Skip to content

Commit a11792f

Browse files
committed
Merge branch '249042' of https://github.com/markingmyname/azure-docs-pr into 249042
2 parents 799f189 + b9c7cef commit a11792f

File tree

647 files changed

+8666
-7294
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

647 files changed

+8666
-7294
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,12 @@
230230
"branch": "master",
231231
"branch_mapping": {}
232232
},
233+
{
234+
"path_to_root": "functions-docs-python-v2",
235+
"url": "https://github.com/Azure-Samples/functions-docs-python-v2",
236+
"branch": "main",
237+
"branch_mapping": {}
238+
},
233239
{
234240
"path_to_root": "functions-docs-powershell",
235241
"url": "https://github.com/Azure-Samples/functions-docs-powershell",

.openpublishing.redirection.json

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7974,11 +7974,15 @@
79747974
"redirect_document_id": false
79757975
},
79767976
{
7977-
"source_path_from_root": "/articles/azure-functions/functions-create-first-azure-function-azure-cli.md",
7978-
"redirect_url": "/azure/azure-functions/create-first-function-cli-csharp",
7977+
"source_path_from_root": "/articles/azure-functions/functions-bindings-example.md",
7978+
"redirect_url": "/azure/azure-functions/functions-triggers-bindings#bindings-code-examples",
79797979
"redirect_document_id": false
79807980
},
79817981
{
7982+
"source_path_from_root": "/articles/azure-functions/functions-create-first-azure-function-azure-cli.md",
7983+
"redirect_url": "/azure/azure-functions/create-first-function-cli-csharp",
7984+
"redirect_document_id": false
7985+
}, {
79827986
"source_path_from_root": "/articles/azure-functions/functions-create-first-java-maven.md",
79837987
"redirect_url": "/azure/azure-functions/create-first-function-cli-java",
79847988
"redirect_document_id": false
@@ -24228,6 +24232,11 @@
2422824232
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-sign-in-sign-out",
2422924233
"redirect_document_id": false
2423024234
},
24235+
{
24236+
"source_path_from_root": "/articles/virtual-machines/image-builder-reliability.md",
24237+
"redirect_url": "/azure/reliability/reliability-image-builder.md",
24238+
"redirect_document_id": false
24239+
},
2423124240
{
2423224241
"source_path_from_root": "/articles/bastion/bastion-connect-vm-rdp-linux.md",
2423324242
"redirect_url": "/azure/bastion/bastion-connect-vm-ssh-linux",

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -248,7 +248,7 @@ See an example of a [validation-error response](#example-of-a-validation-error-r
248248
## Before sending the token (preview)
249249

250250
> [!IMPORTANT]
251-
> API connectors used in this step are in preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
251+
> API connectors used in this step are in preview. For more information about previews, see [Product Terms for Online Services](https://www.microsoft.com/licensing/terms/product/ForOnlineServices/all).
252252
253253
An API connector at this step is invoked when a token is about to be issued during sign-ins and sign-ups. An API connector for this step can be used to enrich the token with claim values from external sources.
254254

articles/active-directory-b2c/openid-connect-technical-profile.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/04/2021
12+
ms.date: 08/22/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -88,7 +88,7 @@ The technical profile also returns claims that aren't returned by the identity p
8888
| MarkAsFailureOnStatusCode5xx | No | Indicates whether a request to an external service should be marked as a failure if the Http status code is in the 5xx range. The default is `false`. |
8989
| DiscoverMetadataByTokenIssuer | No | Indicates whether the OIDC metadata should be discovered by using the issuer in the JWT token.If you need to build the metadata endpoint URL based on Issuer, set this to `true`.|
9090
| IncludeClaimResolvingInClaimsHandling  | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
91-
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt` (public preview). For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
91+
|token_endpoint_auth_method| No | Specifies how Azure AD B2C sends the authentication header to the token endpoint. Possible values: `client_secret_post` (default), and `client_secret_basic` (public preview), `private_key_jwt`. For more information, see [OpenID Connect client authentication section](https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication). |
9292
|token_signing_algorithm| No | Specifies the signing algorithm to use when `token_endpoint_auth_method` is set to `private_key_jwt`. Possible values: `RS256` (default) or `RS512`.|
9393
| SingleLogoutEnabled | No | Indicates whether during sign-in the technical profile attempts to sign out from federated identity providers. For more information, see [Azure AD B2C session sign-out](./session-behavior.md#sign-out). Possible values: `true` (default), or `false`. |
9494
|ReadBodyClaimsOnIdpRedirect| No| Set to `true` to read claims from response body on identity provider redirect. This metadata is used with [Apple ID](identity-provider-apple-id.md), where claims return in the response payload.|
@@ -134,3 +134,4 @@ Examples:
134134
- [Add Microsoft Account (MSA) as an identity provider using custom policies](identity-provider-microsoft-account.md)
135135
- [Sign in by using Azure AD accounts](identity-provider-azure-ad-single-tenant.md)
136136
- [Allow users to sign in to a multi-tenant Azure AD identity provider using custom policies](identity-provider-azure-ad-multi-tenant.md)
137+

