Skip to content

Commit ae46d71

Browse files
committed
Bringing in line with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-whatsnew-sep22
2 parents 556035b + e88972c commit ae46d71

File tree

1,330 files changed

+17095
-11352
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,330 files changed

+17095
-11352
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 91 deletions
Original file line numberDiff line numberDiff line change
@@ -128,54 +128,6 @@
128128
"branch": "master",
129129
"branch_mapping": {}
130130
},
131-
{
132-
"path_to_root": "samples-mediaservices-integration",
133-
"url": "https://github.com/Azure-Samples/media-services-dotnet-functions-integration",
134-
"branch": "main",
135-
"branch_mapping": {}
136-
},
137-
{
138-
"path_to_root": "samples-mediaservices-encryptiondrm",
139-
"url": "https://github.com/Azure-Samples/media-services-dotnet-dynamic-encryption-with-drm",
140-
"branch": "master",
141-
"branch_mapping": {}
142-
},
143-
{
144-
"path_to_root": "samples-mediaservices-encryptionfairplay",
145-
"url": "https://github.com/Azure-Samples/media-services-dotnet-dynamic-encryption-with-fairplay",
146-
"branch": "master",
147-
"branch_mapping": {}
148-
},
149-
{
150-
"path_to_root": "samples-mediaservices-encryptionaes",
151-
"url": "https://github.com/Azure-Samples/media-services-dotnet-dynamic-encryption-with-aes",
152-
"branch": "master",
153-
"branch_mapping": {}
154-
},
155-
{
156-
"path_to_root": "samples-mediaservices-copyblob",
157-
"url": "https://github.com/Azure-Samples/media-services-dotnet-copy-blob-into-asset",
158-
"branch": "master",
159-
"branch_mapping": {}
160-
},
161-
{
162-
"path_to_root": "samples-mediaservices-deliverplayready",
163-
"url": "https://github.com/Azure-Samples/media-services-dotnet-deliver-playready-widevine-licenses",
164-
"branch": "master",
165-
"branch_mapping": {}
166-
},
167-
{
168-
"path_to_root": "samples-mediaservices-livestream",
169-
"url": "https://github.com/Azure-Samples/media-services-dotnet-encode-live-stream-with-ams-clear",
170-
"branch": "master",
171-
"branch_mapping": {}
172-
},
173-
{
174-
"path_to_root": "samples-mediaservices-encoderstandard",
175-
"url": "https://github.com/Azure-Samples/media-services-dotnet-on-demand-encoding-with-media-encoder-standard",
176-
"branch": "master",
177-
"branch_mapping": {}
178-
},
179131
{
180132
"path_to_root": "azure-app-service-multi-container",
181133
"url": "https://github.com/Azure-Samples/multicontainerwordpress",
@@ -374,30 +326,6 @@
374326
"branch": "master",
375327
"branch_mapping": {}
376328
},
377-
{
378-
"path_to_root": "media-services-v3-dotnet-tutorials",
379-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-tutorials",
380-
"branch": "main",
381-
"branch_mapping": {}
382-
},
383-
{
384-
"path_to_root": "media-services-v3-dotnet",
385-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet",
386-
"branch": "main",
387-
"branch_mapping": {}
388-
},
389-
{
390-
"path_to_root": "media-services-v3-dotnet-core-functions-integration",
391-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-core-functions-integration",
392-
"branch": "main",
393-
"branch_mapping": {}
394-
},
395-
{
396-
"path_to_root": "media-services-v3-python",
397-
"url": "https://github.com/Azure-Samples/media-services-v3-python",
398-
"branch": "main",
399-
"branch_mapping": {}
400-
},
401329
{
402330
"path_to_root": "samples-javascript",
403331
"url": "https://github.com/Microsoft/tsiclient",
@@ -410,24 +338,6 @@
410338
"branch": "master",
411339
"branch_mapping": {}
412340
},
413-
{
414-
"path_to_root": "media-services-v3-dotnet-core-tutorials",
415-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-core-tutorials",
416-
"branch": "master",
417-
"branch_mapping": {}
418-
},
419-
{
420-
"path_to_root": "media-services-v3-rest-postman",
421-
"url": "https://github.com/Azure-Samples/media-services-v3-rest-postman",
422-
"branch": "master",
423-
"branch_mapping": {}
424-
},
425-
{
426-
"path_to_root": "media-services-v3-node-tutorials",
427-
"url": "https://github.com/Azure-Samples/media-services-v3-node-tutorials",
428-
"branch": "main",
429-
"branch_mapping": {}
430-
},
431341
{
432342
"path_to_root": "media-services-video-indexer",
433343
"url": "https://github.com/Azure-Samples/media-services-video-indexer",
@@ -1038,6 +948,8 @@
1038948
".openpublishing.redirection.virtual-desktop.json",
1039949
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
1040950
"articles/applied-ai-services/.openpublishing.archived.json",
1041-
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json"
951+
"articles/cognitive-services/.openpublishing.redirection.cognitive-services.json",
952+
".openpublishing.redirection.baremetal-infrastructure.json"
953+
1042954
]
1043955
}
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
{
2+
"redirections": [
3+
4+
{
5+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/about-the-public-preview.md",
6+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/about-nc2-on-azure",
7+
"redirect_document_id": false
8+
}, {
9+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/architecture.md",
10+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/architecture",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/faq.md",
15+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/faq",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/get-started.md",
20+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/get-started",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/nc2-baremetal-overview.md",
25+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/nc2-baremetal-overview",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/requirements.md",
30+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/requirements",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/skus.md",
35+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/skus",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/solution-design.md",
40+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/solution-design",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/supported-instances-and-regions.md",
45+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/supported-instances-and-regions",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/use-cases-and-supported-scenarios.md",
50+
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/use-cases-and-supported-scenarios",
51+
"redirect_document_id": false
52+
}
53+
]
54+
}
55+

