Skip to content

Commit bb03936

Browse files
authored
Merge pull request #210368 from MicrosoftDocs/main
9/7 AM Publish
2 parents c9f1e64 + 7f1f77c commit bb03936

File tree

65 files changed

+1974
-1190
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+1974
-1190
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -287,19 +287,19 @@
287287
{
288288
"path_to_root": "azure-search-javascript-samples",
289289
"url": "https://github.com/Azure-Samples/azure-search-javascript-samples",
290-
"branch": "master",
290+
"branch": "main",
291291
"branch_mapping": {}
292292
},
293293
{
294294
"path_to_root": "azure-search-dotnet-samples",
295295
"url": "https://github.com/Azure-Samples/azure-search-dotnet-samples",
296-
"branch": "master",
296+
"branch": "main",
297297
"branch_mapping": {}
298298
},
299299
{
300300
"path_to_root": "azure-search-python-samples",
301301
"url": "https://github.com/Azure-Samples/azure-search-python-samples",
302-
"branch": "master",
302+
"branch": "main",
303303
"branch_mapping": {}
304304
},
305305
{
@@ -374,12 +374,6 @@
374374
"branch": "master",
375375
"branch_mapping": {}
376376
},
377-
{
378-
"path_to_root": "media-services-v3-dotnet-quickstarts",
379-
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-quickstarts",
380-
"branch": "master",
381-
"branch_mapping": {}
382-
},
383377
{
384378
"path_to_root": "media-services-v3-dotnet-tutorials",
385379
"url": "https://github.com/Azure-Samples/media-services-v3-dotnet-tutorials",

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: contperf-fy20q4
2121

2222
Microsoft recommends passwordless authentication methods such as Windows Hello, FIDO2 security keys, and the Microsoft Authenticator app because they provide the most secure sign-in experience. Although a user can sign-in using other common methods such as a username and password, passwords should be replaced with more secure authentication methods.
2323

24-
![Table of the strengths and preferred authentication methods in Azure AD](media/concept-authentication-methods/authentication-methods.png)
24+
:::image type="content" border="true" source="media/concept-authentication-methods/authentication-methods.png" alt-text="Illustration of the strengths and preferred authentication methods in Azure AD." :::
2525

2626
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to an SMS or phone call.
2727

@@ -40,6 +40,7 @@ The following table outlines the security considerations for the available authe
4040
| Windows Hello for Business | High | High | High |
4141
| Microsoft Authenticator app | High | High | High |
4242
| FIDO2 security key | High | High | High |
43+
| Certificate-based authentication (preview)| High | High | High |
4344
| OATH hardware tokens (preview) | Medium | Medium | High |
4445
| OATH software tokens | Medium | Medium | High |
4546
| SMS | Medium | High | Medium |
@@ -65,13 +66,14 @@ The following table outlines when an authentication method can be used during a
6566
| Windows Hello for Business | Yes | MFA\* |
6667
| Microsoft Authenticator app | Yes | MFA and SSPR |
6768
| FIDO2 security key | Yes | MFA |
69+
| Certificate-based authentication (preview) | Yes | MFA and SSPR |
6870
| OATH hardware tokens (preview) | No | MFA and SSPR |
6971
| OATH software tokens | No | MFA and SSPR |
7072
| SMS | Yes | MFA and SSPR |
7173
| Voice call | No | MFA and SSPR |
7274
| Password | Yes | |
7375

74-
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work sucessfully.
76+
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work successfully.
7577
7678
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
7779

@@ -80,6 +82,7 @@ To learn more about how each authentication method works, see the following sepa
8082
* [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
8183
* [Microsoft Authenticator app](concept-authentication-authenticator-app.md)
8284
* [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
85+
* [Certificate-based authentication](concept-certificate-based-authentication.md)
8386
* [OATH hardware tokens (preview)](concept-authentication-oath-tokens.md#oath-hardware-tokens-preview)
8487
* [OATH software tokens](concept-authentication-oath-tokens.md#oath-software-tokens)
8588
* [SMS sign-in](howto-authentication-sms-signin.md) and [verification](concept-authentication-phone-options.md#mobile-phone-verification)
-507 Bytes
Loading

articles/active-directory/develop/howto-create-self-signed-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Active Directory (Azure AD) supports two types of authentication for servi
2323
For testing, you can use a self-signed public certificate instead of a Certificate Authority (CA)-signed certificate. This article shows you how to use Windows PowerShell to create and export a self-signed certificate.
2424

