Skip to content

Commit 99a1732

Browse files
authored
Merge pull request #194900 from MicrosoftDocs/main
4/12 PM Publish
2 parents 6002d7c + c12e569 commit 99a1732

File tree

208 files changed

+1227
-763
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

208 files changed

+1227
-763
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Here are the least privileged roles required for this deployment:
6262

6363
| Azure AD Role| Description |
6464
| - | -|
65-
| Global Administrator| To implement combined registration experience. |
65+
| User Administrator or Global Administrator| To implement combined registration experience. |
6666
| Authentication Administrator| To implement and manage authentication methods. |
6767
| User| To configure Authenticator app on device, or to enroll security key device for web or Windows 10 sign-in. |
6868

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@ You must also meet the following system requirements:
4848
- [Windows Server 2016](https://support.microsoft.com/help/4534307/windows-10-update-kb4534307)
4949
- [Windows Server 2019](https://support.microsoft.com/help/4534321/windows-10-update-kb4534321)
5050

51+
- AES256_HMAC_SHA1 must be enabled when **Network security: Configure encryption types allowed for Kerberos** policy is [configured](https://docs.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos) on domain controllers.
52+
5153
- Have the credentials required to complete the steps in the scenario:
5254
- An Active Directory user who is a member of the Domain Admins group for a domain and a member of the Enterprise Admins group for a forest. Referred to as **$domainCred**.
5355
- An Azure Active Directory user who is a member of the Global Administrators role. Referred to as **$cloudCred**.
@@ -270,7 +272,7 @@ For information about compliant security keys, see [FIDO2 security keys](concept
270272

271273
### What can I do if I lose my security key?
272274

273-
To retrieve a security key, sign in to the Azure portal, and then go to the **Security info** page.
275+
To delete an enrolled security key, sign in to the Azure portal, and then go to the **Security info** page.
274276

275277
### What can I do if I'm unable to use the FIDO security key immediately after I create a hybrid Azure AD-joined machine?
276278

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -73,8 +73,8 @@ Organizations may choose to use one or more of the following methods to enable t
7373
To enable the use of security keys using Intune, complete the following steps:
7474

7575
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
76-
1. Browse to **Microsoft Intune** > **Device enrollment** > **Windows enrollment** > **Windows Hello for Business** > **Properties**.
77-
1. Under **Settings**, set **Use security keys for sign-in** to **Enabled**.
76+
1. Browse to **Devices** > **Enroll Devices** > **Windows enrollment** > **Windows Hello for Business**.
77+
1. Set **Use security keys for sign-in** to **Enabled**.
7878

7979
Configuration of security keys for sign-in isn't dependent on configuring Windows Hello for Business.
8080

@@ -83,18 +83,19 @@ Configuration of security keys for sign-in isn't dependent on configuring Window
8383
To target specific device groups to enable the credential provider, use the following custom settings via Intune:
8484

8585
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
86-
1. Browse to **Device** > **Windows** > **Configuration Profiles** > **Create profile**.
86+
1. Browse to **Devices** > **Windows** > **Configuration Profiles** > **Create profile**.
8787
1. Configure the new profile with the following settings:
88-
- Name: Security Keys for Windows Sign-In
89-
- Description: Enables FIDO Security Keys to be used during Windows Sign In
9088
- Platform: Windows 10 and later
9189
- Profile type: Template > Custom
92-
- Custom OMA-URI Settings:
90+
- Name: Security Keys for Windows Sign-In
91+
- Description: Enables FIDO Security Keys to be used during Windows Sign In
92+
1. Click **Add* and in **Add Row**, add the following Custom OMA-URI Settings:
9393
- Name: Turn on FIDO Security Keys for Windows Sign-In
94+
- Description: (Optional)
9495
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
9596
- Data Type: Integer
9697
- Value: 1
97-
1. This policy can be assigned to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign).
98+
1. The remainder of the policy settings include assigning to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign).
9899

99100
![Intune custom device configuration policy creation](./media/howto-authentication-passwordless-security-key/intune-custom-profile.png)
100101

