Skip to content

Commit b5d3a17

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into freshness48
2 parents fa093bb + 403adee commit b5d3a17

File tree

1,739 files changed

+17691
-14128
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,739 files changed

+17691
-14128
lines changed

.openpublishing.redirection.json

Lines changed: 398 additions & 322 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -273,10 +273,11 @@ Inspect the `B2CGraphClient.SendGraphPatchRequest()` method for details on how t
273273

274274
### Search users
275275

276-
You can search for users in your B2C tenant in two ways:
276+
You can search for users in your B2C tenant in the following ways:
277277

278278
* Reference the user's **object ID**.
279279
* Reference their sign-in identifer, the `signInNames` property.
280+
* Reference any of the valid OData parameters. For example, 'givenName', 'surname', 'displayName' etc.
280281

281282
Run one of the following commands to search for a user:
282283

@@ -290,6 +291,9 @@ For example:
290291
```cmd
291292
B2C Get-User 2bcf1067-90b6-4253-9991-7f16449c2d91
292293
B2C Get-User $filter=signInNames/any(x:x/value%20eq%20%27consumer@fabrikam.com%27)
294+
B2C get-user $filter=givenName%20eq%20%27John%27
295+
B2C get-user $filter=surname%20eq%20%27Doe%27
296+
B2C get-user $filter=displayName%20eq%20%27John%20Doe%27
293297
```
294298

295299
### Delete users

articles/active-directory-domain-services/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The service itself doesn't directly support this scenario. Your managed domain i
5858
Yes. For more information, see [how to enable Azure AD Domain Services using PowerShell](powershell-create-instance.md).
5959

6060
### Can I enable Azure AD Domain Services using a Resource Manager Template?
61-
No, it's not currently possible to enable Azure AD Domain Services using a template. For a scripted approach, see [how to enable Azure AD Domain Services using PowerShell](powershell-create-instance.md).
61+
Yes, you can create an Azure AD Domain Services managed domain using a Resource Manager template. A service principal and Azure AD group for administration must be created using the Azure portal or Azure PowerShell before the template is deployed. When you create an Azure AD Domain Services managed domain in the Azure portal, there's an option to export the template for use with additional deployments. There's also an [example template in the GitHub templates sample repo](https://github.com/Azure/azure-quickstart-templates/tree/master/101-AAD-DomainServices).
6262

6363
### Can I add domain controllers to an Azure AD Domain Services managed domain?
6464
No. The domain provided by Azure AD Domain Services is a managed domain. You don't need to provision, configure, or otherwise manage domain controllers for this domain. These management activities are provided as a service by Microsoft. Therefore, you can't add additional domain controllers (read-write or read-only) for the managed domain.

articles/active-directory/authentication/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -139,8 +139,6 @@
139139
href: howto-authentication-passwordless-security-key.md
140140
- name: Passwordless Windows 10
141141
href: howto-authentication-passwordless-security-key-windows.md
142-
- name: Passwordless on-premises
143-
href: howto-authentication-passwordless-security-key-on-premises.md
144142
- name: Passwordless phone sign-in
145143
href: howto-authentication-passwordless-phone.md
146144
- name: Windows Hello for Business

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The following providers offer FIDO2 security keys of different form factors that
7272
| Feitian | [https://www.ftsafe.com/about/Contact_Us](https://www.ftsafe.com/about/Contact_Us) |
7373
| HID | [https://www.hidglobal.com/contact-us](https://www.hidglobal.com/contact-us) |
7474
| Ensurity | [https://www.ensurity.com/contact](https://www.ensurity.com/contact) |
75-
| eWBM | [https://www.ewbm.com/page/sub1_5](https://www.ewbm.com/page/sub1_5) |
75+
| eWBM | [https://www.ewbm.com/support](https://www.ewbm.com/support) |
7676
| AuthenTrend | [https://authentrend.com/about-us/#pg-35-3](https://authentrend.com/about-us/#pg-35-3) |
7777

7878
> [!NOTE]

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To target specific device groups to enable the credential provider, use the foll
8585

8686
### Enable with a provisioning package
8787

88-
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/store/apps/9nblggh4tx22).
88+
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/en-us/p/windows-configuration-designer/9nblggh4tx22).
8989

9090
1. Launch the Windows Configuration Designer.
9191
1. Select **File** > **New project**.

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
This article helps you to manage Multi-Factor Authentication settings in the Azure portal. It covers various topics that help you to get the most out of Azure Multi-Factor Authentication. Not all of the features are available in every version of Azure Multi-Factor Authentication.
2121

22-
You can access settings related to Azure Multi-Factor Authentication from the Azure portal by browsing to **Azure Active Directory** > **MFA**.
22+
You can access settings related to Azure Multi-Factor Authentication from the Azure portal by browsing to **Azure Active Directory** > **Security** > **MFA**.
2323

2424
![Azure portal - Azure AD Multi-Factor Authentication settings](./media/howto-mfa-mfasettings/multi-factor-authentication-settings-portal.png)
2525

@@ -59,15 +59,15 @@ Use the _block and unblock users_ feature to prevent users from receiving authen
5959
### Block a user
6060

6161
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
62-
2. Browse to **Azure Active Directory** > **MFA** > **Block/unblock users**.
62+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Block/unblock users**.
6363
3. Select **Add** to block a user.
6464
4. Select the **Replication Group**. Enter the username for the blocked user as **username\@domain.com**. Enter a comment in the **Reason** field.
6565
5. Select **Add** to finish blocking the user.
6666

