management of your domain. |
117+
| Service tag | CorpNetSaw | * | Any | RDP | 3389 | TCP | Allow | Optional | Debugging for support |
118+
119+
120+
Note that the **CorpNetSaw** service tag isn't available by using Azure portal, and the network security group rule for **CorpNetSaw** has to be added by using [PowerShell](powershell-create-instance.md#create-a-network-security-group).
117121

118122
Azure AD DS also relies on the Default Security rules AllowVnetInBound and AllowAzureLoadBalancerInBound.
119123

articles/active-directory-domain-services/tutorial-configure-ldaps.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,9 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 01/29/2023
11+
ms.date: 03/14/2023
1212
ms.author: justinha
13+
ms.reviewer: xyuan
1314

1415
#Customer intent: As an identity administrator, I want to secure access to an Azure Active Directory Domain Services managed domain using secure lightweight directory access protocol (LDAPS)
1516
---
@@ -236,11 +237,13 @@ Let's create a rule to allow inbound secure LDAP access over TCP port 636 from a
236237

237238
| Setting | Value |
238239
|-----------------------------------|--------------|
239-
| Source | IP Addresses |
240-
| Source IP addresses / CIDR ranges | A valid IP address or range for your environment |
240+
| Source | Service tag |
241+
| Source service tag | AzureActiveDirectoryDomainServices |
242+
| Source IP addresses/CIDR ranges | A valid IP address or range for your environment |
241243
| Source port ranges | * |
242244
| Destination | Any |
243245
| Destination port ranges | 636 |
246+
| Service | WinRM |
244247
| Protocol | TCP |
245248
| Action | Allow |
246249
| Priority | 401 |

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,7 @@ The SuccessFactors connector supports expansion of the position object. To expan
379379
| positionNameDE | $.employmentNav.results[0].jobInfoNav.results[0].positionNav.externalName_de_DE |
380380

381381
### Provisioning users in the Onboarding module
382-
Inbound user provisioning from SAP SuccessFactors to on-premises Active Directory and Azure AD now supports advance provisioning of pre-hires present in the SAP SuccessFactors Onboarding 2.0 module. Upon encountering a new hire profile with future start date, the Azure AD provisioning service queries SAP SuccessFactors to get new hires with one of the following status codes: `active`, `inactive`, `active_external`. The status code `active_external` corresponds to pre-hires present in the SAP SuccessFactors Onboarding 2.0 module. For a description of these status codes, refer to [SAP support note 2736579](https://launchpad.support.sap.com/#/notes/0002736579).
382+
Inbound user provisioning from SAP SuccessFactors to on-premises Active Directory and Azure AD now supports advance provisioning of pre-hires present in the SAP SuccessFactors Onboarding 2.0 module. Upon encountering a new hire profile with future start date, the Azure AD provisioning service queries SAP SuccessFactors to get new hires with one of the following status codes: `active`, `inactive`, `active_external_suite`. The status code `active_external_suite` corresponds to pre-hires present in the SAP SuccessFactors Onboarding 2.0 module. For a description of these status codes, refer to [SAP support note 2736579](https://launchpad.support.sap.com/#/notes/0002736579).
383383

384384
The default behavior of the provisioning service is to process pre-hires in the Onboarding module.
385385

@@ -388,7 +388,12 @@ If you want to exclude processing of pre-hires in the Onboarding module, update
388388
1. Under show advanced options, edit the SuccessFactors attribute list to add a new attribute called `userStatus`.
389389
1. Set the JSONPath API expression for this attribute as: `$.employmentNav.results[0].userNav.status`
390390
1. Save the schema to return back to the attribute mapping blade.
391-
1. Edit the Source Object scope to apply a scoping filter `userStatus NOT EQUALS active_external`
391+
1. Edit the Source Object scope to apply a scoping filter `userStatus NOT EQUALS
392+
393+
394+
395+
396+
`
392397
1. Save the mapping and validate that the scoping filter works using provisioning on demand.
393398

394399
### Enabling OData API Audit logs in SuccessFactors

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/14/2023
11+
ms.date: 03/15/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -1202,7 +1202,7 @@ In the example of a request, to retrieve the current state of a user, the values
12021202

12031203
***Example 4. Query the value of a reference attribute to be updated***
12041204

1205-
If a reference attribute is to be updated, then Azure AD queries the service to determine whether the current value of the reference attribute in the identity store fronted by the service already matches the value of that attribute in Azure AD. For users, the only attribute of which the current value is queried in this way is the manager attribute. Here's an example of a request to determine whether the manager attribute of a user object currently has a certain value:
1205+
Azure AD checks the current attribute value in the identity store before updating it. However, only the manager attribute is the checked first for users. Here's an example of a request to determine whether the manager attribute of a user object currently has a certain value:
12061206
In the sample code, the request is translated into a call to the QueryAsync method of the services provider. The value of the properties of the object provided as the value of the parameters argument are as follows:
12071207