articles/active-directory-b2c/secure-rest-api.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -230,8 +230,6 @@ The following XML snippet is an example of a RESTful technical profile configure
230230

231231
## OAuth2 bearer authentication
232232

233-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
234-
235233
Bearer token authentication is defined in [OAuth2.0 Authorization Framework: Bearer Token Usage (RFC 6750)](https://www.rfc-editor.org/rfc/rfc6750.txt). In bearer token authentication, Azure AD B2C sends an HTTP request with a token in the authorization header.
236234

237235
```http
@@ -243,7 +241,6 @@ A bearer token is an opaque string. It can be a JWT access token or any string t
243241
- **Bearer token**. To be able to send the bearer token in the Restful technical profile, your policy needs to first acquire the bearer token and then use it in the RESTful technical profile.
244242
- **Static bearer token**. Use this approach when your REST API issues a long-term access token. To use a static bearer token, create a policy key and make a reference from the RESTful technical profile to your policy key.
245243

246-
247244
## Using OAuth2 Bearer
248245

249246
The following steps demonstrate how to use client credentials to obtain a bearer token and pass it into the Authorization header of the REST API calls.
@@ -488,15 +485,18 @@ Add the validation technical profile reference to the sign up technical profile,
488485

489486

490487

488+
489+
491490
For example:
492-
```XML
493-
<ValidationTechnicalProfiles>
494-
....
495-
<ValidationTechnicalProfile ReferenceId="REST-AcquireAccessToken" />
496-
....
497-
</ValidationTechnicalProfiles>
498-
```
499-
491+
```ruby
492+
```XML
493+
<ValidationTechnicalProfiles>
494+
....
495+
<ValidationTechnicalProfile ReferenceId="REST-AcquireAccessToken" />
496+
....
497+
</ValidationTechnicalProfiles>
498+
```
499+
```
500500

501501
::: zone-end
502502

@@ -531,7 +531,6 @@ To configure a REST API technical profile with API key authentication, create th
531531
1. For **Key usage**, select **Encryption**.
532532
1. Select **Create**.
533533

534-
535534
### Configure your REST API technical profile to use API key authentication
536535

537536
After creating the necessary key, configure your REST API technical profile metadata to reference the credentials.
@@ -584,3 +583,4 @@ The following XML snippet is an example of a RESTful technical profile configure
584583
::: zone pivot="b2c-custom-policy"
585584
- Learn more about the [Restful technical profile](restful-technical-profile.md) element in the custom policy reference.
586585
::: zone-end
586+

articles/active-directory/architecture/recoverability-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,15 +124,15 @@ Microsoft Graph APIs are highly customizable based on your organizational needs.
124124

125125
*Securely store these configuration exports with access provided to a limited number of admins.
126126

127-
The [Azure AD Exporter](https://github.com/microsoft/azureadexporter) can provide most of the documentation you need:
127+
The [Entra Exporter](https://github.com/microsoft/entraexporter) can provide most of the documentation you need:
128128

129129
- Verify that you've implemented the desired configuration.
130130
- Use the exporter to capture current configurations.
131131
- Review the export, understand the settings for your tenant that aren't exported, and manually document them.
132132
- Store the output in a secure location with limited access.
133133

134134
> [!NOTE]
135-
> Settings in the legacy multifactor authentication portal for Application Proxy and federation settings might not be exported with the Azure AD Exporter, or with the Microsoft Graph API.
135+
> Settings in the legacy multifactor authentication portal for Application Proxy and federation settings might not be exported with the Entra Exporter, or with the Microsoft Graph API.
136136
The [Microsoft 365 Desired State Configuration](https://github.com/microsoft/Microsoft365DSC/wiki/What-is-Microsoft365DSC) module uses Microsoft Graph and PowerShell to retrieve the state of many of the configurations in Azure AD. This information can be used as reference information or, by using PowerShell Desired State Configuration scripting, to reapply a known good state.
137137

138138
