You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/enable-authentication-python-web-app.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -416,7 +416,7 @@ if __name__ == "__main__":
416
416
417
417
## Step 6: Run your web app
418
418
419
-
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for`app.py` by default. Then, open your browser and navigate to the web app URL: <http://localhost:5000>.
419
+
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for`app.py` by default. Then, open your browser and navigate to the web app URL: `http://localhost:5000`.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/page-layout.md
+14-11Lines changed: 14 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 04/12/2022
12
+
ms.date: 07/18/2022
13
13
ms.author: kengaderdus
14
14
ms.subservice: B2C
15
15
---
@@ -26,7 +26,7 @@ Page layout packages are periodically updated to include fixes and improvements
26
26
27
27
Azure AD B2C page layout uses the following versions of the [jQuery library](https://jquery.com/) and the [Handlebars templates](https://handlebarsjs.com/):
28
28
29
-
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compliler version |
29
+
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compiler version |
30
30
|---------|---------|------|--------|----------|
31
31
|multifactor |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
32
32
||< 1.2.4 | 3.4.1 |4.0.12 |2.0.1 |
@@ -52,6 +52,9 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
52
52
53
53
## Self-asserted page (selfasserted)
54
54
55
+
**2.1.14**
56
+
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
57
+
55
58
**2.1.10**
56
59
57
60
- Correcting to the tab index
@@ -83,7 +86,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
83
86
- Fixed an accessibility bug to show inline error messages only on form submission.
84
87
85
88
**2.1.6**
86
-
- Fixed password error get cleared when typing too quickly on a different field.
89
+
- Fixed *password error gets cleared when typing too quickly on a different field*.
87
90
88
91
**2.1.5**
89
92
- Fixed cursor jumps issue on iOS when editing in the middle of the text.
@@ -100,7 +103,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
100
103
101
104
**2.1.1**
102
105
103
-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
106
+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
104
107
- Added support for saving passwords to iCloud Keychain.
105
108
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
106
109
- Added disclaimers on self-asserted page.
@@ -143,7 +146,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
143
146
144
147
- Initial release
145
148
146
-
## Unified sign-in sign-up page with password reset link (unifiedssp)
149
+
## Unified sign-in and sign-up page with password reset link (unifiedssp)
147
150
148
151
> [!TIP]
149
152
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
@@ -159,7 +162,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
159
162
- Updates to the UI elements and CSS classes
160
163
161
164
**2.1.5**
162
-
- Fixed an issue on tab order when idp selector template is used on signin page.
165
+
- Fixed an issue on tab order when idp selector template is used on sign-in page.
163
166
- Fixed an encoding issue on sign-in link text.
164
167
165
168
**2.1.4**
@@ -175,7 +178,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
175
178
- Allowing the "forgot password" link to use as claims exchange. For more information, see [Self-service password reset](add-password-reset-policy.md#self-service-password-reset-recommended).
176
179
177
180
**2.1.1**
178
-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
181
+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
179
182
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
180
183
- Added support for saving passwords to iCloud Keychain.
181
184
- Focus is now placed on the first error field when multiple fields have errors.
@@ -187,7 +190,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
187
190
188
191
- Added support for multiple sign-up links.
189
192
- Added support for user input validation according to the predicate rules defined in the policy.
190
-
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your signin name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
193
+
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign-in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
191
194
192
195
**1.2.0**
193
196
@@ -225,7 +228,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
225
228
**1.2.2**
226
229
- Fixed an issue with auto-filling the verification code when using iOS.
227
230
- Fixed an issue with redirecting a token to the relying party from Android Webview.
228
-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
231
+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This messages is hidden by default.
229
232
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
230
233
231
234
**1.2.1**
@@ -246,7 +249,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
246
249
247
250
- 'Confirm Code' button removed
248
251
- The input field for the code now only takes input up to six (6) characters
249
-
- The page will automatically attempt to verify the code entered when a 6-digit code is entered, without any button having to be clicked
252
+
- The page will automatically attempt to verify the code entered when a six-digit code is entered, without any button having to be clicked
250
253
- If the code is wrong, the input field is automatically cleared
251
254
- After three (3) attempts with an incorrect code, B2C sends an error back to the relying party
252
255
- Accessibility fixes
@@ -274,7 +277,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
274
277
**1.1.0**
275
278
276
279
- Accessibility fix
277
-
- Removed the default message when there is no contact from the policy
280
+
- Removed the default message when there's no contact from the policy
Copy file name to clipboardExpand all lines: articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md
+1-23Lines changed: 1 addition & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -230,9 +230,6 @@ You can enforce Conditional Access policies, such as multifactor authentication
230
230
>
231
231
> Remote desktop using Windows Hello for Business authentication is available only for deployments that use a certificate trust model. It's currently not available for a key trust model.
232
232
233
-
> [!WARNING]
234
-
> The per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app.
235
-
236
233
## Log in by using Azure AD credentials to a Windows VM
237
234
238
235
> [!IMPORTANT]
@@ -396,31 +393,12 @@ You might see the following error message when you initiate a remote desktop con
396
393
397
394

398
395
399
-
If you've configured a Conditional Access policy that requires MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
396
+
If you've configured a Conditional Access policy that requires MFA or legacy per-user Enabled/Enforced Azure AD MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
400
397
401
398
Another MFA-related error message is the one described previously: "Your credentials did not work."
402
399
403
400

404
401
405
-
> [!WARNING]
406
-
> The legacy per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app. This setting causes sign-in to fail with the "Your credentials did not work" error message.
407
-
408
-
You can resolve the problem by removing the per-user MFA setting through these commands:
409
-
410
-
```
411
-
412
-
# Get StrongAuthenticationRequirements configure on a user
If you haven't deployed Windows Hello for Business and if that isn't an option for now, you can configure a Conditional Access policy that excludes the Azure Windows VM Sign-In app from the list of cloud apps that require MFA. To learn more about Windows Hello for Business, see [Windows Hello for Business overview](/windows/security/identity-protection/hello-for-business/hello-identity-verification).
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/road-to-the-cloud-migrate.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -263,7 +263,7 @@ Based on the app dependencies, you have three migration options:
263
263
>[!NOTE]
264
264
>* Utilize Azure AD Domain Services if the dependencies are aligned with [Common deployment scenarios for Azure AD Domain Services](../../active-directory-domain-services/scenarios.md).
265
265
>* To validate if Azure AD DS is a good fit, you might use tools like Service Map [Microsoft Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.ServiceMapOMS?tab=Overview) and [Automatic Dependency Mapping with Service Map and Live Maps](https://techcommunity.microsoft.com/t5/system-center-blog/automatic-dependency-mapping-with-service-map-and-live-maps/ba-p/351867).
266
-
>* Validate your SQL server instantiations can be [migrated to a different domain](https://social.technet.microsoft.com/wiki/contents/articles/24960.migrating-sql-server-to-new-domain.aspx). If your SQL service is running in virtual machines, [use this guidance](/azure-sql/migration-guides/virtual-machines/sql-server-to-sql-on-azure-vm-individual-databases-guide).
266
+
>* Validate your SQL server instantiations can be [migrated to a different domain](https://social.technet.microsoft.com/wiki/contents/articles/24960.migrating-sql-server-to-new-domain.aspx). If your SQL service is running in virtual machines, [use this guidance](/azure/azure-sql/migration-guides/virtual-machines/sql-server-to-sql-on-azure-vm-individual-databases-guide).
0 commit comments