Skip to content

Commit b132f58

Browse files
authored
Merge pull request #213111 from MicrosoftDocs/main
9/29 PM Publish
2 parents 818f176 + bb2219b commit b132f58

File tree

113 files changed

+2848
-1625
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+2848
-1625
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10895,6 +10895,11 @@
1089510895
"source_path_from_root": "/articles/active-directory/fundamentals/support-help-options.md",
1089610896
"redirect_url": "/azure/active-directory/fundamentals/how-to-get-support",
1089710897
"redirect_document_id": false
10898+
},
10899+
{
10900+
"source_path_from_root": "/articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md",
10901+
"redirect_url": "/azure/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-user-guide",
10902+
"redirect_document_id": false
1089810903
}
1089910904
]
1090010905
}

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,25 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-dotnet-legacy.md",
5+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-java-legacy.md",
10+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-java",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-python-legacy.md",
15+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-python",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-xamarin.md",
20+
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-dotnet",
21+
"redirect_document_id": false
22+
},
323
{
424
"source_path": "articles/site-recovery/deploy-vmware-azure-replication-appliance-preview.md",
525
"redirect_url": "/azure/site-recovery/deploy-vmware-azure-replication-appliance-modernized",

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,9 @@ The two-gate policy requires two pieces of authentication data, such as an email
8787
* Power BI service administrator
8888
* Privileged Authentication administrator
8989
* Privileged role administrator
90-
* SharePoint administrator
9190
* Security administrator
9291
* Service support administrator
92+
* SharePoint administrator
9393
* Skype for Business administrator
9494
* User administrator
9595

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Smart lockout tracks the last three bad password hashes to avoid incrementing th
2828
> [!NOTE]
2929
> Hash tracking functionality isn't available for customers with pass-through authentication enabled as authentication happens on-premises not in the cloud.
3030
31-
Federated deployments that use AD FS 2016 and AF FS 2019 can enable similar benefits using [AD FS Extranet Lockout and Extranet Smart Lockout](/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout-protection).
31+
Federated deployments that use AD FS 2016 and AD FS 2019 can enable similar benefits using [AD FS Extranet Lockout and Extranet Smart Lockout](/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout-protection).
3232

3333
Smart lockout is always on, for all Azure AD customers, with these default settings that offer the right mix of security and usability. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users.
3434

articles/active-directory/authentication/tutorial-enable-sspr-writeback.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,12 @@ To set up the appropriate permissions for password writeback to occur, complete
8383

8484
[ ![Set the appropriate permissions in Active Users and Computers for the account that is used by Azure AD Connect](media/tutorial-enable-sspr-writeback/set-ad-ds-permissions-cropped.png) ](media/tutorial-enable-sspr-writeback/set-ad-ds-permissions.png#lightbox)
8585

86+
1. When ready, select **Apply / OK** to apply the changes.
87+
1. From the **Permissions** tab, select **Add**.
88+
1. For **Principal**, select the account that permissions should be applied to (the account used by Azure AD Connect).
89+
1. In the **Applies to** drop-down list, select **This object and all descendant objects**
90+
1. Under *Permissions*, select the box for the following option:
91+
* **Unexpire Password**
8692
1. When ready, select **Apply / OK** to apply the changes and exit any open dialog boxes.
8793

8894
When you update permissions, it might take up to an hour or more for these permissions to replicate to all the objects in your directory.

articles/active-directory/authentication/tutorial-enable-sspr.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ To finish this tutorial, you need the following resources and privileges:
4040
* A working Azure AD tenant with at least an Azure AD free or trial license enabled. In the Free tier, SSPR only works for cloud users in Azure AD. Password change is supported in the Free tier, but password reset is not.
4141
* For later tutorials in this series, you'll need an Azure AD Premium P1 or trial license for on-premises password writeback.
4242
* If needed, [create an Azure account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
43-
* An account with *Global Administrator* privileges.
43+
* An account with *Global Administrator* or *Authentication Policy Administrator* privileges.
4444
* A non-administrator user with a password you know, like *testuser*. You'll test the end-user SSPR experience using this account in this tutorial.
4545
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../fundamentals/add-users-azure-active-directory.md).
4646
* A group that the non-administrator user is a member of, likes *SSPR-Test-Group*. You'll enable SSPR for this group in this tutorial.
@@ -55,7 +55,7 @@ Azure AD lets you enable SSPR for *None*, *Selected*, or *All* users. This granu
5555
5656
In this tutorial, set up SSPR for a set of users in a test group. Use the *SSPR-Test-Group* and provide your own Azure AD group as needed:
5757

58-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
58+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* or *authentication policy administrator* permissions.
5959
1. Search for and select **Azure Active Directory**, then select **Password reset** from the menu on the left side.
6060
1. From the **Properties** page, under the option *Self service password reset enabled*, choose **Selected**.
6161
1. If your group isn't visible, choose **No groups selected**, browse for and select your Azure AD group, like *SSPR-Test-Group*, and then choose *Select*.

0 commit comments

Comments
 (0)