Use [Conditional Access Graph APIs](https://github.com/Azure-Samples/azure-ad-conditional-access-apis) to manage policies like code. Automate approvals to promote policies from preproduction environments, backup and restore, monitor change, and plan ahead for emergencies.

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/06/2023
9+
ms.date: 07/21/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -42,12 +42,12 @@ To get started with passwordless sign-in, see [Enable passwordless sign-in with
4242

4343
The Authenticator app can help prevent unauthorized access to accounts and stop fraudulent transactions by pushing a notification to your smartphone or tablet. Users view the notification, and if it's legitimate, select **Verify**. Otherwise, they can select **Deny**.
4444

45-
![Screenshot of example web browser prompt for Authenticator app notification to complete sign-in process.](media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-browser-prompt.png)
45+
> [!NOTE]
46+
> Starting in August, 2023, sign-ins from unfamiliar locations no longer generate notifications. Similar to how unfamiliar locations work in [Smart lockout](howto-password-smart-lockout.md), a location becomes "familiar" during the first 14 days of use, or the first 10 sign-ins. If the location is unfamiliar, or if the relevant Google or Apple service responsible for push notifications isn't available, users won't see their notification as usual. In that case, they should open Microsoft Authenticator, or Authenticator Lite in a relevant companion app like Outlook, refresh by either pulling down or hitting **Refresh**, and approve the request.
4647
47-
In some rare instances where the relevant Google or Apple service responsible for push notifications is down, users may not receive their push notifications. In these cases users should manually navigate to the Microsoft Authenticator app (or relevant companion app like Outlook), refresh by either pulling down or hitting the refresh button, and approve the request.
48+
![Screenshot of example web browser prompt for Authenticator app notification to complete sign-in process.](media/tutorial-enable-azure-mfa/tutorial-enable-azure-mfa-browser-prompt.png)
4849

49-
> [!NOTE]
50-
> If your organization has staff working in or traveling to China, the *Notification through mobile app* method on Android devices doesn't work in that country/region as Google play services(including push notifications) are blocked in the region. However iOS notification do work. For Android devices ,alternate authentication methods should be made available for those users.
50+
In China, the *Notification through mobile app* method on Android devices doesn't work because as Google play services (including push notifications) are blocked in the region. However, iOS notifications do work. For Android devices, alternate authentication methods should be made available for those users.
5151

5252
## Verification code from mobile app
5353

articles/active-directory/authentication/fido2-compatibility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ The following tables show which transports are supported for each platform. Supp
7474
|---------|------|-----|-----|
7575
| Edge | &#10060; | &#10060; | &#10060; |
7676
| Chrome | &#x2705; | &#10060; | &#10060; |
77-
| Firefox | &#10060; | &#10060; | &#10060; |
77+
| Firefox | &#x2705; | &#10060; | &#10060; |
7878

7979

8080
### iOS

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,13 @@ Microsoft Authenticator Lite is another surface for Azure Active Directory (Azur
2525
Users receive a notification in Outlook mobile to approve or deny sign-in, or they can copy a TOTP to use during sign-in.
2626

2727
>[!NOTE]
28-
>This is an important security enhancement for users authenticating via telecom transports. On June 26, the Microsoft managed value of this feature changed from ‘disabled’ to ‘enabled’. If you no longer wish for this feature to be enabled, move the state from 'default' to‘disabled’ or set users to include and exclude groups.
28+
>These are important security enhancements for users authenticating via telecom transports:
29+
>- On June 26, the Microsoft managed value of this feature changed from ‘disabled’ to ‘enabled’ in the Authentication methods policy. If you no longer wish for this feature to be enabled, move the state from 'default' to ‘disabled’ or scope it to only a group of users.
30+