12081208
* parameters.AlternateFilters.Count: 2
@@ -1304,7 +1304,7 @@ Check with your application provider, or your application provider's documentati
13041304

13051305
### Getting started
13061306

1307-
Applications that support the SCIM profile described in this article can be connected to Azure AD using the "non-gallery application" feature in the Azure AD application gallery. Once connected, Azure AD runs a synchronization process every 40 minutes where it queries the application's SCIM endpoint for assigned users and groups, and creates or modifies them according to the assignment details.
1307+
Applications that support the SCIM profile described in this article can be connected to Azure AD using the "non-gallery application" feature in the Azure AD application gallery. Once connected, Azure AD runs a synchronization process. The process runs every 40 minutes. The process queries the application's SCIM endpoint for assigned users and groups, and creates or modifies them according to the assignment details.
13081308

13091309
**To connect an application that supports SCIM:**
13101310

@@ -1398,7 +1398,7 @@ The provisioning service supports the [authorization code grant](https://tools.i
13981398
> [!NOTE]
13991399
> OAuth v1 is not supported due to exposure of the client secret. OAuth v2 is supported.
14001400

1401-
It is recommended, but not required, that you support multiple secrets for easy renewal without downtime.
1401+
It's recommended, but not required, that you support multiple secrets for easy renewal without downtime.
14021402

14031403
#### How to set up OAuth code grant flow
14041404

articles/active-directory/authentication/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@
108108
href: howto-authentication-passwordless-faqs.md
109109
- name: Troubleshoot hybrid
110110
href: howto-authentication-passwordless-troubleshoot.md
111-
- name: Passwordless phone sign-in
111+
- name: Microsoft Authenticator
112112
items:
113113
- name: Manage
114114
href: howto-authentication-passwordless-phone.md
@@ -118,6 +118,8 @@
118118
href: how-to-mfa-number-match.md
119119
- name: Use additional context
120120
href: how-to-mfa-additional-context.md
121+
- name: Use Authenticator Lite
122+
href: how-to-mfa-authenticator-lite.md
121123
- name: Use Microsoft managed settings
122124
href: how-to-mfa-microsoft-managed.md
123125
- name: Windows Hello for Business

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/24/2023
9+
ms.date: 03/12/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -39,8 +39,6 @@ As MFA fatigue attacks rise, number matching becomes more critical to sign-in se
3939
>[!NOTE]
4040
>Number matching will begin to be enabled for all users of Microsoft Authenticator starting May 08, 2023.
4141
42-
<!---Add link to Mayur Blog post here--->
43-
4442
## Microsoft managed settings
4543

4644
In addition to configuring Authentication methods policy settings to be either **Enabled** or **Disabled**, IT admins can configure some settings in the Authentication methods policy to be **Microsoft managed**. A setting that is configured as **Microsoft managed** allows Azure AD to enable or disable the setting.
@@ -59,6 +57,7 @@ The following table lists each setting that can be set to Microsoft managed and
5957
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6058
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6159
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Disabled |
60+
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Disabled |
6261

6362
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/).
6463

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/17/2022
9+
ms.date: 03/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -38,7 +38,8 @@ The following table outlines the security considerations for the available authe
3838
| Authentication method | Security | Usability | Availability |
3939
|--------------------------------|:--------:|:---------:|:------------:|
4040
| Windows Hello for Business | High | High | High |
41-
| Microsoft Authenticator app | High | High | High |
41+
| Microsoft Authenticator | High | High | High |
42+
| Authenticator Lite | High | High | High |
4243
| FIDO2 security key | High | High | High |
4344
| Certificate-based authentication (preview)| High | High | High |
4445
| OATH hardware tokens (preview) | Medium | Medium | High |
@@ -63,10 +64,11 @@ The following table outlines when an authentication method can be used during a
6364

6465
| Method | Primary authentication | Secondary authentication |
6566
|--------------------------------|:----------------------:|:-------------------------:|
66-
| Windows Hello for Business | Yes | MFA\* |
67-
| Microsoft Authenticator app | Yes | MFA and SSPR |
67+
| Windows Hello for Business | Yes | MFA\* |
68+
| Microsoft Authenticator | Yes | MFA and SSPR |
69+
| Authenticator Lite | No | MFA |
6870
| FIDO2 security key | Yes | MFA |
69-
| Certificate-based authentication (preview) | Yes | No |
71+
| Certificate-based authentication | Yes | No |
7072
| OATH hardware tokens (preview) | No | MFA and SSPR |
7173
| OATH software tokens | No | MFA and SSPR |
7274
| SMS | Yes | MFA and SSPR |

0 commit comments

Comments
 (0)