Skip to content

Commit af6f58a

Browse files
authored
Merge branch 'master' into patch-1
2 parents f41d4ff + 6a6fb4d commit af6f58a

File tree

351 files changed

+2757
-1429
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

351 files changed

+2757
-1429
lines changed

.openpublishing.redirection.json

Lines changed: 27 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -658,12 +658,12 @@
658658
"redirect_url": "/azure/frontdoor/rules-match-conditions",
659659
"redirect_document_id": false
660660
},
661-
{
661+
{
662662
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
663663
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
664664
"redirect_document_id": false
665665
},
666-
{
666+
{
667667
"source_path_from_root": "/articles/frontdoor/standard-premium/edge-locations.md",
668668
"redirect_url": "/azure/frontdoor/edge-locations-by-region",
669669
"redirect_document_id": false
@@ -7679,8 +7679,8 @@
76797679
"redirect_document_id": false
76807680
},
76817681

7682-
7683-
7682+
7683+
76847684
{
76857685
"source_path_from_root": "/articles/cognitive-services/text-analytics/how-tos/text-analytics-how-to-use-container-instances.md",
76867686
"redirect_url": "/azure/cognitive-services/containers/azure-container-instance-recipe",
@@ -14387,6 +14387,11 @@
1438714387
"redirect_url": "/azure/data-explorer/",
1438814388
"redirect_document_id": false
1438914389
},
14390+
{
14391+
"source_path_from_root": "/articles/cognitive-services/QnAMaker/Tutorials/migrate-knowledge-base.md",
14392+
"redirect_url": "/azure/cognitive-services/QnAMaker/Tutorials/export-knowledge-base",
14393+
"redirect_document_id": false
14394+
},
1439014395
{
1439114396
"source_path_from_root": "/articles/cognitive-services/QnAMaker/reference-data-guidelines.md",
1439214397
"redirect_url": "/azure/cognitive-services/QnAMaker/",
@@ -16572,6 +16577,11 @@
1657216577
"redirect_url": "/azure/devtest-labs/use-paas-services",
1657316578
"redirect_document_id": true
1657416579
},
16580+
{
16581+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-configure-use-public-environments.md",
16582+
"redirect_url": "/azure/devtest-labs/devtest-lab-create-environment-from-arm",
16583+
"redirect_document_id": false
16584+
},
1657516585
{
1657616586
"source_path_from_root": "/articles/dns/dns-getstarted-cli-nodejs.md",
1657716587
"redirect_url": "/azure/dns/dns-getstarted-cli",
@@ -21002,7 +21012,7 @@
2100221012
"redirect_url": "/azure/machine-learning/reference-yaml-job-pipeline",
2100321013
"redirect_document_id": false
2100421014
},
21005-
21015+
2100621016
{
2100721017
"source_path_from_root": "/articles/cognitive-services/QnAMaker/reference-precise-answering.md",
2100821018
"redirect_url": "/azure/cognitive-services/language/custom-question-answering/concepts/precise-answering",
@@ -43963,7 +43973,7 @@
4396343973
"redirect_url": "/azure/virtual-network/create-public-ip-prefix-portal",
4396443974
"redirect_document_id": true
4396543975
},
43966-
{
43976+
{
4396743977
"source_path_from_root": "/articles/machine-learning/algorithm-module-reference/add-columns.md",
4396843978
"redirect_url": "/azure/machine-learning/component-reference/add-columns",
4396943979
"redirect_document_id": true
@@ -44488,11 +44498,11 @@
4448844498
"redirect_url": "/azure/communication-services/concepts/telephony/port-phone-number",
4448944499
"redirect_document_id": false
4449044500
},
44491-
{
44492-
"source_path_from_root": "/articles/communication-services/quickstarts/voice-video-calling/pstn-call.md",
44493-
"redirect_url": "/azure/communication-services/quickstarts/telephony/pstn-call",
44494-
"redirect_document_id": false
44495-
},
44501+
{
44502+
"source_path_from_root": "/articles/communication-services/quickstarts/voice-video-calling/pstn-call.md",
44503+
"redirect_url": "/azure/communication-services/quickstarts/telephony/pstn-call",
44504+
"redirect_document_id": false
44505+
},
4449644506
{
4449744507
"source_path_from_root": "/articles/communication-services/concepts/telephony-sms/concepts.md",
4449844508
"redirect_url": "/azure/communication-services/concepts/sms/concepts",
@@ -45119,7 +45129,7 @@
4511945129
"redirect_document_id": false
4512045130
},
4512145131
{
45122-
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/try-sdk-rest-api.md",
45132+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/try-sdk-rest-api.md",
4512345133
"redirect_url": "/azure/applied-ai-services/form-recognizer/how-to-guides/try-sdk-rest-api",
4512445134
"redirect_document_id": false
4512545135
},
@@ -45147,6 +45157,11 @@
4514745157
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
4514845158
"redirect_url": "/azure/orbital/overview",
4514945159
"redirect_document_id": false
45160+
},
45161+
{
45162+
"source_path_from_root": "/articles/azure/sentinel/connect-windows-virtual-desktop.md",
45163+
"redirect_url": "/azure/sentinel/connect-azure-virtual-desktop",
45164+
"redirect_document_id": true
4515045165
}
4515145166
]
4515245167
}

articles/active-directory-b2c/manage-user-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,11 +135,11 @@ When you develop your application, you ordinarily capture users' acceptance of t
135135

