Skip to content

Commit b42b0f6

Browse files
committed
2 parents ecb39f6 + 0a634cb commit b42b0f6

File tree

398 files changed

+4036
-2164
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

398 files changed

+4036
-2164
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -287,19 +287,19 @@
287287
{
288288
"path_to_root": "azure-search-javascript-samples",
289289
"url": "https://github.com/Azure-Samples/azure-search-javascript-samples",
290-
"branch": "master",
290+
"branch": "main",
291291
"branch_mapping": {}
292292
},
293293
{
294294
"path_to_root": "azure-search-dotnet-samples",
295295
"url": "https://github.com/Azure-Samples/azure-search-dotnet-samples",
296-
"branch": "master",
296+
"branch": "main",
297297
"branch_mapping": {}
298298
},
299299
{
300300
"path_to_root": "azure-search-python-samples",
301301
"url": "https://github.com/Azure-Samples/azure-search-python-samples",
302-
"branch": "master",
302+
"branch": "main",
303303
"branch_mapping": {}
304304
},
305305
{
@@ -986,7 +986,6 @@
986986
".openpublishing.redirection.azure-percept.json",
987987
".openpublishing.redirection.azure-productivity.json",
988988
".openpublishing.redirection.azure-australia.json",
989-
".openpublishing.redirection.aks.json",
990989
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
991990
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
992991
"articles/azure-relay/.openpublishing.redirection.relay.json",

.openpublishing.redirection.active-directory.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10831,11 +10831,6 @@
1083110831
"redirect_url": "/azure/active-directory/manage-apps/tutorial-manage-certificates-for-federated-single-sign-on",
1083210832
"redirect_document_id": false
1083310833
},
10834-
{
10835-
"source_path": "articles/active-directory/manage-apps/howto-enforce-signed-saml-authentication.md",
10836-
"redirect_url": "/azure/active-directory/manage-apps/howto-saml-token-encryption",
10837-
"redirect_document_id": true
10838-
},
1083910834
{
1084010835
"source_path": "articles/active-directory/manage-apps/recover-deleted-apps-faq.md",
1084110836
"redirect_url": "/azure/active-directory/manage-apps/delete-recover-faq",

.openpublishing.redirection.aks.json

Lines changed: 0 additions & 9 deletions
This file was deleted.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23123,6 +23123,11 @@
2312323123
"redirect_url": "/azure/storage/files/storage-files-quick-create-use-windows",
2312423124
"redirect_document_id": false
2312523125
},
23126+
{
23127+
"source_path_from_root": "/articles/virtual-machines/virtual-machines-windows-sizes.md",
23128+
"redirect_url": "/azure/virtual-machines/acu",
23129+
"redirect_document_id": true
23130+
},
2312623131
{
2312723132
"source_path_from_root": "/articles/storage/storage-file-how-to-create-file-share.md",
2312823133
"redirect_url": "/azure/storage/files/storage-how-to-create-file-share",

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/29/2022
11+
ms.date: 09/05/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -181,7 +181,7 @@ Authorization: Bearer eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6Ik5HVEZ2ZEstZn
181181
Access tokens and ID tokens are short-lived. After they expire, you must refresh them to continue to access resources. When you refresh the access token, Azure AD B2C returns a new token. The refreshed access token will have updated `nbf` (not before), `iat` (issued at), and `exp` (expiration) claim values. All other claim values will be the same as the originally issued access token.
182182

183183

184-
To refresh the toke, submit another POST request to the `/token` endpoint. This time, provide the `refresh_token` instead of the `code`:
184+
To refresh the token, submit another POST request to the `/token` endpoint. This time, provide the `refresh_token` instead of the `code`:
185185