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -171,9 +171,6 @@ Keep these limitations in mind:
171171
- Users in scope for Self Service Password Reset (SSPR) registration policy *or* [Identity Protection Multi-factor authentication registration policy](../identity-protection/howto-identity-protection-configure-mfa-policy.md) will be required to register authentication methods after they have signed in with a Temporary Access Pass.
172172
Users in scope for these policies will get redirected to the [Interrupt mode of the combined registration](concept-registration-mfa-sspr-combined.md#combined-registration-modes). This experience does not currently support FIDO2 and Phone Sign-in registration.
173173
- A Temporary Access Pass cannot be used with the Network Policy Server (NPS) extension and Active Directory Federation Services (AD FS) adapter, or during Windows Setup/Out-of-Box-Experience (OOBE), Autopilot, or to deploy Windows Hello for Business.
174-
- When Seamless SSO is enabled on the tenant, the users are prompted to enter a password. The **Use your Temporary Access Pass instead** link will be available for the user to sign-in with a Temporary Access Pass.
175-
176-
![Screenshot of Use a Temporary Access Pass instead](./media/how-to-authentication-temporary-access-pass/alternative.png)
177174

178175
## Troubleshooting
179176

articles/active-directory/authentication/howto-mfa-app-passwords.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,10 +81,11 @@ In this scenario, you use the following credentials:
8181
By default, users can't create app passwords. The app passwords feature must be enabled before users can use them. To give users the ability to create app passwords, **admin needs** to complete the following steps:
8282

8383
1. Sign in to the [Azure portal](https://portal.azure.com).
84-
2. Search for and select **Azure Active Directory**, then choose **Users**.
85-
3. Select **Multi-Factor Authentication** from the navigation bar across the top of the *Users* window.
86-
4. Under Multi-Factor Authentication, select **service settings**.
87-
5. On the **Service Settings** page, select the **Allow users to create app passwords to sign in to non-browser apps** option.
84+
2. Search for and select **Azure Active Directory**, then choose **Security**.
85+
3. Select **Conditional Access** from the left navigation blade.
86+
4. Selet **Named location** from the left navigation blade.
87+
5. Click on **"Configure MFA trusted IPs"** in the bar across the top of the *Conditional Access | Named Locations* window.
88+
6. On the **multi-factor authentication** page, select the **Allow users to create app passwords to sign in to non-browser apps** option.
8889

8990
![Screenshot of the Azure portal that shows the service settings for multi-factor authentication to allow the user of app passwords](media/concept-authentication-methods/app-password-authentication-method.png)
9091

@@ -104,4 +105,4 @@ Users can also create app passwords after registration. For more information and
104105

105106
## Next steps
106107

107-
For more information on how to allow users to quickly register for Azure AD Multi-Factor Authentication, see [Combined security information registration overview](concept-registration-mfa-sspr-combined.md).
108+
For more information on how to allow users to quickly register for Azure AD Multi-Factor Authentication, see [Combined security information registration overview](concept-registration-mfa-sspr-combined.md).

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Deploying the configuration change to enable SSPR from the login screen using In
8787
1. Under *Configuration settings*, select **Add** and provide the following OMA-URI setting to enable the reset password link:
8888
- Provide a meaningful name to explain what the setting is doing, such as *Add SSPR link*.
8989
- Optionally provide a meaningful description of the setting.
90-
- **OMA-URI** set to `./Vendor/MSFT/Policy/Config/Authentication/AllowAadPasswordReset`
90+
- **OMA-URI** set to `./Device/Vendor/MSFT/Policy/Config/Authentication/AllowAadPasswordReset`
9191
- **Data type** set to **Integer**
9292
- **Value** set to **1**
9393

articles/active-directory/devices/manage-stale-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ In your cleanup policy, select accounts that have the required roles assigned.
7575

7676
### Timeframe
7777

78-
Define a timeframe that is your indicator for a stale device. When defining your timeframe, factor the window noted for updating the activity timestamp into your value. For example, you shouldn't consider a timestamp that is younger than 21 days (includes variance) as an indicator for a stale device. There are scenarios that can make a device look like stale while it isn't. For example, the owner of the affected device can be on vacation or on a sick leave. that exceeds your timeframe for stale devices.
78+
Define a timeframe that is your indicator for a stale device. When defining your timeframe, factor the window noted for updating the activity timestamp into your value. For example, you shouldn't consider a timestamp that is younger than 21 days (includes variance) as an indicator for a stale device. There are scenarios that can make a device look like stale while it isn't. For example, the owner of the affected device can be on vacation or on a sick leave that exceeds your timeframe for stale devices.
7979

8080
### Disable devices
8181

articles/advisor/advisor-reference-reliability-recommendations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ Learn more about [Kubernetes - Azure Arc - Arc-enabled K8s agent version upgrade
280280