136136
The following steps describe how you can manage terms of use:
137137

138-
1. Record the acceptance of the terms of use and the date of acceptance by using the Graph API and extended attributes. You can do so by using both built-in and custom user flows. We recommend that you create and use the **extension_termsOfUseConsentDateTime** and **extension_termsOfUseConsentVersion** attributes.
138+
1. Record the acceptance of the terms of use and the date of acceptance by using the Graph API and extended attributes. You can do so by using both built-in user flows and custom policies. We recommend that you create and use the **extension_termsOfUseConsentDateTime** and **extension_termsOfUseConsentVersion** attributes.
139139

140-
2. Create a required check box labeled "Accept Terms of Use," and record the result during sign-up. You can do so by using both built-in and custom user flows.
140+
2. Create a required check box labeled "Accept Terms of Use," and record the result during sign-up. You can do so by using both built-in user flows and custom policies.
141141

142-
3. Azure AD B2C stores the terms of use agreement and the user's acceptance. You can use the Graph API to query for the status of any user by reading the extension attribute that's used to record the response (for example, read **termsOfUseTestUpdateDateTime**). You can do so by using both built-in and custom user flows.
142+
3. Azure AD B2C stores the terms of use agreement and the user's acceptance. You can use the Graph API to query for the status of any user by reading the extension attribute that's used to record the response (for example, read **termsOfUseTestUpdateDateTime**). You can do so by using both built-in user flows and custom policies.
143143

144144
4. Require acceptance of updated terms of use by comparing the date of acceptance to the date of the latest version of the terms of use. You can compare the dates only by using a custom user flow. Use the extended attribute **extension_termsOfUseConsentDateTime**, and compare the value to the claim of **termsOfUseTextUpdateDateTime**. If the acceptance is old, force a new acceptance by displaying a self-asserted screen. Otherwise, block access by using policy logic.
145145

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Data residency and customer data for Azure AD multifactor authentication
2020

21-
Azure Active Directory (Azure AD) stores customer data in a geographical location based on the address an organization provides when subscribing to a Microsoft online service such as Microsoft 365 or Azure. For information on where your customer data is stored, see [Where is your data located?](https://www.microsoft.com/trustcenter/privacy/where-your-data-is-located) in the Microsoft Trust Center.
21+
Azure Active Directory (Azure AD) stores customer data in a geographical location based on the address an organization provides when subscribing to a Microsoft online service such as Microsoft 365 or Azure. For information on where your customer data is stored, see [Where your data is located](https://www.microsoft.com/trust-center/privacy/data-location) in the Microsoft Trust Center.
2222

2323
Cloud-based Azure AD multifactor authentication and MFA Server process and store personal data and organizational data. This article outlines what and where data is stored.
2424

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,5 +111,6 @@ If you don't want to enable Azure AD Multi-Factor Authentication for all users,
111111

112112
* For more information on costs, see [Azure AD pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
113113
* [What is Conditional Access](../conditional-access/overview.md)
114+
* [What is Identity Protection?](../identity-protection/overview-identity-protection.md)
114115
* MFA can also be [enabled on a per-user basis](howto-mfa-userstates.md)
115116

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/20/2021
9+
ms.date: 01/12/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -27,7 +27,7 @@ The NPS extension acts as an adapter between RADIUS and cloud-based Azure AD Mul
2727
When you use the NPS extension for Azure AD Multi-Factor Authentication, the authentication flow includes the following components:
2828

