Skip to content

Commit a89e738

Browse files
authored
Merge pull request #234053 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 4/11
2 parents b68ff98 + 65eb260 commit a89e738

File tree

131 files changed

+1840
-885
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+1840
-885
lines changed

articles/active-directory-b2c/custom-policies-series-hello-world.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,8 +143,10 @@ If you haven't already done so, create the following encryption keys. To automat
143143

144144
```xml
145145
<UserJourney Id="HelloWorldJourney">
146-
<OrchestrationStep Order="1" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="JwtIssuer" />
147-
</UserJourney>
146+
<OrchestrationSteps>
147+
<OrchestrationStep Order="1" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="JwtIssuer" />
148+
</OrchestrationSteps>
149+
</UserJourney>
148150
```
149151

150152
We've added a [UserJourney](userjourneys.md). The user journey specifies the business logic the end user goes through as Azure AD B2C processes a request. This user journey has only one step that issues a JTW token with the claims that you'll define in the next step.

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ The following considerations apply:
164164

165165
- Administrators can enable passwordless authentication methods for their tenant.
166166

167-
- Administrators can target all users or select users/groups within their tenant for each method.
167+
- Administrators can target all users or select users/Security groups within their tenant for each method.
168168

169169
- Users can register and manage these passwordless authentication methods in their account portal.
170170

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 04/10/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -30,7 +30,7 @@ Note the SDK has been deprecated and will only continue to work until November 1
3030

3131
## What is an MFA provider?
3232

33-
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if some users authenticate only occasionally. The per-user option calculates the number of users who are eligible to perform MFA, which is all users in Azure AD, and all enabled users in MFA Server. This option is best if some users have licenses but you need to extend MFA to more users beyond your licensing limits.
33+
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if some accounts authenticate only occasionally. The per-user option calculates the number of accounts that are eligible to perform MFA, which is all accounts in Azure AD, and all enabled accounts in MFA Server. This option is best if some users have licenses but you need to extend MFA to more users beyond your licensing limits.
3434

3535
## Manage your MFA provider
3636

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 04/05/2023
7+
ms.date: 04/10/2023
88
ms.author: justinha
99
author: justinha
1010
ms.collection: M365-identity-device-management
@@ -310,9 +310,7 @@ Number match will be enabled for all users of Microsoft Authenticator push notif
310310

311311
Relevant services will begin deploying these changes after May 8, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
312312

313-
### Will the changes after May 8th, 2023, override number matching settings that are configured for a group in the Authentication methods policy?
314-
315-
No, the changes after May 8th won't affect the **Enable and Target** tab for Microsoft Authenticator in the Authentication methods policy. Administrators can continue to target specific users and groups or **All Users** for Microsoft Authenticator **Push** or **Any** authentication mode.
313+
### What happens to number matching settings that are currently configured for a group in the Authentication methods policy after number matching is enabled for Authenticator push notifications after May 8th, 2023?
316314

317315
When Microsoft begins protecting all organizations by enabling number matching after May 8th, 2023, administrators will see the **Require number matching for push notifications** setting on the **Configure** tab of the Microsoft Authenticator policy is set to **Enabled** for **All users** and can't be disabled. In addition, the **Exclude** option for this setting will be removed.
318316

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/13/2023
9+
ms.date: 04/10/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -159,7 +159,7 @@ Users can have a combination of up to five OATH hardware tokens or authenticator
159159

160160
If users receive phone calls for MFA prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
161161

162-
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Uses with spam filters should exclude this number.
162+
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Users with spam filters should exclude this number.
163163

164164
* *+1 (855) 330-8653*
165165

Loading
Loading

articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ reactspalocal/
153153

154154
### Adding the sign in experience
155155

156-
1. Open *SignInButton.jsx* and add the following code, which creates a button that signs in the user using either a popup or redirect.
156+
1. Open *SignInButton.jsx* and add the following code, which creates a button that signs in the user using either a pop-up or redirect.
157157

