Skip to content

Commit b72bf47

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into sdg-master
2 parents 9cdf1d5 + 59fc499 commit b72bf47

File tree

906 files changed

+6485
-4240
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

906 files changed

+6485
-4240
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -567,6 +567,11 @@
567567
"redirect_url": "/azure/cognitive-services//QnAMaker/Quickstarts/get-answer-from-knowledge-base-using-url-tool",
568568
"redirect_document_id": false
569569
},
570+
{
571+
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-primary-and-secondary-data.md",
572+
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-machine-learned-entity",
573+
"redirect_document_id": false
574+
},
570575
{
571576
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-list-entity.md",
572577
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-list-entity",
@@ -1937,11 +1942,6 @@
19371942
"redirect_url": "/azure/cosmos-db/sql-api-get-started",
19381943
"redirect_document_id": false
19391944
},
1940-
{
1941-
"source_path": "articles/search/search-traffic-analytics.md",
1942-
"redirect_url": "/azure/search/search-monitor-usage",
1943-
"redirect_document_id": false
1944-
},
19451945
{
19461946
"source_path": "articles/search/knowledge-store-howto.md",
19471947
"redirect_url": "/azure/search/knowledge-store-create-rest",
@@ -10032,6 +10032,11 @@
1003210032
"redirect_url": "/azure-stack/user/azure-stack-vpn-gateway-about-vpn-gateways",
1003310033
"redirect_document_id": false
1003410034
},
10035+
{
10036+
"source_path": "articles/virtual-wan/virtual-wan-office365-overview.md",
10037+
"redirect_url": "/azure/virtual-wan/virtual-wan-about",
10038+
"redirect_document_id": false
10039+
},
1003510040
{
1003610041
"source_path": "articles/azure-stack/azure-stack-vpn-gateway-settings.md",
1003710042
"redirect_url": "/azure-stack/user/azure-stack-vpn-gateway-settings",
@@ -34096,6 +34101,21 @@
3409634101
"redirect_url": "/azure/active-directory-b2c/tutorial-create-tenant",
3409734102
"redirect_document_id": false
3409834103
},
34104+
{
34105+
"source_path": "articles/active-directory/authentication/concept-mfa-get-started.md",
34106+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-mfa-get-started",
34107+
"redirect_document_id": true
34108+
},
34109+
{
34110+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-block-legacy-authentication.md",
34111+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-block-legacy-authentication",
34112+
"redirect_document_id": true
34113+
},
34114+
{
34115+
"source_path": "articles/active-directory/conditional-access/concept-conditional-access-security-defaults.md",
34116+
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
34117+
"redirect_document_id": true
34118+
},
3409934119
{
3410034120
"source_path": "articles/multi-factor-authentication/end-user/multi-factor-authentication-end-user-app-passwords.experimental.md",
3410134121
"redirect_url": "/azure/active-directory/user-help/multi-factor-authentication-end-user-app-passwords",

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -360,6 +360,5 @@ By using `B2CGraphClient`, you have a service application that can manage your B
360360
As you incorporate this functionality into your own application, remember a few key points for B2C applications:
361361

362362
* Grant the application the required permissions in the tenant.
363-
* For now, you need to use ADAL (not MSAL) to get access tokens. (You can also send protocol messages directly, without using a library.)
364363
* When you call the Graph API, use `api-version=1.6`.
365364
* When you create and update consumer users, a few properties are required, as described above.

articles/active-directory-b2c/b2clogin.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Set redirect URLs to b2clogin.com - Azure Active Directory B2C
2+
title: Migrate applications and APIs to b2clogin.com - Azure AD B2C
33
description: Learn about using b2clogin.com in your redirect URLs for Azure Active Directory B2C.
44
services: active-directory-b2c
55
author: mmacy
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 08/17/2019
11+
ms.date: 12/04/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -17,6 +17,16 @@ ms.subservice: B2C
1717