2929
1. **NAS/VPN Server** receives requests from VPN clients and converts them into RADIUS requests to NPS servers.
30-
2. **NPS Server** connects to Active Directory Domain Services (AD DS) to perform the primary authentication for the RADIUS requests and, upon success, passes the request to any installed extensions.  
30+
2. **NPS Server** connects to Active Directory Domain Services (AD DS) to perform the primary authentication for the RADIUS requests and, upon success, passes the request to any installed extensions.
3131
3. **NPS Extension** triggers a request to Azure AD Multi-Factor Authentication for the secondary authentication. Once the extension receives the response, and if the MFA challenge succeeds, it completes the authentication request by providing the NPS server with security tokens that include an MFA claim, issued by Azure STS.
3232
>[!NOTE]
3333
>Users must have access to their default authentication method to complete the MFA requirement. They cannot choose an alternative method. Their default authentication method will be used even if it's been disabled in the tenant authentication methods and MFA policies.
@@ -160,6 +160,9 @@ There are two factors that affect which authentication methods are available wit
160160
> When you deploy the NPS extension, use these factors to evaluate which methods are available for your users. If your RADIUS client supports PAP, but the client UX doesn't have input fields for a verification code, then phone call and mobile app notification are the two supported options.
161161
>
162162
> Also, regardless of the authentication protocol that's used (PAP, CHAP, or EAP), if your MFA method is text-based (SMS, mobile app verification code, or OATH hardware token) and requires the user to enter a code or text in the VPN client UI input field, the authentication might succeed. *But* any RADIUS attributes that are configured in the Network Access Policy are *not* forwarded to the RADIUS client (the Network Access Device, like the VPN gateway). As a result, the VPN client might have more access than you want it to have, or less access or no access.
163+
>
164+
> As a workaround, you can run the [CrpUsernameStuffing script](https://github.com/OneMoreNate/CrpUsernameStuffing) to forward RADIUS attributes that are configured in the Network Access Policy and allow MFA when the user's authentication method requires the use of a One-Time Passcode (OTP), such as SMS, a Microsoft Authenticator passcode, or a hardware FOB.
165+
163166

164167
* The input methods that the client application (VPN, Netscaler server, or other) can handle. For example, does the VPN client have some means to allow the user to type in a verification code from a text or mobile app?
165168

articles/active-directory/cloud-sync/concept-how-it-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.collection: M365-identity-device-management
2121

2222
Cloud sync is built on top of the Azure AD services and has 2 key components:
2323

24-
- **Provisioning agent**: The Azure AD Connect cloud provisioning agent is the same agent as Workday inbound and built on the same server-side technology as app proxy and Pass Through Authentication. It requires and outbound connection only and agents are auto-updated.
24+
- **Provisioning agent**: The Azure AD Connect cloud provisioning agent is the same agent as Workday inbound and built on the same server-side technology as app proxy and Pass Through Authentication. It requires an outbound connection only and agents are auto-updated.
2525
- **Provisioning service**: Same provisioning service as outbound provisioning and Workday inbound provisioning which uses a scheduler-based model. In case of cloud sync, the changes are provisioned every 2 mins.
2626

2727

articles/active-directory/conditional-access/concept-conditional-access-conditions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 10/22/2021
9+
ms.date: 01/11/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -196,8 +196,8 @@ The device state condition can be used to exclude devices that are hybrid Azure
196196
For example, *All users* accessing the *Microsoft Azure Management* cloud app including **All device state** excluding **Device Hybrid Azure AD joined** and **Device marked as compliant** and for *Access controls*, **Block**.
197197
- This example would create a policy that only allows access to Microsoft Azure Management from devices that are either hybrid Azure AD joined or devices marked as compliant.
198198

199-
The above scenario, can be configured using *All users* accessing the *Microsoft Azure Management* cloud app excluding **Filter for devices** condition with the following rule **device.trustType -ne "ServerAD" -or device.isCompliant -ne True** and for *Access controls*, **Block**.
200-
- This example would create a policy that only allows access to Microsoft Azure Management from devices that are either hybrid Azure AD joined or devices marked as compliant.
199+
The above scenario, can be configured using *All users* accessing the *Microsoft Azure Management* cloud app with **Filter for devices** condition in include mode using the following rule **device.trustType -ne "ServerAD" -or device.isCompliant -ne True** and for *Access controls*, **Block**.
200+
- This example would create a policy that blocks access to Microsoft Azure Management cloud app from unmanaged or non-compliant devices.
201201

202202
> [!IMPORTANT]
203203
> Device state and filters for devices cannot be used together in Conditional Access policy. Filters for devices provides more granular targeting including support for targeting device state information through the `trustType` and `isCompliant` property.

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Exchange Online, SharePoint Online, Teams, and MS Graph can synchronize key Cond
5959
This process enables the scenario where users lose access to organizational files, email, calendar, or tasks from Microsoft 365 client apps or SharePoint Online immediately after network location changes.
6060

6161
> [!NOTE]
62-
> Not all app and resource provider combination are supported. See table below. Office refers to Word, Excel, and PowerPoint.
62+
> Not all client app and resource provider combinations are supported. See table below. The first column of this table refers to web applications launched via web browser (i.e. PowerPoint launched in web browser) while the remaining four columns refer to native applications running on each platform described. Additionally, references to "Office" encompass Word, Excel, and PowerPoint.
6363
6464
| | Outlook Web | Outlook Win32 | Outlook iOS | Outlook Android | Outlook Mac |
6565
| :--- | :---: | :---: | :---: | :---: | :---: |

0 commit comments

Comments
 (0)