Skip to content

Commit a3cb33b

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-arm-quickstart
2 parents 10bfae4 + 6a9900a commit a3cb33b

File tree

6 files changed

+10
-8
lines changed

6 files changed

+10
-8
lines changed

articles/active-directory-b2c/identity-provider-salesforce-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ Now that you have a button in place, you need to link it to an action. The actio
205205
<ClaimsExchange Id="SalesforceExchange" TechnicalProfileReferenceId="salesforce" />
206206
```
207207

208-
Update the value of **TechnicalProfileReferenceId** to the **ID** of the technical profile you created earlier. For example, `LinkedIn-OAUTH`.
208+
Update the value of **TechnicalProfileReferenceId** to the **ID** of the technical profile you created earlier. For example, `salesforce` or `LinkedIn-OAUTH`.
209209

210210
3. Save the *TrustFrameworkExtensions.xml* file and upload it again for verification.
211211

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ For machines running Windows 7, 8, 8.1, and 10 you can enable users to reset the
2727
- Some 3rd party credential providers are known to cause problems with this feature.
2828
- Disabling UAC via modification of [EnableLUA registry key](https://docs.microsoft.com/openspecs/windows_protocols/ms-gpsb/958053ae-5397-4f96-977f-b7700ee461ec) is known to cause issues.
2929
- This feature does not work for networks with 802.1x network authentication deployed and the option "Perform immediately before user logon". For networks with 802.1x network authentication deployed it is recommended to use machine authentication to enable this feature.
30-
- Hybrid Azure AD joined machines must have network connectivity line of sight to a domain controller to use the new password and update cached credentials.
30+
- Hybrid Azure AD joined machines must have network connectivity line of sight to a domain controller to use the new password and update cached credentials. This means that devices must either be on the organization's internal network or on a VPN with network access to an on-premises domain controller.
3131
- If using an image, prior to running sysprep ensure that the web cache is cleared for the built-in Administrator prior to performing the CopyProfile step. More information about this step can be found in the support article [Performance poor when using custom default user profile](https://support.microsoft.com/help/4056823/performance-issue-with-custom-default-user-profile).
3232
- The following settings are known to interfere with the ability to use and reset passwords on Windows 10 devices
3333
- If Ctrl+Alt+Del is required by policy in versions of Windows 10 before v1809, **Reset password** will not work.

articles/active-directory/develop/quickstart-modify-supported-accounts.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@ By default, OAuth 2.0 implicit grant is disabled for applications. You can enabl
6666

6767
### To enable OAuth 2.0 implicit grant
6868

69+
1. In the left-hand navigation pane, select the **Azure Active Directory** service and then select **App registrations**.
70+
1. Find and select the application you want to configure. Once you've selected the app, you'll see the application's **Overview** or main registration page.
6971
1. From the app's **Overview** page, select the **Authentication** section.
7072
1. Under **Advanced settings**, locate the **Implicit grant** section.
7173
1. Select **ID tokens**, **Access tokens**, or both.

articles/active-directory/hybrid/how-to-connect-sso.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Seamless SSO can be combined with either the [Password Hash Synchronization](how
3030
![Seamless Single Sign-On](./media/how-to-connect-sso/sso1.png)
3131

3232
>[!IMPORTANT]
33-
>Seamless SSO needs the user's device to be **domain-joined** only, but it is not used on [Azure AD Joined](../devices/concept-azure-ad-join.md) or [Hybrid Azure AD joined](../devices/concept-azure-ad-join-hybrid.md) devices. SSO on Azure AD joined and Hybrid Azure AD joined works based on the [primary refresh token](../devices/concept-primary-refresh-token.md).
33+
>Seamless SSO needs the user's device to be **domain-joined** only, but it is not used on [Azure AD Joined](../devices/concept-azure-ad-join.md) or [Hybrid Azure AD joined](../devices/concept-azure-ad-join-hybrid.md) devices. SSO on Azure AD joined, Hybrid Azure AD joined, and Azure AD registered devices works based on the [primary refresh token](../devices/concept-primary-refresh-token.md).
3434
3535
## Key benefits
3636

articles/active-directory/hybrid/how-to-connect-sync-change-the-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ By default, the UserType attribute is not enabled for synchronization because th
195195

196196
- Azure AD only accepts two values for the UserType attribute: **Member** and **Guest**.
197197
- If the UserType attribute is not enabled for synchronization in Azure AD Connect, Azure AD users created through directory synchronization would have the UserType attribute set to **Member**.
198-
- Azure AD does not permit the UserType attribute on existing Azure AD users to be changed by Azure AD Connect. It can only be set during the creation of the Azure AD users and [changed via Powershell](/powershell/module/azuread/set-azureaduser?view=azureadps-2.0).
198+
- Prior to version 1.5.30.0, Azure AD did not permit the UserType attribute on existing Azure AD users to be changed by Azure AD Connect. In older versions, it could only be set during the creation of the Azure AD users and [changed via Powershell](/powershell/module/azuread/set-azureaduser?view=azureadps-2.0).
199199

200200
Before enabling synchronization of the UserType attribute, you must first decide how the attribute is derived from on-premises Active Directory. The following are the most common approaches:
201201

@@ -205,7 +205,7 @@ Before enabling synchronization of the UserType attribute, you must first decide
205205

206206
- Alternatively, you can derive the value for the UserType attribute from other properties. For example, you want to synchronize all users as **Guest** if their on-premises AD userPrincipalName attribute ends with domain part <em>@partners.fabrikam123.org</em>.
207207

208-
As mentioned previously, Azure AD Connect does not permit the UserType attribute on existing Azure AD users to be changed by Azure AD Connect. Therefore, you must ensure that the logic you have decided is consistent with how the UserType attribute is already configured for all existing Azure AD users in your tenant.
208+
As mentioned previously, older versions of Azure AD Connect do not permit the UserType attribute on existing Azure AD users to be changed by Azure AD Connect. Therefore, you must ensure that the logic you have decided is consistent with how the UserType attribute is already configured for all existing Azure AD users in your tenant.
209209

210210
The steps to enable synchronization of the UserType attribute can be summarized as:
211211

articles/key-vault/general/overview-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The model of a single mechanism for authentication to both planes has several be
3838

3939
- Organizations can control access centrally to all key vaults in their organization.
4040
- If a user leaves, they instantly lose access to all key vaults in the organization.
41-
- Organizations can customize authentication by using the options in Azure AD, such as to enable multi-factor authentication for added security
41+
- Organizations can customize authentication by using the options in Azure AD, such as to enable multi-factor authentication for added security.
4242

4343
### Managing administrative access to Key Vault
4444

@@ -93,6 +93,6 @@ For recommendation on securely managing storage accounts review the [Azure Stora
9393

9494
## Next Steps
9595

96-
- [Virtual network service endpoints for Azure Key Vault](overview-vnet-service-endpoints.md))
96+
- [Virtual network service endpoints for Azure Key Vault](overview-vnet-service-endpoints.md)
9797
- [RBAC: Built-in roles](../../role-based-access-control/built-in-roles.md)
98-
- [virtual network service endpoints for Azure Key Vault](overview-vnet-service-endpoints.md))
98+
- [virtual network service endpoints for Azure Key Vault](overview-vnet-service-endpoints.md)

0 commit comments

Comments
 (0)