Skip to content

Commit 9dcb469

Browse files
authored
Merge pull request #197069 from MicrosoftDocs/main
5/04 AM Publish
2 parents 76d851e + 74bf6d2 commit 9dcb469

File tree

83 files changed

+989
-893
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

83 files changed

+989
-893
lines changed

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 04/30/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -156,7 +156,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
156156
| ------- | :--: | ----- |
157157
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | Preview | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158158
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159-
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
159+
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | GA | |
160160
| [One-time password](one-time-password-technical-profile.md) | GA | |
161161
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
162162
| [Predicate validations](predicates.md) | GA | For example, password complexity. |
@@ -168,8 +168,8 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
168168
| Feature | Custom policy | Notes |
169169
| ------- | :--: | ----- |
170170
| Azure portal | GA | |
171-
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | Preview | Used for troubleshooting during development. |
172-
| [Application Insights event logs](analytics-with-application-insights.md) | Preview | Used to monitor user flows in production. |
171+
| [Application Insights user journey logs](troubleshoot-with-application-insights.md) | GA | Used for troubleshooting during development. |
172+
| [Application Insights event logs](analytics-with-application-insights.md) | GA | Used to monitor user flows in production. |
173173

174174
## Responsibilities of custom policy feature-set developers
175175

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/25/2022
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -18,8 +18,6 @@ ms.subservice: B2C
1818

1919
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using a verification code, or verifying a Time-based One-time Password (TOTP) code.
2020

21-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
22-
2321
## Protocol
2422

2523
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:
@@ -168,9 +166,9 @@ The following example shows an Azure AD MFA technical profile used to verify the
168166

169167
In this mode, the user is required to install any authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own.
170168

171-
During the first sign-up or sign-in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
169+
During the first sign up or sign in, the user scans a QR code, opens a deep link, or enters the code manually using the authenticator app. To verify the TOTP code, use the [Begin verify OTP](#begin-verify-totp) followed by [Verify TOTP](#verify-totp) validation technical profiles.
172170

173-
For subsequent sign-ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
171+
For subsequent sign ins, use the [Get available devices](#get-available-devices) method to check if the user has already enrolled their device. If the number of available devices is greater than zero, this indicates the user has enrolled before. In this case, the user needs to type the TOTP code that appears in the authenticator app.
174172

175173
The technical profile:
176174

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2022
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -50,8 +50,6 @@ In a self-asserted technical profile, you can use the **InputClaims** and **Inpu
5050

5151
## Display claims
5252

53-
The display claims feature is currently in **preview**.
54-
5553
The **DisplayClaims** element contains a list of claims to be presented on the screen for collecting data from the user. To prepopulate the values of display claims, use the input claims that were previously described. The element may also contain a default value.
5654

5755
The order of the claims in **DisplayClaims** specifies the order in which Azure AD B2C renders the claims on the screen. To force the user to provide a value for a specific claim, set the **Required** attribute of the **DisplayClaim** element to `true`.
@@ -133,7 +131,7 @@ Use output claims when:
133131
- **Claims are output by output claims transformation**.
134132
- **Setting a default value in an output claim** without collecting data from the user or returning the data from the validation technical profile. The `LocalAccountSignUpWithLogonEmail` self-asserted technical profile sets the **executed-SelfAsserted-Input** claim to `true`.
135133
- **A validation technical profile returns the output claims** - Your technical profile may call a validation technical profile that returns some claims. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. For example, when signing in with a local account, the self-asserted technical profile named `SelfAsserted-LocalAccountSignin-Email` calls the validation technical profile named `login-NonInteractive`. This technical profile validates the user credentials and also returns the user profile. Such as 'userPrincipalName', 'displayName', 'givenName' and 'surName'.
136-
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. The display control feature is currently in **preview**.
134+
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey.
137135

