Skip to content

Commit b1815da

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into SM-Rest-SDK-Developers-Guide-CSharp-Add-Auth
2 parents fa14732 + 05b2185 commit b1815da

File tree

974 files changed

+11845
-5712
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

974 files changed

+11845
-5712
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5963,11 +5963,6 @@
59635963
"redirect_url": "/azure/reliability/cross-region-replication-azure",
59645964
"redirect_document_id": true
59655965
},
5966-
{
5967-
"source_path_from_root": "/articles/partner-solutions/index.md",
5968-
"redirect_url": "/azure/partner-solutions/overview",
5969-
"redirect_document_id": false
5970-
},
59715966
{
59725967
"source_path_from_root": "/articles/fxt-edge-filer/fxt-add-nodes.md",
59735968
"redirect_url": "/azure/fxt-edge-filer/add-nodes",
@@ -6358,6 +6353,11 @@
63586353
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63596354
"redirect_document_id": false
63606355
},
6356+
{
6357+
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-client.md",
6358+
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
6359+
"redirect_document_id": false
6360+
},
63616361
{
63626362
"source_path_from_root": "/articles/storage/common/storage-auth-abac-attributes.md",
63636363
"redirect_url": "/azure/storage/blobs/storage-auth-abac-attributes",

.whatsnew/.application-management.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
},
1818
"areas": [
1919
{
20-
"name": [ "."],
20+
"names": [ "."],
2121
"heading": "Azure Active Directory application management"
2222
}
2323
]

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To use MS Graph API, and interact with resources in your Azure AD B2C tenant, yo
3939
- [Update a user](/graph/api/user-update)
4040
- [Delete a user](/graph/api/user-delete)
4141

42-
## User phone number management (beta)
42+
## User phone number management
4343

4444
A phone number that can be used by a user to sign-in using [SMS or voice calls](sign-in-options.md#phone-sign-in), or [multifactor authentication](multi-factor-authentication.md). For more information, see [Azure AD authentication methods API](/graph/api/resources/phoneauthenticationmethod).
4545

@@ -54,9 +54,9 @@ Note, the [list](/graph/api/authentication-list-phonemethods) operation returns
5454
![Enable phone sign-in](./media/microsoft-graph-operations/enable-phone-sign-in.png)
5555

5656
> [!NOTE]
57-
> In the current beta version, this API works only if the phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
57+
> A correctly represented phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
5858
59-
## Self-service password reset email address (beta)
59+
## Self-service password reset email address
6060

6161
An email address that can be used by a [username sign-in account](sign-in-options.md#username-sign-in) to reset the password. For more information, see [Azure AD authentication methods API](/graph/api/resources/emailauthenticationmethod).
6262

@@ -66,7 +66,7 @@ An email address that can be used by a [username sign-in account](sign-in-option
6666
- [Update](/graph/api/emailauthenticationmethod-update)
6767
- [Delete](/graph/api/emailauthenticationmethod-delete)
6868

69-
## Software OATH token authentication method (beta)
69+
## Software OATH token authentication method
7070

7171
A software OATH token is a software-based number generator that uses the OATH time-based one-time password (TOTP) standard for multifactor authentication via an authenticator app. Use the Microsoft Graph API to manage a software OATH token registered to a user:
7272

@@ -78,13 +78,14 @@ An email address that can be used by a [username sign-in account](sign-in-option
7878

7979
Manage the [identity providers](add-identity-provider.md) available to your user flows in your Azure AD B2C tenant.
8080

81-
- [List identity providers registered in the Azure AD B2C tenant](/graph/api/identityprovider-list)
82-
- [Create an identity provider](/graph/api/identityprovider-post-identityproviders)
83-
- [Get an identity provider](/graph/api/identityprovider-get)
84-
- [Update identity provider](/graph/api/identityprovider-update)
85-
- [Delete an identity provider](/graph/api/identityprovider-delete)
81+
- [List identity providers available in the Azure AD B2C tenant](/graph/api/identityproviderbase-availableprovidertypes)
82+
- [List identity providers configured in the Azure AD B2C tenant](/graph/api/iidentitycontainer-list-identityproviders)
83+
- [Create an identity provider](/graph/api/identitycontainer-post-identityproviders)
84+
- [Get an identity provider](/graph/api/identityproviderbase-get)
85+
- [Update identity provider](/graph/api/identityproviderbase-update)
86+
- [Delete an identity provider](/graph/api/identityproviderbase-delete)
8687

87-
## User flow
88+
## User flow (beta)
8889

8990
Configure pre-built policies for sign-up, sign-in, combined sign-up and sign-in, password reset, and profile update.
9091