281281
Please be advised that your media account is about to hit its quota limits. Please review current usage of Assets, Content Key Policies and Stream Policies for the media account. To avoid any disruption of service, you should request quota limits to be increased for the entities that are closer to hitting quota limit. You can request quota limits to be increased by opening a ticket and adding relevant details to it. Please don't create additional Azure Media accounts in an attempt to obtain higher limits.
282282

283-
Learn more about [Media Service - AccountQuotaLimit (Increase Media Services quotas or limits to ensure continuity of service.)](/media-services/latest/limits-quotas-constraints-reference).
283+
Learn more about [Media Service - AccountQuotaLimit (Increase Media Services quotas or limits to ensure continuity of service.)](/azure/media-services/latest/limits-quotas-constraints-reference).
284284

285285
## Networking
286286

articles/aks/use-kms-etcd-encryption.md

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -59,11 +59,6 @@ az provider register --namespace Microsoft.ContainerService
5959

6060
## Limitations
6161

62-
> [!WARNING]
63-
> Deleting the key or the Azure Key Vault is not supported and will cause your cluster to become unstable.
64-
>
65-
> If you need to recover your Key Vault or key, see the [Azure Key Vault recovery management with soft delete and purge protection](../key-vault/general/key-vault-recovery.md?tabs=azure-cli) documentation.
66-
6762
The following limitations apply when you integrate KMS etcd encryption with AKS:
6863

6964
* Disabling of the KMS etcd encryption feature.
@@ -78,6 +73,11 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
7873

7974
## Create a KeyVault and key
8075

76+
> [!WARNING]
77+
> Deleting the key or the Azure Key Vault is not supported and will cause your cluster to become unstable.
78+
>
79+
> If you need to recover your Key Vault or key, see the [Azure Key Vault recovery management with soft delete and purge protection](../key-vault/general/key-vault-recovery.md?tabs=azure-cli) documentation.
80+
8181
Use `az keyvault create` to create a KeyVault.
8282

8383
```azurecli
@@ -143,7 +143,7 @@ az aks create --name myAKSCluster --resource-group MyResourceGroup --assign-iden
143143

144144
## Update an exiting AKS cluster to enable KMS etcd encryption
145145

146-
Use `az aks update` with the `--enable-azure-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption on an existing cluster.
146+
Use [az aks update][az-aks-update] with the `--enable-azure-keyvault-kms` and `--azure-keyvault-kms-key-id` parameters to enable KMS etcd encryption on an existing cluster.
147147

148148
```azurecli-interactive
149149
az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azure-keyvault-kms --azure-keyvault-kms-key-id $KEY_ID
@@ -152,5 +152,15 @@ az aks update --name myAKSCluster --resource-group MyResourceGroup --enable-azur
152152
<!-- LINKS - Internal -->
153153
[aks-support-policies]: support-policies.md
154154
[aks-faq]: faq.md
155+
[az-feature-register]: /cli/azure/feature#az-feature-register
156+
[az-feature-list]: /cli/azure/feature#az-feature-list
157+
[az extension add]: /cli/azure/extension#az-extension-add
158+
[az-extension-update]: /cli/azure/extension#az-extension-update
155159
[azure-cli-install]: /cli/azure/install-azure-cli
156160
[az-aks-create]: /cli/azure/aks#az-aks-create
161+
[az-extension-add]: /cli/azure/extension#az_extension_add
162+
[az-extension-update]: /cli/azure/extension#az_extension_update
163+
[az-feature-register]: /cli/azure/feature#az_feature_register
164+
[az-feature-list]: /cli/azure/feature#az_feature_list
165+
[az-provider-register]: /cli/azure/provider#az_provider_register
166+
[az-aks-update]: /cli/azure/aks#az_aks_update

articles/app-service/configure-common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ App settings are always encrypted when stored (encrypted-at-rest).
4444

4545
![Application Settings](./media/configure-common/open-ui.png)
4646

47-
By default, values for app settings are hidden in the portal for security. To see a hidden value of an app setting, click its **Value** field. To see the hidden values of all app settings, click the **Show value** button.
47+
By default, values for app settings are hidden in the portal for security. To see a hidden value of an app setting, click its **Value** field. To see the hidden values of all app settings, click the **Show values** button.
4848

4949
1. To add a new app setting, click **New application setting**. To edit a setting, click the **Edit** button on the right side.
5050

0 commit comments

Comments
 (0)