158158
```javascript
159159
import React from "react";
@@ -255,4 +255,4 @@ reactspalocal/
255255
<!-- ::: zone-end -->
256256

257257
> [!div class="nextstepaction"]
258-
> [Tutorial: Call an API from a React single-page app](single-page-app-tutorial-04-call-api.md)
258+
> [Tutorial: Call an API from a React single-page app](single-page-app-tutorial-04-call-api.md)

articles/active-directory/saas-apps/beable-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/09/2023
12+
ms.date: 04/11/2023
1313
ms.author: jeedes
1414

1515
---
@@ -22,7 +22,7 @@ In this article, you learn how to integrate Beable with Azure Active Directory (
2222
* Enable your users to be automatically signed-in to Beable with their Azure AD accounts.
2323
* Manage your accounts in one central location - the Azure portal.
2424

25-
You'll configure and test Azure AD single sign-on for Beable in a test environment. Beable supports **IDP** initiated single sign-on.
25+
You configure and test Azure AD single sign-on for Beable in a test environment. Beable supports **IDP** initiated single sign-on.
2626

2727
## Prerequisites
2828

@@ -63,7 +63,7 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6363
`https://<SUBDOMAIN>.beable.com`
6464

6565
b. In the **Reply URL** textbox, type a URL using the following pattern:
66-
`https://prod-literacy-backend-alb-12049610218161332941.beable.com/login/ssoVerification/?providerId=1466658d-11ae-11ed-b1a0-b9e58c7ef6cc&identifier=<DOMAIN>`
66+
`https://prod-literacy-backend-alb-<ID>.beable.com/login/ssoVerification/?providerId=<ProviderID>&identifier=<DOMAIN>`
6767

6868
> [!Note]
6969
> These values are not real. Update these values with the actual Identifier and Reply URL. Contact [Beable support team](https://beable.com/contact/) to get these values. You can also refer to the patterns shown in the Basic SAML Configuration section in the Azure portal.

articles/active-directory/saas-apps/qradar-soar-tutorial.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,20 +9,20 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/14/2022
12+
ms.date: 04/11/2023
1313
ms.author: jeedes
1414

1515
---
1616

1717
# Azure Active Directory SSO integration with QRadar SOAR
1818

19-
In this article, you'll learn how to integrate QRadar SOAR with Azure Active Directory (Azure AD). QRadar SOAR enhances the analyst experience through accelerated incident response with simple automation, process standardization, and integration with your existing security tools. When you integrate QRadar SOAR with Azure AD, you can:
19+
In this article, you learn how to integrate QRadar SOAR with Azure Active Directory (Azure AD). QRadar SOAR enhances the analyst experience through accelerated incident response with simple automation, process standardization, and integration with your existing security tools. When you integrate QRadar SOAR with Azure AD, you can:
2020

2121
* Control in Azure AD who has access to QRadar SOAR.
2222
* Enable your users to be automatically signed-in to QRadar SOAR with their Azure AD accounts.
2323
* Manage your accounts in one central location - the Azure portal.
2424

25-
You'll configure and test Azure AD single sign-on for QRadar SOAR in a test environment. QRadar SOAR supports both **SP** and **IDP** initiated single sign-on.
25+
You configure and test Azure AD single sign-on for QRadar SOAR in a test environment. QRadar SOAR supports both **SP** and **IDP** initiated single sign-on.
2626

2727
## Prerequisites
2828

@@ -63,24 +63,24 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6363

6464
| **Identifier** |
6565
|-------|
66-
| `https://<UPS>.domain.extension/<ID>` |
67-
| `https://<SOAR>.domain.extension` |
66+
| `https://<CustomerName>.domain.extension/<ID>` |
67+
| `https://<CustomerName>.domain.extension` |
6868

6969
b. In the **Reply URL** textbox, type a URL using one of the following patterns:
7070

7171
| **Reply URL** |
7272
|-------|
73-
| `https://<UPS>.domain.extension/<ID>` |
74-
| `https://<SOAR>.domain.extension` |
73+
| `https://<CustomerName>.domain.extension/<ID>` |
74+
| `https://<CustomerName>.domain.extension` |
7575

7676
1. If you want to configure **SP** initiated SSO, then perform the following step:
7777

7878
In the **Sign on URL** textbox, type a URL using one of the following patterns:
7979

8080
| **Sign on URL** |
8181
|-------|
82-
| `https://<UPS>.domain.extension/<ID>` |
83-
| `https://<SOAR>.domain.extension` |
82+
| `https://<CustomerName>.domain.extension/<ID>` |
83+
| `https://<CustomerName>.domain.extension` |
8484

8585
> [!Note]
8686
> These values are not the real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [QRadar SOAR Client support team](mailto:[email protected]) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.

0 commit comments

Comments
 (0)