186186
```http
187187
POST https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/{policy}/oauth2/v2.0/token HTTP/1.1

articles/active-directory-domain-services/alert-service-principal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 07/09/2020
13+
ms.date: 09/04/2022
1414
ms.author: justinha
1515

1616
---
@@ -34,7 +34,7 @@ To check which service principal is missing and must be recreated, complete the
3434

3535
1. In the Azure portal, select **Azure Active Directory** from the left-hand navigation menu.
3636
1. Select **Enterprise applications**. Choose *All applications* from the **Application Type** drop-down menu, then select **Apply**.
37-
1. Search for each of the following application IDs. If no existing application is found, follow the *Resolution* steps to create the service principal or re-register the namespace.
37+
1. Search for each of the following application IDs. For Azure Global, search for AppId value *2565bd9d-da50-47d4-8b85-4c97f669dc36*. For other Azure clouds, search for AppId value *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*. If no existing application is found, follow the *Resolution* steps to create the service principal or re-register the namespace.
3838

3939
| Application ID | Resolution |
4040
| :--- | :--- |
@@ -45,7 +45,7 @@ To check which service principal is missing and must be recreated, complete the
4545

4646
### Recreate a missing Service Principal
4747

48-
If application ID *2565bd9d-da50-47d4-8b85-4c97f669dc36* is missing from your Azure AD directory, use Azure AD PowerShell to complete the following steps. For more information, see [Azure AD PowerShell](/powershell/azure/active-directory/install-adv2).
48+
If application ID *2565bd9d-da50-47d4-8b85-4c97f669dc36* is missing from your Azure AD directory in Azure Global, use Azure AD PowerShell to complete the following steps. For other Azure clouds, use AppId value *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*. For more information, see [Azure AD PowerShell](/powershell/azure/active-directory/install-adv2).
4949

5050
1. If needed, install the Azure AD PowerShell module and import it as follows:
5151

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,8 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
196196
* Microsoft Azure AD makes requests to fetch a random user and group to ensure that the endpoint and the credentials are valid. It's also done as a part of the **Test Connection** flow in the [Azure portal](https://portal.azure.com).
197197
* Support HTTPS on your SCIM endpoint.
198198
* Custom complex and multivalued attributes are supported but Azure AD doesn't have many complex data structures to pull data from in these cases. Simple paired name/value type complex attributes can be mapped to easily, but flowing data to complex attributes with three or more subattributes aren't well supported at this time.
199-
* The "type" subattribute values of multivalued complex attributes must be unique. For example, there can't be two different email addresses with the "work" subtype.
199+
* The "type" subattribute values of multivalued complex attributes must be unique. For example, there can't be two different email addresses with the "work" subtype.
200+
* The header for all the responses should be of content-Type: application/scim+json
200201

201202
### Retrieving Resources:
202203

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: contperf-fy20q4
2121

2222
Microsoft recommends passwordless authentication methods such as Windows Hello, FIDO2 security keys, and the Microsoft Authenticator app because they provide the most secure sign-in experience. Although a user can sign-in using other common methods such as a username and password, passwords should be replaced with more secure authentication methods.
2323

24-
![Table of the strengths and preferred authentication methods in Azure AD](media/concept-authentication-methods/authentication-methods.png)
24+
:::image type="content" border="true" source="media/concept-authentication-methods/authentication-methods.png" alt-text="Illustration of the strengths and preferred authentication methods in Azure AD." :::
2525

2626
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to an SMS or phone call.
2727

@@ -40,6 +40,7 @@ The following table outlines the security considerations for the available authe
4040
| Windows Hello for Business | High | High | High |
4141
| Microsoft Authenticator app | High | High | High |
4242
| FIDO2 security key | High | High | High |
43+
| Certificate-based authentication (preview)| High | High | High |
4344
| OATH hardware tokens (preview) | Medium | Medium | High |
4445
| OATH software tokens | Medium | Medium | High |
4546
| SMS | Medium | High | Medium |
@@ -65,13 +66,14 @@ The following table outlines when an authentication method can be used during a
6566
| Windows Hello for Business | Yes | MFA\* |
6667
| Microsoft Authenticator app | Yes | MFA and SSPR |
6768
| FIDO2 security key | Yes | MFA |
69+
| Certificate-based authentication (preview) | Yes | MFA and SSPR |
6870
| OATH hardware tokens (preview) | No | MFA and SSPR |
6971
| OATH software tokens | No | MFA and SSPR |
7072
| SMS | Yes | MFA and SSPR |
7173
| Voice call | No | MFA and SSPR |
7274
| Password | Yes | |
7375

74-
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work sucessfully.
76+
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work successfully.
7577
7678
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
7779

@@ -80,6 +82,7 @@ To learn more about how each authentication method works, see the following sepa
8082
* [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
8183
* [Microsoft Authenticator app](concept-authentication-authenticator-app.md)
8284
* [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
85+
* [Certificate-based authentication](concept-certificate-based-authentication.md)
8386
* [OATH hardware tokens (preview)](concept-authentication-oath-tokens.md#oath-hardware-tokens-preview)
8487
* [OATH software tokens](concept-authentication-oath-tokens.md#oath-software-tokens)
8588
* [SMS sign-in](howto-authentication-sms-signin.md) and [verification](concept-authentication-phone-options.md#mobile-phone-verification)
-507 Bytes
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@
88
- name: How-to guides
99
expanded: true
1010
items:
11+
- name: Trial Playbook - Microsoft Entra Permissions Management
12+
href: permissions-management-trial-playbook.md
1113
- name: Onboard Permissions Management on the Azure AD tenant
1214
expanded: true
1315
items:

0 commit comments

Comments
 (0)