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 08/01/2022
4+
ms.date: 10/04/2022
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,12 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## September
19+
20+
### New articles
21+
22+
- [Tutorial: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C](partner-grit-iam.md)
23+
1824
## August 2022
1925

2026
### New articles

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -71,9 +71,9 @@ To configure the Temporary Access Pass authentication method policy:
7171
After you enable a policy, you can create a Temporary Access Pass for a user in Azure AD.
7272
These roles can perform the following actions related to a Temporary Access Pass.
7373

74-
- Global Administrator can create, delete, view a Temporary Access Pass on any user (except themselves)
75-
- Privileged Authentication Administrators can create, delete, view a Temporary Access Pass on admins and members (except themselves)
76-
- Authentication Administrators can create, delete, view a Temporary Access Pass on members (except themselves)
74+
- Global Administrators can create, delete, and view a Temporary Access Pass on any user (except themselves)
75+
- Privileged Authentication Administrators can create, delete, and view a Temporary Access Pass on admins and members (except themselves)
76+
- Authentication Administrators can create, delete, and view a Temporary Access Pass on members (except themselves)
7777
- Global Reader can view the Temporary Access Pass details on the user (without reading the code itself).
7878

7979
1. Sign in to the Azure portal as either a Global administrator, Privileged Authentication administrator, or Authentication administrator.

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 22 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/20/2022
9+
ms.date: 10/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ This article shows you how to view the Azure AD sign-ins report in the Azure por
2424

2525
## View the Azure AD sign-ins report
2626

27-
The sign-ins report provides you with information about the usage of managed applications and user sign-in activities, which includes information about multi-factor authentication (MFA) usage. The MFA data gives you insights into how MFA is working in your organization. It lets you answer questions like the following:
27+
The sign-ins report provides you with information about the usage of managed applications and user sign-in activities, which includes information about multi-factor authentication (MFA) usage. The MFA data gives you insights into how MFA is working in your organization. It answers questions like:
2828

2929
- Was the sign-in challenged with MFA?
3030
- How did the user complete MFA?
@@ -59,7 +59,7 @@ This information allows admins to troubleshoot each step in a user’s sign-in,
5959
- Volume of sign-ins protected by multi-factor authentication
6060
- Usage and success rates for each authentication method
6161
- Usage of passwordless authentication methods (such as Passwordless Phone Sign-in, FIDO2, and Windows Hello for Business)
62-
- How frequently authentication requirements are satisfied by token claims (where users are not interactively prompted to enter a password, enter an SMS OTP, and so on)
62+
- How frequently authentication requirements are satisfied by token claims (where users aren't interactively prompted to enter a password, enter an SMS OTP, and so on)
6363

6464
While viewing the sign-ins report, select the **Authentication Details** tab:
6565

@@ -71,7 +71,7 @@ While viewing the sign-ins report, select the **Authentication Details** tab:
7171
>[!IMPORTANT]
7272
>The **Authentication details** tab can initially show incomplete or inaccurate data, until log information is fully aggregated. Known examples include:
7373
>- A **satisfied by claim in the token** message is incorrectly displayed when sign-in events are initially logged.
74-
>- The **Primary authentication** row is not initially logged.
74+
>- The **Primary authentication** row isn't initially logged.
7575
7676
The following details are shown on the **Authentication Details** window for a sign-in event that show if the MFA request was satisfied or denied:
7777

@@ -103,8 +103,8 @@ The following details are shown on the **Authentication Details** window for a s
103103
* unable to send the mobile app notification to the device
104104
* unable to send the mobile app notification
105105
* user declined the authentication
106-
* user did not respond to mobile app notification
107-
* user does not have any verification methods registered
106+
* user didn't respond to mobile app notification
107+
* user doesn't have any verification methods registered
108108
* user entered incorrect code
109109
* user entered incorrect PIN
110110
* user hung up the phone call without succeeding the authentication
@@ -117,13 +117,13 @@ The following details are shown on the **Authentication Details** window for a s
117117

118118
First, ensure that you have the [MSOnline V1 PowerShell module](/powershell/azure/active-directory/overview) installed.
119119

120-
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD:
120+
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts can't authenticate against Azure AD:
121121

122122
```powershell
123123
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods -ne $null -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
124124
```
125125