@@ -100,7 +101,7 @@ Choose a mechanism for letting users register via local accounts. Local accounts
100101
- [Get](/graph/api/b2cauthenticationmethodspolicy-get)
101102
- [Update](/graph/api/b2cauthenticationmethodspolicy-update)
102103

103-
## Custom policies
104+
## Custom policies (beta)
104105

105106
The following operations allow you to manage your Azure AD B2C Trust Framework policies, known as [custom policies](custom-policy-overview.md).
106107

@@ -110,7 +111,7 @@ The following operations allow you to manage your Azure AD B2C Trust Framework p
110111
- [Update or create trust framework policy.](/graph/api/trustframework-put-trustframeworkpolicy)
111112
- [Delete an existing trust framework policy](/graph/api/trustframeworkpolicy-delete)
112113

113-
## Policy keys
114+
## Policy keys (beta)
114115

115116
The Identity Experience Framework stores the secrets referenced in a custom policy to establish trust between components. These secrets can be symmetric or asymmetric keys/values. In the Azure portal, these entities are shown as **Policy keys**.
116117

@@ -169,15 +170,16 @@ For more information about accessing Azure AD B2C audit logs, see [Accessing Azu
169170

170171
## Conditional Access
171172

172-
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies?tabs=http)
173+
- [List the built-in templates for Conditional Access policy scenarios](/graph/api/conditionalaccessroot-list-templates)
174+
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies)
173175
- [Read properties and relationships of a Conditional Access policy](/graph/api/conditionalaccesspolicy-get)
174176
- [Create a new Conditional Access policy](/graph/api/resources/application)
175177
- [Update a Conditional Access policy](/graph/api/conditionalaccesspolicy-update)
176178
- [Delete a Conditional Access policy](/graph/api/conditionalaccesspolicy-delete)
177179

178180
## Retrieve or restore deleted users and applications
179181

180-
Deleted items can only be restored if they were deleted within the last 30 days.
182+
Deleted users and apps can only be restored if they were deleted within the last 30 days.
181183

182184
- [List deleted items](/graph/api/directory-deleteditems-list)
183185
- [Get a deleted item](/graph/api/directory-deleteditems-get)

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,9 @@ Applications and systems that support customization of the attribute list includ
120120
> [!NOTE]
121121
> Editing the list of supported attributes is only recommended for administrators who have customized the schema of their applications and systems, and have first-hand knowledge of how their custom attributes have been defined or if a source attribute is not automatically displayed in the Azure Portal UI. This sometimes requires familiarity with the APIs and developer tools provided by an application or system. The ability to edit the list of supported attributes is locked down by default, but customers can enable the capability by navigating to the following URL: https://portal.azure.com/?Microsoft_AAD_Connect_Provisioning_forceSchemaEditorEnabled=true . You can then navigate to your application to view the attribute list as described [above](#editing-the-list-of-supported-attributes).
122122
123+
> [!NOTE]
124+
> When a directory extension attribute in Azure AD does not show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx _acneCostCenter`, make sure you enter it in the same format as defined in the directory.
125+
123126
When editing the list of supported attributes, the following properties are provided:
124127

125128
- **Name** - The system name of the attribute, as defined in the target object's schema.

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,13 @@ At this point, the MIM Sync server is no longer needed.
4343

4444
## Import a connector configuration
4545

46-
1. Install the ECMA Connector host and provisioning agent on a Windows Server, using the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) articles.
46+
1. Install the ECMA Connector host and provisioning agent on a Windows Server, using the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#3-install-and-configure-the-azure-ad-connect-provisioning-agent) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) articles.
4747
1. Sign in to the Windows server as the account that the Azure AD ECMA Connector Host runs as.
4848
1. Change to the directory C:\Program Files\Microsoft ECMA2host\Service\ECMA. Ensure there are one or more DLLs already present in that directory. Those DLLs correspond to Microsoft-delivered connectors.
4949
1. Copy the MA DLL for your connector, and any of its prerequisite DLLs, to that same ECMA subdirectory of the Service directory.
5050
1. Change to the directory C:\Program Files\Microsoft ECMA2Host\Wizard. Run the program Microsoft.ECMA2Host.ConfigWizard.exe to set up the ECMA Connector Host configuration.
5151
1. A new window appears with a list of connectors. By default, no connectors will be present. Select **New connector**.
52-
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Create a connector" in either the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#create-a-generic-sql-connector) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#configure-a-generic-ldap-connector) articles.
52+
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Create a connector" in either the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#6-create-a-generic-sql-connector) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#configure-a-generic-ldap-connector) articles.
5353

