Skip to content

Commit 9c9a872

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into us1645361w
2 parents 02d6ac7 + fa7d5e5 commit 9c9a872

File tree

315 files changed

+1993
-1564
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

315 files changed

+1993
-1564
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34101,6 +34101,21 @@
3410134101
"redirect_url": "/azure/active-directory-b2c/tutorial-create-tenant",
3410234102
"redirect_document_id": false
3410334103
},
34104+
{
34105+
"source_path": "articles/active-directory/authentication/concept-mfa-get-started.md",
34106+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
34107+
"redirect_document_id": true
34108+
},
34109+
{
34110+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
34111+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
34112+
"redirect_document_id": true
34113+
},
34114+
{
34115+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-security-defaults.md",
34116+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
34117+
"redirect_document_id": true
34118+
},
3410434119
{
3410534120
"source_path": "articles/multi-factor-authentication/end-user/multi-factor-authentication-end-user-app-passwords.experimental.md",
3410634121
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-app-passwords",

articles/active-directory/authentication/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@
4343
items:
4444
- name: How MFA works
4545
href: concept-mfa-howitworks.md
46-
- name: Enable MFA
47-
href: concept-mfa-get-started.md
4846
- name: License your users
4947
href: concept-mfa-licensing.md
5048
- name: Manage an Auth Provider

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,10 @@ User accounts in Azure Multi-Factor Authentication have the following three dist
4949

5050
A user's state reflects whether an admin has enrolled them in Azure MFA, and whether they completed the registration process.
5151

52-
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
52+
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
53+
54+
> [!NOTE]
55+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
5356
5457
### View the status for a user
5558

@@ -176,6 +179,8 @@ Get-MsolUser -All | Set-MfaState -State Disabled
176179

177180
> [!NOTE]
178181
> We recently changed the behavior and PowerShell script above accordingly. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
182+
>
183+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
179184
180185
## Next steps
181186

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@
1717
items:
1818
- name: Common Conditional Access policies
1919
href: concept-conditional-access-policy-common.md
20-
- name: Security defaults
21-
href: concept-conditional-access-security-defaults.md
2220
- name: Conditional Access policy components
2321
href: concept-conditional-access-policies.md
2422
- name: Conditions

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Customize claims for an Azure AD tenant app (Public Preview)
2+
title: Customize claims for Azure AD tenant apps
33
titleSuffix: Microsoft identity platform
44
description: This page describes Azure Active Directory claims mapping.
55
services: active-directory

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configurable token lifetimes in Azure Active Directory
2+
title: Configurable Azure AD token lifetimes
33
titleSuffix: Microsoft identity platform
44
description: Learn how to set lifetimes for tokens issued by Azure AD.
55
services: active-directory

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure the role claim for enterprise applications in Azure AD
2+
title: Configure role claim for enterprise Azure AD apps | Azure
33
titleSuffix: Microsoft identity platform
44
description: Learn how to configure the role claim issued in the SAML token for enterprise applications in Azure Active Directory
55
services: active-directory

articles/active-directory/develop/active-directory-how-applications-are-added.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How and why applications are added to Azure Active Directory
2+
title: How and why to add apps to Azure AD
33
titleSuffix: Microsoft identity platform
44
description: What does it mean for an application to be added to Azure AD and how do they get there?
55
services: active-directory

articles/active-directory/develop/active-directory-optional-claims.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Learn how to provide optional claims to your Azure AD app
2+
title: Provide optional claims to Azure AD apps | Azure
33
titleSuffix: Microsoft identity platform
4-
description: A guide for adding custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens issued by Azure Active Directory.
4+
description: How to add custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens issued by Azure Active Directory.
55
author: rwike77
66
manager: CelesteDG
77

articles/active-directory/develop/active-directory-saml-claims-customization.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Customize SAML token claims for enterprise apps in Azure AD
2+
title: Customize Azure AD app SAML token claims
33
titleSuffix: Microsoft identity platform
44
description: Learn how to customize the claims issued in the SAML token for enterprise applications in Azure AD.
55
services: active-directory

0 commit comments

Comments
 (0)