Skip to content

Commit a9eb298

Browse files
authored
Merge pull request #222575 from MicrosoftDocs/main
12/28 PM Publish
2 parents 0a32cf5 + 4b02c5d commit a9eb298

33 files changed

+714
-384
lines changed

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 3 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/29/2022
9+
ms.date: 12/13/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ Cloud-based Azure AD multifactor authentication and MFA Server process and store
2424

2525
The Azure AD multifactor authentication service has datacenters in the United States, Europe, and Asia Pacific. The following activities originate from the regional datacenters except where noted:
2626

27-
* Multifactor authentication phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
27+
* Multifactor authentication SMS and phone calls originate from datacenters in the customer's region and are routed by global providers. Phone calls using custom greetings always originate from data centers in the United States.
2828
* General purpose user authentication requests from other regions are currently processed based on the user's location.
2929
* Push notifications that use the Microsoft Authenticator app are currently processed in regional datacenters based on the user's location. Vendor-specific device services, such as Apple Push Notification Service or Google Firebase Cloud Messaging, might be outside the user's location.
3030

@@ -102,22 +102,12 @@ Standard voice calls may failover to a different region.
102102
>[!NOTE]
103103
>The multifactor authentication activity reports contain personal data such as User Principal Name (UPN) and complete phone number.
104104
105-
### NPS extension and AD FS adapter
106-
107-
| Authentication method | Customer region | Activity report location | Service log location |
108-
|-----------------------------------------------------------------------------------|--------------------------------------|--------------------------|----------------------|
109-
| OATH software and hardware tokens | Australia and New Zealand | Australia/New Zealand | Cloud in-region |
110-
| OATH software and hardware tokens | Outside of Australia and New Zealand | United States | Cloud in-region |
111-
| Voice calls without custom greetings and all other authentication methods except OATH software and hardware tokens | Any | United States | Cloud in-region |
112-
| Voice calls with custom greetings | Any | United States | MFA backend in United States |
113-
114105
### MFA server and cloud-based MFA
115106

116107
| Component | Authentication method | Customer region | Activity report location | Service log location |
117108
|------------|------------------------------------------------|--------------------------------------|---------------------------------|------------------------------|
118109
| MFA server | All methods | Any | United States | MFA backend in United States |
119-
| Cloud MFA | Standard voice calls and all other methods | Any | Azure AD Sign-in logs in region | Cloud in-region |
120-
| Cloud MFA | Voice calls with custom greetings | Any | Azure AD Sign-in logs in region | MFA backend in United States |
110+
| Cloud MFA | All methods | Any | Azure AD Sign-in logs in region | Cloud in-region |
121111

122112
## Multifactor authentication activity reports for sovereign clouds
123113

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 12/06/2022
10+
ms.date: 12/28/2022
1111

1212

1313
ms.author: justinha
@@ -32,17 +32,14 @@ People who enabled phone sign-in from Microsoft Authenticator see a message that
3232
1. Choose **Approve**.
3333
1. Provide their PIN or biometric.
3434

35-
## Multiple accounts on iOS (preview)
35+
## Multiple accounts on iOS
3636

3737
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
3838

3939
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
4040

4141
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-ins from one device.
4242

43-
>[!NOTE]
44-
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45-
4643
## Prerequisites
4744

4845
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,9 @@ The following device attributes can be used with the filter for devices conditio
128128
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -eq "ServerAD") |
129129
| extensionAttribute1-15 | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | extensionAttributes1-15 are attributes that customers can use for device objects. Customers can update any of the extensionAttributes1 through 15 with custom values and use them in the filter for devices condition in Conditional Access. Any string value can be used. | (device.extensionAttribute1 -eq "SAW") |
130130

131+
> [!NOTE]
132+
> When building complex rules or using too many individual identifiers like deviceid for device identities, keep in mind "The maximum length for the filter rule is 3072 characters".
133+
131134
> [!NOTE]
132135
> The `Contains` and the `NotContains` operators work differently depending on attribute types. For string attributes such as `operatingSystem` and `model`, the `Contains` operator indicates whether a specified substring occurs within the attribute. For string collection attributes such as `physicalIds` and `systemLabels`, the `Contains` operator indicates whether a specified string matches one of the whole strings in the collection.
133136

articles/active-directory/devices/concept-azure-ad-register.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Azure AD registration can be accomplished when accessing a work application for
5353