6767
### Unblock a user
6868

6969
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
70-
2. Browse to **Azure Active Directory** > **MFA** > **Block/unblock users**.
70+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Block/unblock users**.
7171
3. Select **Unblock** in the **Action** column next to the user to unblock.
7272
4. Enter a comment in the **Reason for unblocking** field.
7373
5. Select **Unblock** to finish unblocking the user.
@@ -79,7 +79,7 @@ Configure the _fraud alert_ feature so that your users can report fraudulent att
7979
### Turn on fraud alerts
8080

8181
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
82-
2. Browse to **Azure Active Directory** > **MFA** > **Fraud alert**.
82+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Fraud alert**.
8383
3. Set the **Allow users to submit fraud alerts** setting to **On**.
8484
4. Select **Save**.
8585

@@ -121,7 +121,7 @@ You can use your own recordings or greetings for two-step verification with the
121121
Before you begin, be aware of the following restrictions:
122122

123123
* The supported file formats are .wav and .mp3.
124-
* The file size limit is 5 MB.
124+
* The file size limit is 1 MB.
125125
* Authentication messages should be shorter than 20 seconds. Messages that are longer than 20 seconds can cause the verification to fail. The user might not respond before the message finishes and the verification times out.
126126

127127
### Custom message language behavior
@@ -142,7 +142,7 @@ For example, if there is only one custom message, with a language of German:
142142
### Set up a custom message
143143

144144
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
145-
1. Browse to **Azure Active Directory** > **MFA** > **Phone call settings**.
145+
1. Browse to **Azure Active Directory** > **Security** > **MFA** > **Phone call settings**.
146146
1. Select **Add greeting**.
147147
1. Choose the type of greeting.
148148
1. Choose the language.
@@ -181,7 +181,7 @@ The _one-time bypass_ feature allows a user to authenticate a single time withou
181181
### Create a one-time bypass
182182

183183
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
184-
2. Browse to **Azure Active Directory** > **MFA** > **One-time bypass**.
184+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **One-time bypass**.
185185
3. Select **Add**.
186186
4. If necessary, select the replication group for the bypass.
187187
5. Enter the username as **username\@domain.com**. Enter the number of seconds that the bypass should last. Enter the reason for the bypass.
@@ -190,7 +190,7 @@ The _one-time bypass_ feature allows a user to authenticate a single time withou
190190
### View the one-time bypass report
191191

192192
1. Sign in to the [Azure portal](https://portal.azure.com).
193-
2. Browse to **Azure Active Directory** > **MFA** > **One-time bypass**.
193+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **One-time bypass**.
194194

195195
## Caching rules
196196

@@ -202,15 +202,15 @@ You can set a time period to allow authentication attempts after a user is authe
202202
### Set up caching
203203

204204
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
205-
2. Browse to **Azure Active Directory** > **MFA** > **Caching rules**.
205+
2. Browse to **Azure Active Directory** > **Security** > **MFA** > **Caching rules**.
206206
3. Select **Add**.
207207
4. Select the **cache type** from the drop-down list. Enter the maximum number of **cache seconds**.
208208
5. If necessary, select an authentication type and specify an application.
209209
6. Select **Add**.
210210

211211
## MFA service settings
212212

213-
Settings for app passwords, trusted IPs, verification options, and remember multi-factor authentication for Azure Multi-Factor Authentication can be found in service settings. Service settings can be accessed from the Azure portal by browsing to **Azure Active Directory** > **MFA** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**.
213+
Settings for app passwords, trusted IPs, verification options, and remember multi-factor authentication for Azure Multi-Factor Authentication can be found in service settings. Service settings can be accessed from the Azure portal by browsing to **Azure Active Directory** > **Security** > **MFA** > **Getting started** > **Configure** > **Additional cloud-based MFA settings**.
214214

215215
![Azure Multi-Factor Authentication service settings](./media/howto-mfa-mfasettings/multi-factor-authentication-settings-service-settings.png)
216216

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Deploy Azure AD self-service password reset
1919

20+
> [!NOTE]
21+
> This guide explains self-service password reset and how to deploy it. If you are looking for the self service password reset tool to get back into your account, go to [https://aka.ms/sspr](https://aka.ms/sspr).
22+
2023
Self-service password reset (SSPR) is an Azure Active Directory feature that enables employees to reset their passwords without needing to contact IT staff. Employees must register for or be registered for self-service password reset before using the service. During registration, the employee chooses one or more authentication methods enabled by their organization.
2124

2225
SSPR enables employees to quickly get unblocked and continue working no matter where they are or the time of day. By allowing users to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.
Loading

articles/active-directory/authentication/multi-factor-authentication-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ A workaround for this error is to have separate user accounts for admin-related
216216

217217
If your question isn't answered here, please leave it in the comments at the bottom of the page. Or, here are some additional options for getting help:
218218

219-
* Search the [Microsoft Support Knowledge Base](https://www.microsoft.com/en-us/search?form=mssupport&q=phonefactor&rtc=1) for solutions to common technical issues.
219+
* Search the [Microsoft Support Knowledge Base](https://support.microsoft.com) for solutions to common technical issues.
220220
* Search for and browse technical questions and answers from the community, or ask your own question in the [Azure Active Directory forums](https://social.msdn.microsoft.com/Forums/azure/newthread?category=windowsazureplatform&forum=WindowsAzureAD&prof=required).
221221
* If you're a legacy PhoneFactor customer and you have questions or need help resetting a password, use the [password reset](mailto:[email protected]) link to open a support case.
222222
* Contact a support professional through [Azure Multi-Factor Authentication Server (PhoneFactor) support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, and the ID of the user who saw the error.

0 commit comments

Comments
 (0)