1818
When you set up an identity provider for sign-up and sign-in in your Azure Active Directory B2C (Azure AD B2C) application, you need to specify a redirect URL. You should no longer reference *login.microsoftonline.com* in your applications and APIs. Instead, use *b2clogin.com* for all new applications, and migrate existing applications from *login.microsoftonline.com* to *b2clogin.com*.
1919

20+
## Deprecation of login.microsoftonline.com
21+
22+
On 04 December 2019, we announced the scheduled retirement of login.microsoftonline.com support in Azure AD B2C on **04 December 2020**:
23+
24+
[Azure Active Directory B2C is deprecating login.microsoftonline.com](https://azure.microsoft.com/updates/b2c-deprecate-msol/)
25+
26+
The deprecation of login.microsoftonline.com goes into effect for all Azure AD B2C tenants on 04 December 2020, providing existing tenants one (1) year to migrate to b2clogin.com. New tenants created after 04 December 2019 will not accept requests from login.microsoftonline.com. All functionality remains the same on the b2clogin.com endpoint.
27+
28+
The deprecation of login.microsoftonline.com does not impact Azure Active Directory tenants. Only Azure Active Directory B2C tenants are affected by this change.
29+
2030
## Benefits of b2clogin.com
2131

2232
When you use *b2clogin.com* as your redirect URL:
@@ -68,6 +78,10 @@ For example, the authority endpoint for Contoso's sign-up/sign-in policy would n
6878
https://contosob2c.b2clogin.com/00000000-0000-0000-0000-000000000000/B2C_1_signupsignin1
6979
```
7080

81+
For information about migrating OWIN-based web applications to b2clogin.com, see [Migrate an OWIN-based web API to b2clogin.com](multiple-token-endpoints.md).
82+
83+
For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migrate to b2clogin.com](secure-api-management.md#migrate-to-b2clogincom) section of [Secure an Azure API Management API with Azure AD B2C](secure-api-management.md).
84+
7185
## Microsoft Authentication Library (MSAL)
7286

7387
### ValidateAuthority property
@@ -92,6 +106,12 @@ this.clientApplication = new UserAgentApplication(
92106
);
93107
```
94108

109+
## Next steps
110+
111+
For information about migrating OWIN-based web applications to b2clogin.com, see [Migrate an OWIN-based web API to b2clogin.com](multiple-token-endpoints.md).
112+
113+
For migrating Azure API Management APIs protected by Azure AD B2C, see the [Migrate to b2clogin.com](secure-api-management.md#migrate-to-b2clogincom) section of [Secure an Azure API Management API with Azure AD B2C](secure-api-management.md).
114+
95115
<!-- LINKS - External -->
96116
[msal-dotnet]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet
97117
[msal-dotnet-b2c]: https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/wiki/AAD-B2C-specifics

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -303,13 +303,14 @@ Azure AD DS needs a network security group to secure the ports needed for the ma
303303

304304
If there's an error when you run the PowerShell cmdlet to prepare for migration in step 2 or for the migration itself in step 3, the Azure AD DS managed domain can roll back to the original configuration. This roll back requires the original Classic virtual network. Note that the IP addresses may still change after rollback.
305305

306-
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*:
306+
Run the `Migrate-Aadds` cmdlet using the *-Abort* parameter. Provide the *-ManagedDomainFqdn* for your own Azure AD DS managed domain prepared in a previous section, such as *contoso.com*, and the Classic virtual network name, such as *myClassicVnet*:
307307

308308
```powershell
309309
Migrate-Aadds `
310310
-Abort `
311311
-ManagedDomainFqdn contoso.com `
312-
-Credentials $creds​
312+
-ClassicVirtualNetworkName myClassicVnet `
313+
-Credentials $creds
313314
```
314315

315316
### Restore
@@ -357,4 +358,4 @@ With your Azure AD DS managed domain migrated to the Resource Manager deployment
357358
[get-credential]: /powershell/module/microsoft.powershell.security/get-credential
358359