5454
## Scenarios
5555

56-
A user in your organization wants to access your benefits enrollment tool from their home PC. Your organization requires that anyone accesses this tool from an Intune compliant device. The user registers their home PC with Azure AD and the required Intune policies are enforced giving the user access to their resources.
56+
A user in your organization wants to access your benefits enrollment tool from their home PC. Your organization requires that anyone accesses this tool from an Intune compliant device. The user registers their home PC with Azure AD and Enrolls the device in Intune, then the required Intune policies are enforced giving the user access to their resources.
5757

5858
Another user wants to access their organizational email on their personal Android phone that has been rooted. Your company requires a compliant device and has created an Intune compliance policy to block any rooted devices. The employee is stopped from accessing organizational resources on this device.
5959

articles/azure-maps/tutorial-creator-indoor-maps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -334,7 +334,7 @@ To check the status of the tileset creation process and retrieve the `tilesetId`
334334
5. Enter the `status URL` you copied in [Create a tileset](#create-a-tileset). The request should look like the following URL:
335335
336336
```http
337-
https://us.atlas.microsoft.com/tilesets/operations/{operationId}?api-version=2.0&subscription-key={Your-Azure-Maps-Subscription-key}
337+
https://us.atlas.microsoft.com/tilesets/operations/{operationId}?api-version=2022-09-01-preview&subscription-key={Your-Azure-Maps-Subscription-key}
338338
```
339339
340340
6. Select **Send**.

articles/azure-monitor/app/asp-net-core.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,9 @@ We'll use an [MVC application](/aspnet/core/tutorials/first-mvc-app) example. If
2828
2929
[!INCLUDE [azure-monitor-log-analytics-rebrand](../../../includes/azure-monitor-instrumentation-key-deprecation.md)]
3030

31+
> [!NOTE]
32+
> You can also use the Microsoft.Extensions.Logging.ApplicationInsights package to capture logs. For more information, see [Application Insights logging with .NET](ilogger.md). For an example, see [Console application](ilogger.md#console-application).
33+
3134
## Supported scenarios
3235

3336
The [Application Insights SDK for ASP.NET Core](https://nuget.org/packages/Microsoft.ApplicationInsights.AspNetCore) can monitor your applications no matter where or how they run. If your application is running and has network connectivity to Azure, telemetry can be collected. Application Insights monitoring is supported everywhere .NET Core is supported and covers the following scenarios:

articles/azure-monitor/app/azure-ad-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Application Insights Node.JS supports the credential classes provided by [Azure
106106
#### DefaultAzureCredential
107107

108108
```javascript
109-
let appInsights = require("applicationinsights");
109+
import appInsights from "applicationinsights";
110110
import { DefaultAzureCredential } from "@azure/identity";
111111

112112
const credential = new DefaultAzureCredential();
@@ -118,7 +118,7 @@ appInsights.defaultClient.config.aadTokenCredential = credential;
118118
#### ClientSecretCredential
119119

120120
```javascript
121-
let appInsights = require("applicationinsights");
121+
import appInsights from "applicationinsights";
122122
import { ClientSecretCredential } from "@azure/identity";
123123

124124
const credential = new ClientSecretCredential(

articles/azure-monitor/app/ilogger.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -226,6 +226,8 @@ namespace WebApplication
226226

227227
## Console application
228228

229+
The following example uses the Microsoft.Extensions.Logging.ApplicationInsights package. The Microsoft.Extensions.Logging.ApplicationInsights package should be used in a console application or whenever you want a bare minimum implementation of Application Insights without the full feature set such as metrics, distributed tracing, sampling, and telemetry initializers.
230+
229231
Here are the installed packages:
230232

231233
```xml
@@ -284,7 +286,7 @@ namespace ConsoleApp
284286

285287
```
286288

287-
The preceding example uses the `Microsoft.Extensions.Logging.ApplicationInsights` package. By default, this configuration uses the "bare minimum" `TelemetryConfiguration` setup for sending data to Application Insights: the `InMemoryChannel` channel. There's no sampling and no standard `TelemetryInitializer` instance. You can override this behavior for a console application, as the following example shows.
289+
The previous example demonstrates the default behavior for a console application. As the following example shows, you can override this default behavior.
288290

289291
Also install this package:
290292

0 commit comments

Comments
 (0)