138136
The following example demonstrates the use of a self-asserted technical profile that uses both display claims and output claims.
139137

articles/active-directory-b2c/technicalprofiles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 11/30/2021
12+
ms.date: 04/30/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -99,7 +99,7 @@ The **TechnicalProfile** element contains the following elements:
9999
| InputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed before any claims are sent to the claims provider or the relying party. |
100100
| InputClaims | 0:1 | A list of previously defined references to claim types that are taken as input in the technical profile. |
101101
| PersistedClaims | 0:1 | A list of previously defined references to claim types that will be persisted by the technical profile. |
102-
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). The DisplayClaims feature is currently in preview. |
102+
| DisplayClaims | 0:1 | A list of previously defined references to claim types that are presented by the [self-asserted technical profile](self-asserted-technical-profile.md). |
103103
| OutputClaims | 0:1 | A list of previously defined references to claim types that are taken as output in the technical profile. |
104104
| OutputClaimsTransformations | 0:1 | A list of previously defined references to claims transformations that should be executed after the claims are received from the claims provider. |
105105
| ValidationTechnicalProfiles | 0:n | A list of references to other technical profiles that the technical profile uses for validation purposes. For more information, see [Validation technical profile](validation-technical-profile.md).|

articles/active-directory/devices/concept-primary-refresh-token.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,13 @@ The PRT is issued during user authentication on a Windows 10 or newer device in
6161
In Azure AD registered device scenarios, the Azure AD WAM plugin is the primary authority for the PRT since Windows logon is not happening with this Azure AD account.
6262

6363
> [!NOTE]
64-
> 3rd party identity providers need to support the WS-Trust protocol to enable PRT issuance on Windows 10 or newer devices. Without WS-Trust, PRT cannot be issued to users on Hybrid Azure AD joined or Azure AD joined devices. On ADFS only usernamemixed endpoints are required. Both adfs/services/trust/2005/windowstransport and adfs/services/trust/13/windowstransport should be enabled as intranet facing endpoints only and **must NOT be exposed** as extranet facing endpoints through the Web Application Proxy
64+
> 3rd party identity providers need to support the WS-Trust protocol to enable PRT issuance on Windows 10 or newer devices. Without WS-Trust, PRT cannot be issued to users on Hybrid Azure AD joined or Azure AD joined devices. On ADFS only usernamemixed endpoints are required. Both adfs/services/trust/2005/windowstransport and adfs/services/trust/13/windowstransport should be enabled as intranet facing endpoints only and **must NOT be exposed** as extranet facing endpoints through the Web Application Proxy.
6565
6666
> [!NOTE]
67-
> Azure AD Conditional Access policies are not evaluated when PRTs are issued
67+
> Azure AD Conditional Access policies are not evaluated when PRTs are issued.
68+
69+
> [!NOTE]
70+
> We do not support 3rd party credential providers for issuance and renewal of Azure AD PRTs.
6871
6972
## What is the lifetime of a PRT?
7073

articles/active-directory/verifiable-credentials/whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ manager: karenhoran
66
ms.service: active-directory
77
ms.subservice: verifiable-credentials
88
ms.topic: reference
9-
ms.date: 04/27/2022
9+
ms.date: 05/04/2022
1010
ms.custom: references_regions
1111
ms.author: barclayn
1212

@@ -18,6 +18,10 @@ ms.author: barclayn
1818

1919
This article lists the latest features, improvements, and changes in the Azure Active Directory (Azure AD) Verifiable Credentials service.
2020

21+
## May
22+
23+
We are expanding our service to all Azure AD customers! Verifiable credentials are now available to everyone with an Azure AD subscription (Free and Premium). Existing tenants that configured the Verifiable Credentials service prior to May 4, 2022 must make a [small change](verifiable-credentials-faq.md#updating-the-vc-service-configuration) to avoid service disruptions.
24+
2125
## April
2226

2327
Starting next month, we are rolling out exciting changes to the subscription requirements for the Verifiable Credentials service. Administrators must perform a small configuration change before **May 4, 2022** to avoid service disruptions. Follow [these steps](verifiable-credentials-faq.md?#updating-the-vc-service-configuration) to apply the required configuration changes.

articles/aks/use-kms-etcd-encryption.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,6 @@ The following limitations apply when you integrate KMS etcd encryption with AKS:
6767
* KMS etcd encryption does not work with System-Assigned Managed Identity. The keyvault access-policy is required to be set before the feature is enabled. In addition, System-Assigned Managed Identity is not available until cluster creation, thus there is a cycle dependency.
6868
* Using Azure Key Vault with PrivateLink enabled.
6969
* Using more than 2000 secrets in a cluster.
70-
* Managed HSM Support
7170
* Bring your own (BYO) Azure Key Vault from another tenant.
7271

