Skip to content

Commit ad0d231

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents ef83d79 + b5d6469 commit ad0d231

File tree

124 files changed

+1395
-1896
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

124 files changed

+1395
-1896
lines changed

.openpublishing.redirection.json

Lines changed: 61 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33858,7 +33858,17 @@
3385833858
},
3385933859
{
3386033860
"source_path": "articles/cognitive-services/entitylinking/index.md",
33861-
"redirect_url": "/azure/cognitive-services/entitylinking/home",
33861+
"redirect_url": "/azure/cognitive-services/text-analytics",
33862+
"redirect_document_id": false
33863+
},
33864+
{
33865+
"source_path": "articles/cognitive-services/entitylinking/GettingStarted.md",
33866+
"redirect_url": "/azure/cognitive-services/text-analytics",
33867+
"redirect_document_id": false
33868+
},
33869+
{
33870+
"source_path": "articles/cognitive-services/entitylinking/Home.md",
33871+
"redirect_url": "/azure/cognitive-services/text-analytics",
3386233872
"redirect_document_id": false
3386333873
},
3386433874
{
@@ -33871,6 +33881,41 @@
3387133881
"redirect_url": "/azure/cognitive-services/LinguisticAnalysisAPI/Home",
3387233882
"redirect_document_id": false
3387333883
},
33884+
{
33885+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/AnalyzeMethod.md",
33886+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33887+
"redirect_document_id": false
33888+
},
33889+
{
33890+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Analyzer-Names.md",
33891+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33892+
"redirect_document_id": false
33893+
},
33894+
{
33895+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/AnalyzersMethod.md",
33896+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33897+
"redirect_document_id": false
33898+
},
33899+
{
33900+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Constituency-Parsing.md",
33901+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33902+
"redirect_document_id": false
33903+
},
33904+
{
33905+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Home.md",
33906+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33907+
"redirect_document_id": false
33908+
},
33909+
{
33910+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/POS-tagging.md",
33911+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33912+
"redirect_document_id": false
33913+
},
33914+
{
33915+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Sentences-and-Tokens.md",
33916+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33917+
"redirect_document_id": false
33918+
},
3387433919
{
3387533920
"source_path": "articles/cognitive-services/Recommendations/index.md",
3387633921
"redirect_url": "/azure/cognitive-services/Recommendations/overview",
@@ -33886,6 +33931,11 @@
3388633931
"redirect_url": "/azure/cognitive-services/Web-Language-Model/Home",
3388733932
"redirect_document_id": false
3388833933
},
33934+
{
33935+
"source_path": "articles/cognitive-services/Web-Language-Model/Home.md",
33936+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
33937+
"redirect_document_id": false
33938+
},
3388933939
{
3389033940
"source_path": "articles/data-factory/v1/index.md",
3389133941
"redirect_url": "/azure/data-factory/v1/data-factory-introduction",
@@ -45170,6 +45220,16 @@
4517045220
"redirect_url": "/azure/storage/common/storage-security-guide",
4517145221
"redirect_document_id": false
4517245222
},
45223+
{
45224+
"source_path": "articles/storage/blobs/data-lake-storage-quickstart-create-account.md",
45225+
"redirect_url": "/azure/storage/common/storage-account-create",
45226+
"redirect_document_id": false
45227+
},
45228+
{
45229+
"source_path": "articles/storage/blobs/data-lake-storage-how-to-set-permissions-storage-explorer.md",
45230+
"redirect_url": "/azure/storage/blobs/data-lake-storage-explorer",
45231+
"redirect_document_id": false
45232+
},
4517345233
{
4517445234
"source_path": "articles/security/fundamentals/global-admin.md",
4517545235
"redirect_url": "/azure/active-directory/authentication/multi-factor-authentication",

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Azure Active Directory passwordless sign in (preview)
3-
description: Passwordless sign in to Azure AD using FIDO2 security keys or the Microsoft Authenticator app (preview)
3+
description: Learn about options for passwordless sign in to Azure Active Directory using FIDO2 security keys or the Microsoft Authenticator app
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/08/2019
9+
ms.date: 01/24/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Passwordless authentication options
1919

