Skip to content

Commit 96deccc

Browse files
authored
Merge pull request #178725 from MicrosoftDocs/master
11/04 AM Publish
2 parents e41827d + d7737c8 commit 96deccc

File tree

133 files changed

+1793
-860
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+1793
-860
lines changed

.openpublishing.redirection.azure-web-pubsub.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,16 @@
44
"source_path_from_root": "/articles/azure-web-pubsub/howto-troubleshoot-diagnostic-logs.md",
55
"redirect_url": "/azure/azure-web-pubsub/howto-troubleshoot-resource-logs",
66
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/azure-web-pubsub/reference-server-sdk-csharp.md",
10+
"redirect_url": "/dotnet/api/overview/azure/webpubsub/client",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/azure-web-pubsub/reference-server-sdk-java.md",
15+
"redirect_url": "/java/api/overview/azure/webpubsub/client",
16+
"redirect_document_id": false
717
}
818
]
919
}

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 3 additions & 2 deletions
Large diffs are not rendered by default.

articles/active-directory/external-identities/whats-new-docs.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory external identities"
33
description: "New and updated documentation for the Azure Active Directory external identities."
4-
ms.date: 10/05/2021
4+
ms.date: 11/04/2021
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: reference
@@ -15,6 +15,15 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory external identities documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the external identities service, see [What's new in Azure Active Directory](../fundamentals/whats-new.md).
1717

18+
## October 2021
19+
20+
### Updated articles
21+
22+
- [Email one-time passcode authentication](one-time-passcode.md)
23+
- [Azure Active Directory B2B collaboration FAQs](faq.yml)
24+
- [Reset redemption status for a guest user (Preview)](reset-redemption-status.md)
25+
- [Add Google as an identity provider for B2B guest users](google-federation.md)
26+
1827
## September 2021
1928

2029
### Updated articles

articles/active-directory/fundamentals/customize-branding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Your custom branding won't immediately appear when your users go to sites such a
3030
> [!NOTE]
3131
> **All branding elements are optional and will remain default when unchanged.** For example, if you specify a banner logo with no background image, the sign-in page will show your logo with a default background image from the destination site such as Microsoft 365.<br><br>Additionally, sign-in page branding doesn't carry over to personal Microsoft accounts. If your users or business guests sign in using a personal Microsoft account, the sign-in page won't reflect the branding of your organization.
3232
33-
### To customize your branding
33+
### To configure your branding for the first time
3434
1. Sign in to the [Azure portal](https://portal.azure.com/) using a Global administrator account for the directory.
3535

3636
2. Select **Azure Active Directory**, and then select **Company branding**, and then select **Configure**.
@@ -98,7 +98,7 @@ Your custom branding won't immediately appear when your users go to sites such a
9898

9999
3. After you've finished adding your branding, select **Save**.
100100

101-
If this process creates your first custom branding configuration, it becomes the default for your tenant. If you have additional configurations, you'll be able to choose your default configuration.
101+
This process creates your first custom branding configuration, and it becomes the default for your tenant. The default custom branding configuration serves as a fallback option for all language-specific branding configurations. The configuration can't be removed after you create it.
102102

103103
>[!IMPORTANT]
104104
>To add more corporate branding configurations to your tenant, you must choose **New language** on the **Contoso - Company branding** page. This opens the **Configure company branding** page, where you can follow the same steps as above.

articles/active-directory/manage-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,8 @@
136136
items:
137137
- name: Secure hybrid access with Azure AD
138138
href: secure-hybrid-access.md
139+
- name: Secure hybrid access partner integrations
140+
href: secure-hybrid-access-integrations.md
139141
- name: Datawiza
140142
href: datawiza-with-azure-ad.md
141143
- name: F5

articles/active-directory/reports-monitoring/concept-sign-ins.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: conceptual
1414
ms.tgt_pltfrm: na
1515
ms.workload: identity
1616
ms.subservice: report-monitor
17-
ms.date: 07/16/2021
17+
ms.date: 10/25/2021
1818
ms.author: markvi
1919
ms.reviewer: besiler
2020

@@ -279,13 +279,15 @@ On the **Users** page, you get a complete overview of all user sign-ins by click
279279
The **Authentication Details** tab located within the sign-ins report provides the following information, for each authentication attempt:
280280

281281
- A list of authentication policies applied (such as Conditional Access, per-user MFA, Security Defaults)
282+
- A list of session lifetime policies applied (such as Sign-in frequency, Remember MFA, Configurable Token lifetime)
282283
- The sequence of authentication methods used to sign-in
283284
- Whether or not the authentication attempt was successful
284285
- Detail about why the authentication attempt succeeded or failed
285286