7372

articles/app-service/environment/migration-alternatives.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Migrate to App Service Environment v3
33
description: How to migrate your applications to App Service Environment v3
44
author: seligj95
55
ms.topic: article
6-
ms.date: 3/15/2022
6+
ms.date: 5/4/2022
77
ms.author: jordanselig
88
---
99
# Migrate to App Service Environment v3
@@ -81,7 +81,7 @@ To clone an app using the [Azure portal](https://www.portal.azure.com), navigate
8181

8282
## Manually create your apps on an App Service Environment v3
8383

84-
If the above features don't support your apps or you're looking to take a more manual route, you have the option of deploying your apps following the same process you used for your existing App Service Environment. At this time, all deployment methods except FTP are supported on App Service Environment v3. You don't need to make updates when you deploy your apps to your new environment unless you want to make changes or take advantage of App Service Environment v3's dedicated features.
84+
If the above features don't support your apps or you're looking to take a more manual route, you have the option of deploying your apps following the same process you used for your existing App Service Environment. You don't need to make updates when you deploy your apps to your new environment unless you want to make changes or take advantage of App Service Environment v3's dedicated features.
8585

8686
You can export [Azure Resource Manager (ARM) templates](../../azure-resource-manager/templates/overview.md) of your existing apps, App Service plans, and any other supported resources and deploy them in or with your new environment. To export a template for just your app, head over to your App Service and go to **Export template** under **Automation**.
8787

@@ -171,4 +171,4 @@ Once your migration and any testing with your new environment is complete, delet
171171
> [Integrate your ILB App Service Environment with the Azure Application Gateway](integrate-with-application-gateway.md)
172172

173173
> [!div class="nextstepaction"]
174-
> [Migrate to App Service Environment v3 by using the migration feature](migrate.md)
174+
> [Migrate to App Service Environment v3 by using the migration feature](migrate.md)

articles/applied-ai-services/form-recognizer/concept-read.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: ignite-fall-2021
1515

1616
# Form Recognizer read model
1717

18-
The Form Recognizer v3.0 preview includes the new Read API. Read extracts printed and handwritten from documents. The read model can detect lines, words, locations, and languages and is the core of all the other Form Recognizer models. Layout, general document, custom, and prebuilt models all use the read model as a foundation for extracting texts from documents.
18+
The Form Recognizer v3.0 preview includes the new Read OCR model. Form Recognizer Read builds on the success of COmputer Vision Read and optimizes even more for analyzing documents, including new document formats in the future. It extracts printed and handwritten text from documents and images and can handle mixed languages in the documents and text line. The read model can detect lines, words, locations, and additionally detect languages. It is the foundational technology powering the text extraction in Form Recognizer Layout, prebuilt, general document, and custom models.
1919

2020
## Development options
2121

@@ -77,11 +77,11 @@ Form Recognizer preview version supports several languages for the read model. *
7777

7878
### Text lines and words
7979

80-
Read API extracts text from documents and images with multiple text angles and colors. It accepts photos of documents, faxes, printed and/or handwritten (English only) text, and mixed modes. Text is extracted from data provided in lines, words, bounding boxes, confidence scores, and style.
80+
Read API extracts text from documents and images. It accepts PDFs and images of documents and handles printed and/or handwritten text, and supports mixed languages. Text is extracted as text lnes, words, bounding boxes, confidence scores, and style, whether handwritten or not, supported for Latin languages only.
8181

82-
### Language detection (v3.0 preview)
82+
### Language detection
8383

84-
Read API in v3.0 preview 2 adds [language detection](language-support.md#detected-languages-read-api) as a new feature for text lines. Read will predict the language at the text line level along with the confidence score.
84+
Read adds [language detection](language-support.md#detected-languages-read-api) as a new feature for text lines. Read will predict the language at the text line level along with the confidence score.
8585

8686
### Handwritten classification for text lines (Latin only)
8787

0 commit comments

Comments
 (0)