2525
> [!CAUTION]
26-
> Using a self-signed certificate is only recommended for development, not production.
26+
> Self-signed certificates are not trusted by default and they can be difficult to maintain. Also, they may use outdated hash and cipher suites that may not be strong. For better security, purchase a certificate signed by a well-known certificate authority.
2727
2828
You configure various parameters for the certificate. For example, the cryptographic and hash algorithms, the certificate validity period, and your domain name. Then export the certificate with or without its private key depending on your application needs.
2929

articles/active-directory/privileged-identity-management/groups-approval-workflow.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,15 @@ Here's some information about workflow notifications:
6868
>[!Note]
6969
>An administrator who believes that an approved user should not be active can remove the active group assignment in Privileged Identity Management. Although resource administrators are not notified of pending requests unless they are an approver, they can view and cancel pending requests for all users by viewing pending requests in Privileged Identity Management.
7070
71+
## Troubleshoot
72+
73+
### Permissions are not granted after activating a role
74+
75+
When you activate a role in Privileged Identity Management, the activation may not instantly propagate to all portals that require the privileged role. Sometimes, even if the change is propagated, web caching in a portal may result in the change not taking effect immediately. If your activation is delayed, here is what you should do.
76+
77+
1. Sign out of the Azure portal and then sign back in.
78+
1. In Privileged Identity Management, verify that you are listed as the member of the role.
79+
7180
## Next steps
7281

7382
- [Extend or renew group assignments in Privileged Identity Management](pim-resource-roles-renew-extend.md)

articles/aks/azure-netapp-files.md

Lines changed: 11 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -47,21 +47,12 @@ az provider register --namespace Microsoft.NetApp --wait
4747
> [!NOTE]
4848
> This can take some time to complete.
4949
50-
When you create an Azure NetApp account for use with AKS, you need to create the account in the **node** resource group. First, get the resource group name with the [az aks show][az-aks-show] command and add the `--query nodeResourceGroup` query parameter. The following example gets the node resource group for the AKS cluster named *myAKSCluster* in the resource group name *myResourceGroup*:
51-
52-
```azurecli-interactive
53-
az aks show --resource-group myResourceGroup --name myAKSCluster --query nodeResourceGroup -o tsv
54-
```
55-
56-
```output
57-
MC_myResourceGroup_myAKSCluster_eastus
58-
```
59-
60-
Create an Azure NetApp Files account in the **node** resource group and same region as your AKS cluster using [az netappfiles account create][az-netappfiles-account-create]. The following example creates an account named *myaccount1* in the *MC_myResourceGroup_myAKSCluster_eastus* resource group and *eastus* region:
50+
When you create an Azure NetApp account for use with AKS, you can create the account in an existing resource group or create a new one in the same region as the AKS cluster.
51+
The following example creates an account named *myaccount1* in the *myResourceGroup* resource group and *eastus* region:
6152

6253
```azurecli
6354
az netappfiles account create \
64-
--resource-group MC_myResourceGroup_myAKSCluster_eastus \
55+
--resource-group myResourceGroup \
6556
--location eastus \
6657
--account-name myaccount1
6758
```
@@ -70,7 +61,7 @@ Create a new capacity pool by using [az netappfiles pool create][az-netappfiles-
7061

7162
```azurecli
7263
az netappfiles pool create \
73-
--resource-group MC_myResourceGroup_myAKSCluster_eastus \
64+
--resource-group myResourceGroup \
7465
--location eastus \
7566
--account-name myaccount1 \
7667
--pool-name mypool1 \
@@ -81,7 +72,7 @@ az netappfiles pool create \
8172
Create a subnet to [delegate to Azure NetApp Files][anf-delegate-subnet] using [az network vnet subnet create][az-network-vnet-subnet-create]. *This subnet must be in the same virtual network as your AKS cluster.*
8273

8374
```azurecli
84-
RESOURCE_GROUP=MC_myResourceGroup_myAKSCluster_eastus
75+
RESOURCE_GROUP=myResourceGroup
8576
VNET_NAME=$(az network vnet list --resource-group $RESOURCE_GROUP --query [].name -o tsv)
8677
VNET_ID=$(az network vnet show --resource-group $RESOURCE_GROUP --name $VNET_NAME --query "id" -o tsv)
8778
SUBNET_NAME=MyNetAppSubnet
@@ -100,7 +91,7 @@ Volumes can either be provisioned statically or dynamically. Both options are co
10091
Create a volume by using [az netappfiles volume create][az-netappfiles-volume-create].
10192

10293
```azurecli
103-
RESOURCE_GROUP=MC_myResourceGroup_myAKSCluster_eastus
94+
RESOURCE_GROUP=myResourceGroup
10495
LOCATION=eastus
10596
ANF_ACCOUNT_NAME=myaccount1
10697
POOL_NAME=mypool1
@@ -131,7 +122,11 @@ az netappfiles volume create \
131122
List the details of your volume using [az netappfiles volume show][az-netappfiles-volume-show]
132123

133124
```azurecli
134-
az netappfiles volume show --resource-group $RESOURCE_GROUP --account-name $ANF_ACCOUNT_NAME --pool-name $POOL_NAME --volume-name "myvol1"
125+
az netappfiles volume show \
126+
--resource-group $RESOURCE_GROUP \
127+
--account-name $ANF_ACCOUNT_NAME \
128+
--pool-name $POOL_NAME \
129+
--volume-name "myvol1" -o JSON
135130
```
136131

137132
```output

0 commit comments

Comments
 (0)