359360
<!-- EXTERNAL LINKS -->
360-
[powershell-script]: https://www.powershellgallery.com/packages/Migrate-Aadds/1.0
361+
[powershell-script]: https://www.powershellgallery.com/packages/Migrate-Aadds/

articles/active-directory/authentication/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,6 @@
4343
items:
4444
- name: How MFA works
4545
href: concept-mfa-howitworks.md
46-
- name: Enable MFA
47-
href: concept-mfa-get-started.md
4846
- name: License your users
4947
href: concept-mfa-licensing.md
5048
- name: Manage an Auth Provider

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,10 @@ User accounts in Azure Multi-Factor Authentication have the following three dist
4949

5050
A user's state reflects whether an admin has enrolled them in Azure MFA, and whether they completed the registration process.
5151

52-
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
52+
All users start out *Disabled*. When you enroll users in Azure MFA, their state changes to *Enabled*. When enabled users sign in and complete the registration process, their state changes to *Enforced*.
53+
54+
> [!NOTE]
55+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
5356
5457
### View the status for a user
5558

@@ -176,6 +179,8 @@ Get-MsolUser -All | Set-MfaState -State Disabled
176179

177180
> [!NOTE]
178181
> We recently changed the behavior and PowerShell script above accordingly. Previously, the script saved off the MFA methods, disabled MFA, and restored the methods. This is no longer necessary now that the default behavior for disable doesn't clear the methods.
182+
>
183+
> If MFA is re-enabled on a user object that already has registration details, such as phone or email, then administrators need to have that user re-register MFA via Azure portal or PowerShell. If the user doesn't re-register, their MFA state doesn't transition from *Enabled* to *Enforced* in MFA management UI.
179184
180185
## Next steps
181186

articles/active-directory/cloud-provisioning/what-is-cloud-provisioning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ With Azure AD Connect cloud provisioning, provisioning from AD to Azure AD is or
2929

3030
The following table provides a comparison between Azure AD Connect and Azure AD Connect cloud provisioning:
3131

32-
| Feature | Azure Active Directory Connect synch| Azure Active Directory Connect cloud provisioning |
32+
| Feature | Azure Active Directory Connect sync| Azure Active Directory Connect cloud provisioning |
3333
|:--- |:---:|:---:|
3434
|Connect to single on-premises AD forest|||
3535
| Connect to multiple on-premises AD forests |||

articles/active-directory/conditional-access/TOC.yml

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,6 @@
1717
items:
1818
- name: Common Conditional Access policies
1919
href: concept-conditional-access-policy-common.md
20-
- name: Security defaults
21-
href: concept-conditional-access-security-defaults.md
2220
- name: Conditional Access policy components
2321
href: concept-conditional-access-policies.md
2422
- name: Conditions
@@ -64,8 +62,6 @@
6462
href: howto-conditional-access-policy-compliant-device.md
6563
- name: Block legacy authentication
6664
href: block-legacy-authentication.md
67-
- name: Conditional Access for MFA registration
68-
href: ../authentication/howto-registration-mfa-sspr-combined.md#conditional-access-policies-for-combined-registration
6965
- name: Require approved client apps
7066
href: app-based-conditional-access.md
7167
- name: Require app protection policy

articles/active-directory/conditional-access/howto-conditional-access-policy-registration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Conditional Access: Require trusted location for MFA registration
1919

20-
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This preview feature is available to organizations who have enabled the [combined registration preview](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want users to register for Azure Multi-Factor Authentication and SSPR from a central location such as a trusted network location during HR onboarding. For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
20+
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in Conditional Access policy. This preview feature is available to organizations who have enabled the [combined registration preview](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want to use conditions like trusted network location to restrict access to register for Azure Multi-Factor Authentication and SSPR. For more information about creating trusted locations in Conditional Access, see the article [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md#named-locations)
2121

2222
## Create a policy to require registration from a trusted location
2323

articles/active-directory/develop/active-directory-claims-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Customize claims for an Azure AD tenant app (Public Preview)
2+
title: Customize claims for Azure AD tenant apps
33
titleSuffix: Microsoft identity platform
44
description: This page describes Azure Active Directory claims mapping.
55
services: active-directory

0 commit comments

Comments
 (0)