20-
Multi-factor authentication (MFA) is a great way to secure your organization, but users get frustrated with the additional layer on top of having to remember their passwords. Passwordless authentication methods are more convenient because the password is removed and replaced with something you have plus something you are or something you know.
20+
Multi-factor authentication (MFA) is a great way to secure your organization, but users often get frustrated with the additional security layer on top of having to remember their passwords. Passwordless authentication methods are more convenient because the password is removed and replaced with something you have, plus something you are or something you know.
2121

2222
| | Something you have | Something you are or know |
2323
| --- | --- | --- |
@@ -33,23 +33,23 @@ Each organization has different needs when it comes to authentication. Microsoft
3333

3434
## Windows Hello for Business
3535

36-
Windows Hello for Business is ideal for information workers who have their own designated Windows PC. The biometric and PIN are directly tied to the user's PC, which prevents access from anyone other than the owner. With PKI integration and built-in support for single sign-on (SSO), Windows Hello for Business provides a simple and convenient method for seamlessly accessing corporate resources on-premises and in the cloud.
36+
Windows Hello for Business is ideal for information workers who have their own designated Windows PC. The biometric and PIN are directly tied to the user's PC, which prevents access from anyone other than the owner. With public key infrastructure (PKI) integration and built-in support for single sign-on (SSO), Windows Hello for Business provides a convenient method for seamlessly accessing corporate resources on-premises and in the cloud.
3737

3838
The Windows Hello for Business [planning guide](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-planning-guide) can be used to help you make decisions on the type of Windows Hello for Business deployment and the options you'll need to consider.
3939

4040
## Microsoft Authenticator App
4141

42-
Allow your employees phone to become a passwordless authentication method. You may already be using the Microsoft Authenticator App as a convenient multi-factor authentication option in addition to a password. But now, it’s available as a passwordless option.
42+
Allow your employee's phone to become a passwordless authentication method. You may already be using the Microsoft Authenticator App as a convenient multi-factor authentication option in addition to a password. You can also use the Authenticator App as a passwordless option.
4343

4444
![Sign in to Microsoft Edge with the Microsoft Authenticator app](./media/concept-authentication-passwordless/concept-web-sign-in-microsoft-authenticator-app.png)
4545

46-
It turns any iOS or Android phone into a strong, passwordless credential by allowing users to sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone and then using their biometric (touch or face) or PIN to confirm.
46+
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm.
4747

4848
## FIDO2 security keys
4949

50-
FIDO2 security keys are an unphishable standards-based passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication. It allows users and organizations to leverage the standard to sign in to their resources without a username or password using an external security key or a platform key built into a device.
50+
FIDO2 security keys are an unphishable standards-based passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication. FIDO allows users and organizations to leverage the standard to sign in to their resources without a username or password using an external security key or a platform key built into a device.
5151

52-
For public preview, employees can use security keys to sign in to their Azure AD joined Windows 10 devices and get single-sign on to their cloud and on-premises resources. They can also sign in to supported browsers.
52+
For public preview, employees can use security keys to sign in to their Azure AD-joined Windows 10 devices and get single-sign on to their cloud and on-premises resources. Users can also sign in to supported browsers. FIDO2 security keys are a great option for enterprises who are very security sensitive or have scenarios or employees who aren't willing or able to use their phone as a second factor.
5353

5454
![Sign in to Microsoft Edge with a security key](./media/concept-authentication-passwordless/concept-web-sign-in-security-key.png)
5555

@@ -64,7 +64,7 @@ A security key **MUST** implement the following features and extensions from the
6464
| 3 | hmac-secret | This extension ensures you can sign in to your device when it's off-line or in airplane mode. |
6565
| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like Microsoft Account and Azure Active Directory. |
6666

67-
The following providers offer FIDO2 security keys of different form factors that are known to be compatible with the passwordless experience. Microsoft encourages customers to evaluate the security properties of these keys by contacting the vendor as well as FIDO Alliance.
67+
The following providers offer FIDO2 security keys of different form factors that are known to be compatible with the passwordless experience. We encourage you to evaluate the security properties of these keys by contacting the vendor as well as FIDO Alliance.
6868

6969
| Provider | Contact |
7070
| --- | --- |
@@ -76,20 +76,18 @@ The following providers offer FIDO2 security keys of different form factors that
7676
| AuthenTrend | [https://authentrend.com/about-us/#pg-35-3](https://authentrend.com/about-us/#pg-35-3) |
7777