5454
## Next steps
5555

articles/active-directory/app-proxy/application-proxy-configure-native-client-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,6 @@ After you edit the MSAL code with these parameters, your users can authenticate
112112

113113
## Next steps
114114

115-
For more information about the native application flow, see [Native apps in Azure Active Directory](../azuread-dev/native-app.md).
115+
For more information about the native application flow, see [mobile](../develop/authentication-flows-app-scenarios.md#mobile-app-that-calls-a-web-api-on-behalf-of-an-interactive-user) and [desktop](../develop/authentication-flows-app-scenarios.md#desktop-app-that-calls-a-web-api-on-behalf-of-a-signed-in-user) apps in Azure Active Directory.
116116

117117
Learn about setting up [Single sign-on to applications in Azure Active Directory](../manage-apps/sso-options.md#choosing-a-single-sign-on-method).

articles/active-directory/authentication/concept-certificate-based-authentication-smartcard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/05/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: vimrang
@@ -77,7 +77,7 @@ The Windows smart card sign-in works with the latest preview build of Windows 11
7777
7878
## Restrictions and caveats
7979

80-
- Azure AD CBA is supported on Windows Hybrid or Azure AD Joined.
80+
- Azure AD CBA is supported on Windows devices that are hybrid or Azure AD joined.
8181
- Users must be in a managed domain or using Staged Rollout and can't use a federated authentication model.
8282

8383
## Next steps

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Now we'll walk through each step:
6868
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png" alt-text="Screenshot of the certificate picker." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png":::
6969

7070
1. Azure AD verifies the certificate revocation list to make sure the certificate isn't revoked and is valid. Azure AD identifies the user by using the [username binding configured](how-to-certificate-based-authentication.md#step-4-configure-username-binding-policy) on the tenant to map the certificate field value to the user attribute value.
71-
1. If a unique user is found with a Conditional Access policy that requires multifactor authentication (MFA), and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
71+
1. If a unique user is found with a Conditional Access policy that requires multifactor authentication (MFA), and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If multifactor authentication is required but the certificate satisfies only a single factor, authentication will fail.
7272
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7373
1. If the user sign-in is successful, the user can access the application.
7474

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/23/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -61,7 +61,7 @@ Combined registration supports the authentication methods and actions in the fol
6161
| Email | Yes | Yes | Yes |
6262
| Security questions | Yes | No | Yes |
6363
| App passwords* | Yes | No | Yes |
64-
| FIDO2 security keys*| Yes | Yes | Yes |
64+
| FIDO2 security keys*| Yes | No | Yes |
6565

6666
> [!NOTE]
6767
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
@@ -93,7 +93,7 @@ For both modes, users who have previously registered a method that can be used f
9393

9494
### Interrupt mode
9595

96-
Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip the registration interruption and complete it at a later time.
96+
Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip (indefinitely) the registration interruption and complete it at a later time.
9797

9898
The following are sample scenarios where users might be prompted to register or refresh their security info:
9999

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/04/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -51,7 +51,7 @@ The following Azure AD password policy options are defined. Unless noted, you ca
5151
| Characters allowed |<ul><li>A – Z</li><li>a - z</li><li>0 – 9</li> <li>@ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ' , . ? / \` ~ " ( ) ; < ></li> <li>blank space</li></ul> |
5252
| Characters not allowed | Unicode characters. |
5353
| Password restrictions |<ul><li>A minimum of 8 characters and a maximum of 256 characters.</li><li>Requires three out of four of the following:<ul><li>Lowercase characters.</li><li>Uppercase characters.</li><li>Numbers (0-9).</li><li>Symbols (see the previous password restrictions).</li></ul></li></ul> |
54-
| Password expiry duration (Maximum password age) |<ul><li>Default value: **90** days.</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell.</li></ul> |
54+
| Password expiry duration (Maximum password age) |<ul><li>Default value: **90** days. If the tenant was created after 2021, it has no default expiration value. You can check current policy with [Get-MsolPasswordPolicy](/powershell/module/msonline/get-msolpasswordpolicy).</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell.</li></ul> |
5555
| Password expiry notification (When users are notified of password expiration) |<ul><li>Default value: **14** days (before password expires).</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet.</li></ul> |
5656
| Password expiry (Let passwords never expire) |<ul><li>Default value: **false** (indicates that password's have an expiration date).</li><li>The value can be configured for individual user accounts by using the `Set-MsolUser` cmdlet.</li></ul> |
5757
| Password change history | The last password *can't* be used again when the user changes a password. |

0 commit comments

Comments
 (0)