286287
This information allows admins to troubleshoot each step in a user’s sign-in, and track:
287288

288289
- Volume of sign-ins protected by multi-factor authentication
290+
- Reason for authentication prompt based on the session lifetime policies
289291
- Usage and success rates for each authentication method
290292
- Usage of passwordless authentication methods (such as Passwordless Phone Sign-in, FIDO2, and Windows Hello for Business)
291293
- How frequently authentication requirements are satisfied by token claims (where users are not interactively prompted to enter a password, enter an SMS OTP, and so on)
@@ -329,7 +331,7 @@ The **Sign-ins** option gives you a complete overview of all sign-in events to y
329331

330332
## Microsoft 365 activity logs
331333

332-
You can view Microsoft 365 activity logs from the [Microsoft 365 admin center](/office365/admin/admin-overview/about-the-admin-center). Consider the point that, Microsoft 365 activity and Azure AD activity logs share a significant number of the directory resources. Only the Microsoft 365 admin center provides a full view of the Microsoft 365 activity logs.
334+
You can view Microsoft 365 activity logs from the [Microsoft 365 admin center](/office365/admin/admin-overview/about-the-admin-center). Consider the point that, Microsoft 365 activity and Azure AD activity logs share a significant number of the directory resources. Only the Microsoft 365 admin center provides a full view of the Microsoft 365 activity logs.
333335

334336
You can also access the Microsoft 365 activity logs programmatically by using the [Office 365 Management APIs](/office/office-365-management-api/office-365-management-apis-overview).
335337

51.3 KB
Loading

articles/active-directory/verifiable-credentials/how-to-dnsbind.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Linking a DID to a domain solves the initial trust problem by allowing any entit
4141

4242
## How do we link DIDs and domains?
4343

44-
We make a link between a domain and a DID by implementing an open standard written by the Decentralized Identity Foundation called [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/). The verifiable credentials service in Azure Active Directory (Azure AD) helps your organization make the link between the DID and domain by included the domain information that you provided in your DID, and generating the well-known config file:
44+
We make a link between a domain and a DID by implementing an open standard written by the Decentralized Identity Foundation called [Well-Known DID configuration](https://identity.foundation/.well-known/resources/did-configuration/). The verifiable credentials service in Azure Active Directory (Azure AD) helps your organization make the link between the DID and domain by including the domain information that you provided in your DID, and generating the well-known config file:
4545

4646
1. Azure AD uses the domain information you provide during organization setup to write a Service Endpoint within the DID Document. All parties who interact with your DID can see the domain your DID proclaims to be associated with.
4747

articles/aks/certificate-rotation.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Rotate certificates in Azure Kubernetes Service (AKS)
33
description: Learn how to rotate your certificates in an Azure Kubernetes Service (AKS) cluster.
44
services: container-service
55
ms.topic: article
6-
ms.date: 7/13/2021
6+
ms.date: 11/03/2021
77
---
88

99
# Rotate certificates in Azure Kubernetes Service (AKS)
@@ -50,6 +50,28 @@ az vm run-command invoke -g MC_rg_myAKSCluster_region -n vm-name --command-id Ru
5050
az vmss run-command invoke -g MC_rg_myAKSCluster_region -n vmss-name --instance-id 0 --command-id RunShellScript --query 'value[0].message' -otsv --scripts "openssl x509 -in /etc/kubernetes/certs/apiserver.crt -noout -enddate"
5151
```
5252

53+
## Certificate Auto Rotation
54+
55+
Azure Kubernetes Service will automatically rotate non-ca certificates on both the control plane and agent nodes before they expire with no downtime for the cluster.
56+
57+
For AKS to automatically rotate non-CA certificates, the cluster must have [TLS Bootstrapping](https://kubernetes.io/docs/reference/command-line-tools-reference/kubelet-tls-bootstrapping/). TLS Bootstrapping is currently available in the following regions:
58+
59+
* eastus2euap
60+
* centraluseuap
61+
* westcentralus
62+
* uksouth
63+
* eastus
64+
* australiacentral
65+
* australiaest
66+
67+
> [!IMPORTANT]
68+
>Once a region is configured either create a new cluster or upgrade 'az aks upgrade -g $RESOURCE_GROUP_NAME -n $CLUSTER_NAME' an existing cluster to set that cluster for auto-cert rotation.
69+
70+
### Limititation
71+
72+
Auto cert rotation won't be enabled on non-rbac cluster.
73+
74+
5375
## Rotate your cluster certificates
5476

5577
> [!WARNING]

articles/aks/coredns-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ kubectl delete pod --namespace kube-system -l k8s-app=kube-dns
7676
```
7777

7878
> [!Note]
79-
> The command above is correct. While we're changing `coredns`, the deployment is under the **kube-dns** name.
79+
> The command above is correct. While we're changing `coredns`, the deployment is under the **kube-dns** label.
8080
8181
## Custom forward server
8282

0 commit comments

Comments
 (0)