7878
> [!NOTE]
79-
> If you purchase and plan to use NFC based security keys you will need a supported NFC reader.
79+
> If you purchase and plan to use NFC-based security keys, you need a supported NFC reader for the security key. The NFC reader isn't an Azure requirement or limitation. Check with the vendor for your NFC-based security key for a list of supported NFC readers.
8080
81-
If you are a vendor and want to get your device on this list, contact [[email protected]](mailto:[email protected]).
82-
83-
FIDO2 security keys are a great option for enterprises who are very security sensitive or have scenarios or employees who aren’t willing or able to use their phone as a second factor.
81+
If you're a vendor and want to get your device on this list of supported devices, contact [[email protected]](mailto:[email protected]).
8482

8583
## What scenarios work with the preview?
8684

8785
- Administrators can enable passwordless authentication methods for their tenant
8886
- Administrators can target all users or select users/groups within their tenant for each method
8987
- End users can register and manage these passwordless authentication methods in their account portal
9088
- End users can sign in with these passwordless authentication methods
91-
- Microsoft Authenticator App: Will work in scenarios where Azure AD authentication is used, including across all browsers, during Windows 10 Out Of Box (OOBE) setup, and with integrated mobile apps on any operating system.
92-
- Security keys: Will work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge.
89+
- Microsoft Authenticator App: Works in scenarios where Azure AD authentication is used, including across all browsers, during Windows 10 Out Of Box (OOBE) setup, and with integrated mobile apps on any operating system.
90+
- Security keys: Work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge.
9391

9492
## Next steps
9593

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ Use the following steps to access the page where you can view and manage user st
6060

6161
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
6262
2. Search for and select *Azure Active Directory*. Select **Users** > **All users**.
63-
3. Select **Multi-Factor Authentication**.
64-
![Select Multi-Factor Authentication](./media/howto-mfa-userstates/selectmfa.png)
63+
3. Select **Multi-Factor Authentication**. You may need to scroll to the right to see this menu option. Select the example screenshot below to see the full Azure portal window and menu location:
64+
[![](media/howto-mfa-userstates/selectmfa-cropped.png "Select Multi-Factor Authentication from the Users window in Azure AD")](media/howto-mfa-userstates/selectmfa.png#lightbox)
6565
4. A new page that displays the user states opens.
6666
![multi-factor authentication user status - screenshot](./media/howto-mfa-userstates/userstate1.png)
6767

14.9 KB
Loading
27.6 KB
Loading

articles/active-directory/develop/reference-breaking-changes.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: conceptual
17-
ms.date: 08/28/2019
17+
ms.date: 1/24/2020
1818
ms.author: ryanwi
1919
ms.reviewer: hirsin
2020
ms.custom: aaddev
@@ -36,7 +36,20 @@ The authentication system alters and adds features on an ongoing basis to improv
3636
3737
## Upcoming changes
3838

39-
September 2019: Additional enforcement of POST semantics according to URL parsing rules - duplicate parameters will trigger an error and [BOM](https://www.w3.org/International/questions/qa-byte-order-mark) ignored.
39+
None scheduled at this time. Please see below for the changes that are in or are coming to production.
40+
41+
## February 2020:
42+
43+
### Empty fragments will be appended to every HTTP redirect from the login endpoint.
44+
45+
**Effective date**: February 8, 2020
46+
47+
**Endpoints impacted**: Both v1.0 and v2.0
48+
49+
**Protocol impacted**: OAuth and OIDC flows that use response_type=query - this covers the [authorization code flow](v2-oauth2-auth-code-flow.md) in some cases, and the [implicit flow](v2-oauth2-implicit-grant-flow.md).
50+
51+
When an authentication response is sent from login.microsoftonline.com to an application via HTTP redirect, the service will append an empty fragment to the reply URL. This prevents a class of redirect attacks by ensuring that the browser wipes out any existing fragment in the authentication request. No apps should have a dependency on this behavior.
52+
4053

4154
## August 2019
4255

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ This version fixes a bug where some servers that were auto-upgraded from a previ
8080

8181
Under certain circumstances, servers that were auto upgraded to version 1.4.18.0 did not re-enable Self-service password reset and Password Writeback after the upgrade was completed. This auto upgrade release fixes that issue and re-enables Self-service password reset and Password Writeback.
8282

83+
We fixed a bug in the sync errors compression utility that was not handling surrogate characters correctly.
84+
8385
## 1.4.18.0
8486

8587
>[!WARNING]

0 commit comments

Comments
 (0)