Skip to content

Commit a627c46

Browse files
authored
Merge branch 'main' into lochen/update-pipeline-job-doc
2 parents d7d77ef + c8eb781 commit a627c46

File tree

961 files changed

+8833
-4428
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

961 files changed

+8833
-4428
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -505,6 +505,11 @@
505505
"source_path_from_root": "/articles/azure-monitor/app/cloudservices.md" ,
506506
"redirect_url": "/azure/azure-monitor/app/azure-web-apps-net-core",
507507
"redirect_document_id": false
508+
},
509+
{
510+
"source_path_from_root": "/articles/azure-monitor/logs/workspace-design-service-providers.md" ,
511+
"redirect_url": "/azure/azure-monitor/logs/workspace-design",
512+
"redirect_document_id": false
508513
}
509514
]
510515
}

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -434,6 +434,16 @@
434434
"redirect_url": "/azure/azure-arc/kubernetes/conceptual-agent-overview",
435435
"redirect_document_id": false
436436
},
437+
{
438+
"source_path": "articles/cognitive-services/language-service/custom-text-classification/how-to/improve-model.md",
439+
"redirect_url": "/azure/cognitive-services/language-service/custom-text-classification/how-to/view-model-evaluation",
440+
"redirect_document_id": true
441+
},
442+
{
443+
"source_path": "articles/cognitive-services/language-service/custom-named-entity-recognition/how-to/improve-model.md",
444+
"redirect_url": "/azure/cognitive-services/language-service/custom-named-entity-recognition/how-to/view-model-evaluation",
445+
"redirect_document_id": true
446+
},
437447
{
438448
"source_path": "articles/cognitive-services/conversational-language-understanding/how-to/deploy-query-model.md",
439449
"redirect_url": "/azure/cognitive-services/language-service/conversational-language-understanding/how-to/deploy-model",
@@ -7744,7 +7754,7 @@
77447754
{
77457755
"source_path_from_root": "/articles/cognitive-services/language-service/custom-classification/how-to/view-model-evaluation.md",
77467756
"redirect_url": "/azure/cognitive-services/language-service/custom-text-classification/how-to/view-model-evaluation",
7747-
"redirect_document_id": true
7757+
"redirect_document_id": false
77487758
},
77497759
{
77507760
"source_path_from_root": "/articles/cognitive-services/language-service/custom-classification/concepts/data-formats.md",

articles/active-directory-b2c/extensions-app.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,7 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
3636
> [!NOTE]
3737
> An application can only be restored if it has been deleted within the last 30 days. If it has been more than 30 days, data will be permanently lost. For more assistance, file a support ticket.
3838
39+
<!--Hide portal steps until SP bug is fixed
3940
### Recover the extensions app using the Azure portal
4041
4142
1. Sign in to your Azure AD B2C tenant.
@@ -44,18 +45,18 @@ If you accidentally deleted the `b2c-extensions-app`, you have 30 days to recove
4445
1. Select **Restore app registration**.
4546
4647
You should now be able to [see the restored app](#verifying-that-the-extensions-app-is-present) in the Azure portal.
47-
48+
-->
4849
### Recover the extensions app using Microsoft Graph
49-
To restore the app using Microsoft Graph, you must restore both the application and the service principal.
50+
To restore the app using Microsoft Graph, you must restore both the application object and the service principal. For more information, see the [Restore deleted item](/graph/api/directory-deleteditems-restore) API.
5051

51-
To restore the application:
52+
To restore the application object:
5253
1. Browse to [https://developer.microsoft.com/en-us/graph/graph-explorer](https://developer.microsoft.com/en-us/graph/graph-explorer).
5354
1. Log in to the site as a global administrator for the Azure AD B2C directory that you want to restore the deleted app for. This global administrator must have an email address similar to the following: `username@{yourTenant}.onmicrosoft.com`.
5455
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.application`. This operation will list all of the applications that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.application?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
5556
1. Find the application in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
5657
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.]
5758

58-
To restore the service principal:
59+
To restore the service principal object:
5960
1. Issue an HTTP GET against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/microsoft.graph.servicePrincipal`. This operation will list all of the service principals that have been deleted within the past 30 days. You can also use the URL `https://graph.microsoft.com/v1.0/directory/deletedItems/microsoft.graph.servicePrincipal?$filter=displayName eq 'b2c-extensions-app. Do not modify. Used by AADB2C for storing user data.'` to filter by the app's **displayName** property.
6061
1. Find the service principal in the list where the name begins with `b2c-extensions-app` and copy its `id` property value.
6162
1. Issue an HTTP POST against the URL `https://graph.microsoft.com/v1.0/directory/deleteditems/{id}/restore`. Replace the `{id}` portion of the URL with the `id` from the previous step.

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 07/26/2022
4+
ms.date: 08/08/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/23/2022
7+
ms.date: 08/08/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -13,7 +13,7 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use additional context in Microsoft Authenticator app notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
16+
This article covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
1717

1818
## Prerequisites
1919

@@ -50,7 +50,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
5050

5151
| Property | Type | Description |
5252
|---------|------|-------------|
53-
| id | String | The authentication method policy identifier. |
53+
| ID | String | The authentication method policy identifier. |
5454
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
5555

5656
**RELATIONSHIPS**
@@ -67,7 +67,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
6767
| Property | Type | Description |
6868
|----------|------|-------------|
6969
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
70-
| id | String | Object ID of an Azure AD user or group. |
70+
| ID | String | Object ID of an Azure AD user or group. |
7171
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>You can only set one group or user for additional context. |
7272
| displayAppInformationRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
7373

@@ -78,7 +78,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
7878

7979
Change the **displayAppInformationRequiredState** from **default** to **enabled**.
8080

81-
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you do not want to allow passwordless, use **push**.
81+
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
8282

8383
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **displayAppInformationRequiredState**.
8484

@@ -182,18 +182,24 @@ To turn off additional context, you'll need to PATCH remove **displayAppInformat
182182

183183
To enable additional context in the Azure AD portal, complete the following steps:
184184

185-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
186-
1. Select the target users, click the three dots on the right, and click **Configure**.
185+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
186+
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
187+
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
188+
1. From the list of available authentication methods, select **Microsoft Authenticator**.
189+
190+
![Screenshot that shows how to select the Microsoft Authenticator policy.](./media/how-to-mfa-additional-context/select-microsoft-authenticator-policy.png)
191+
192+
1. Select the target users, select the three dots on the right, and choose **Configure**.
187193

188-
![Screenshot of how to configure number match.](media/howto-authentication-passwordless-phone/configure.png)
194+
![Screenshot of configuring Microsoft authenticator additional context.](./media/how-to-mfa-additional-context/configure-microsoft-authenticator.png)
189195

190-
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, click **Enable**, and then click **Done**.
196+
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, select **Enable**, and then select **Done**.
191197

192198
![Screenshot of enabling additional context.](media/howto-authentication-passwordless-phone/enable-additional-context.png)
193199

194200
## Known issues
195201

196-
Additional context is not supported for Network Policy Server (NPS).
202+
Additional context isn't supported for Network Policy Server (NPS).
197203

198204
## Next steps
199205

0 commit comments

Comments
 (0)