126-
Identify users who have not registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD:
126+
Identify users who aren't registered for MFA by running the following PowerShell commands. This set of commands excludes disabled users since these accounts can't authenticate against Azure AD:
127127

128128
```powershell
129129
Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods.Count -eq 0 -and $_.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName
@@ -143,10 +143,23 @@ The following additional information and reports are available for MFA events, i
143143
| Report | Location | Description |
144144
|:--- |:--- |:--- |
145145
| Blocked User History | Azure AD > Security > MFA > Block/unblock users | Shows the history of requests to block or unblock users. |
146-
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, ADFS, and MFA Server. |
146+
| Usage for on-premises components | Azure AD > Security > MFA > Activity Report | Provides information on overall usage for MFA Server through the NPS extension, AD FS, and MFA Server. |
147147
| Bypassed User History | Azure AD > Security > MFA > One-time bypass | Provides a history of MFA Server requests to bypass MFA for a user. |
148148
| Server status | Azure AD > Security > MFA > Server status | Displays the status of MFA Servers associated with your account. |
149149

150+
Cloud MFA sign-in events from an on-premises AD FS adapter or NPS extension won't have all fields in the sign-in logs populated due to limited data returned by the on-premises component. You can identify these events by the resourceID _adfs_ or _radius_ in the event properties. They include:
151+
- resultSignature
152+
- appID
153+
- deviceDetail
154+
- conditionalAccessStatus
155+
- authenticationContext
156+
- isInteractive
157+
- tokenIssuerName
158+
- riskDetail, riskLevelAggregated,riskLevelDuringSignIn, riskState,riskEventTypes, riskEventTypes_v2
159+
- authenticationProtocol
160+
- incomingTokenType
161+
162+
Organizations that run the latest version of NPS extension or use Azure AD Connect Health will have location IP address in events.
150163

151164
## Next steps
152165

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@
88
- name: How-to guides
99
expanded: true
1010
items:
11-
- name: Trial Playbook - Microsoft Entra Permissions Management
12-
href: permissions-management-trial-playbook.md
11+
- name: Trial user guide - Microsoft Entra Permissions Management
12+
href: permissions-management-trial-user-guide.md
1313
- name: Onboard Permissions Management on the Azure AD tenant
1414
expanded: true
1515
items:

articles/active-directory/develop/app-resilience-continuous-access-evaluation.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -137,8 +137,8 @@ Your app would then use the claims challenge to acquire a new access token for t
137137
```javascript
138138
const tokenRequest = {
139139
claims: window.atob(claimsChallenge), // decode the base64 string
140-
scopes: ['User.Read']
141-
account: msalInstance.getActiveAccount();
140+
scopes: ['User.Read'],
141+
account: msalInstance.getActiveAccount()
142142
};
143143

144144
let tokenResponse;
@@ -173,8 +173,9 @@ You can test your application by signing in a user and then using the Azure port
173173

174174
## Code samples
175175

176-
- [React single-page application using MSAL React to sign-in users against Azure Active Directory](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/2-Authorization-I/1-call-graph)
177-
- [Enable your ASP.NET Core web app to sign in users and call Microsoft Graph with the Microsoft identity platform](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/2-WebApp-graph-user/2-1-Call-MSGraph)
176+
- [Enable your Angular single-page application to sign in users and call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-javascript-angular-tutorial/tree/main/2-Authorization-I/1-call-graph)
177+
- [Enable your React single-page application to sign in users and call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/2-Authorization-I/1-call-graph)
178+
- [Enable your ASP.NET Core web app to sign in users and call Microsoft Graph](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/2-WebApp-graph-user/2-1-Call-MSGraph)
178179
179180
## Next steps
180181

articles/active-directory/develop/claims-challenge.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -237,10 +237,14 @@ const checkIsClientCapableOfClaimsChallenge = (req, res, next) => {
237237

238238
---
239239

240+
## Code samples
241+
242+
- [Enable your Angular single-page application to sign in users and call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-javascript-angular-tutorial/tree/main/2-Authorization-I/1-call-graph)
243+
- [Enable your React single-page application to sign in users and call Microsoft Graph](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/2-Authorization-I/1-call-graph)
244+
- [Enable your ASP.NET Core web app to sign in users and call Microsoft Graph](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/2-WebApp-graph-user/2-1-Call-MSGraph)
245+
240246
## Next steps
241247

242248
- [Microsoft identity platform and OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md#request-an-authorization-code)
243249
- [How to use Continuous Access Evaluation enabled APIs in your applications](app-resilience-continuous-access-evaluation.md)
244250
- [Granular Conditional Access for sensitive data and actions](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/granular-conditional-access-for-sensitive-data-and-actions/ba-p/1751775)
245-
- [React single-page application using MSAL React to sign-in users against Azure Active Directory](https://github.com/Azure-Samples/ms-identity-javascript-react-tutorial/tree/main/2-Authorization-I/1-call-graph)
246-
- [Enable your ASP.NET Core web app to sign in users and call Microsoft Graph with the Microsoft identity platform](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/2-WebApp-graph-user/2-1-Call-MSGraph)

0 commit comments

Comments
 (0)