>- Starting September 18, Authenticator Lite will be enabled as part of the *Notification through mobile app* verification option in the per-user MFA policy. If you don't want this feature enabled, you can disable it in the Authentication methods policy following the steps below.
2931
3032
## Prerequisites
3133

32-
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for some users or groups by using the modern Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API. Organizations with an active MFA server or that have not started migration from per-user MFA are not eligible for this feature.
34+
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for all users or select groups. We recommend enabling Microsoft Authenticator by using the modern [Authentication methods policy](concept-authentication-methods-manage.md#authentication-methods-policy). You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API. Organizations with an active MFA server are not eligible for this feature.
3335

3436
>[!TIP]
3537
>We recommend that you also enable [system-preferred multifactor authentication (MFA)](concept-system-preferred-multifactor-authentication.md) when you enable Authenticator Lite. With system-preferred MFA enabled, users try to sign-in with Authenticator Lite before they try less secure telephony methods like SMS or voice call.
@@ -45,7 +47,7 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
4547

4648
## Enable Authenticator Lite
4749

48-
By default, Authenticator Lite is [Microsoft managed](concept-authentication-default-enablement.md#microsoft-managed-settings). On June 26, the Microsoft managed value of this feature changed from ‘disabled’ to ‘enabled’
50+
By default, Authenticator Lite is [Microsoft managed](concept-authentication-default-enablement.md#microsoft-managed-settings) in the Authentication methods policy. On June 26, the Microsoft managed value of this feature changed from ‘disabled’ to ‘enabled’. Authenticator Lite is also included as part of the *Notification through mobile app* verification option in the per-user MFA policy.
4951

5052
### Disabling Authenticator Lite in Azure portal UX
5153

@@ -54,9 +56,9 @@ To disable Authenticator Lite in the Azure portal, complete the following steps:
5456
1. In the Azure portal, click Azure Active Directory > Security > Authentication methods > Microsoft Authenticator.
5557
In the Entra admin center, on the sidebar select Azure Active Directory > Protect & Secure > Authentication methods > Microsoft Authenticator.
5658

57-
2. On the Enable and Target tab, click Yes and All users to enable the Authenticator policy for everyone or add selected users and groups. Set the Authentication mode for these users/groups to Any or Push.
59+
2. On the Enable and Target tab, click Enable and All users to enable the Authenticator policy for everyone or add select groups. Set the Authentication mode for these users/groups to Any or Push.
5860

59-
Only users who are enabled for Microsoft Authenticator here can be enabled to use Authenticator Lite for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
61+
Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
6062

6163
<img width="1112" alt="Microsoft Entra admin center Authenticator settings" src="https://user-images.githubusercontent.com/108090297/228603771-52c5933c-f95e-4f19-82db-eda2ba640b94.png">
6264

@@ -65,6 +67,9 @@ To disable Authenticator Lite in the Azure portal, complete the following steps:
6567

6668
<img width="664" alt="Authenticator Lite configuration settings" src="https://user-images.githubusercontent.com/108090297/228603364-53f2581f-a4e0-42ee-8016-79b23e5eff6c.png">
6769

70+
>[!NOTE]
71+
> If your organization still manages authentication methods in the per-user MFA policy, you'll need to disable *Notification through mobile app* as a verification option there in addition to the steps above. We recommend doing this only after you've enabled Microsoft Authenticator in the Authentication methods policy. You can contine to manage the remainder of your authentication methods in the per-user MFA policy while Microsoft Authenticator is managed in the modern Authentication methods policy. However, we recommend [migrating](how-to-authentication-methods-manage.md) management of all authentication methods to the modern Authentication methods policy. The ability to manage authentication methods in the per-user MFA policy will be retired September 30, 2024.
72+
6873
### Enable Authenticator Lite via Graph APIs
6974

7075
| Property | Type | Description |

0 commit comments

Comments
 (0)