Skip to content

Commit bba76ba

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into asc-melvyn-containerwork
2 parents c0cbead + ff6139a commit bba76ba

File tree

115 files changed

+960
-989
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

115 files changed

+960
-989
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,5 @@
11
{
22
"redirections": [
3-
{
4-
"source_path": "articles/active-directory/user-help/my-applications-portal-access.md",
5-
"redirect_url": "/azure/active-directory/user-help/my-apps-portal-end-user-access",
6-
"redirect_document_id": false
7-
},
83
{
94
"source_path": "articles/virtual-network/create-virtual-network-classic.md",
105
"redirect_url": "/previous-versions/azure/virtual-network/create-virtual-network-classic",
@@ -276,8 +271,13 @@
276271
"redirect_document_id": false
277272
},
278273
{
279-
"source_path": "articles/machine-learning/service/how-to-load-data.md",
280-
"redirect_url": "/azure/machine-learning/service/how-to-create-register-datasets",
274+
"source_path": "articles/active-directory/user-help/my-applications-portal-access.md",
275+
"redirect_url": "/azure/active-directory/user-help/my-apps-portal-end-user-access",
276+
"redirect_document_id": false
277+
},
278+
{
279+
"source_path": "articles/machine-learning/how-to-train-chainer.md",
280+
"redirect_url": "azure/machine-learning/how-to-train-ml-models",
281281
"redirect_document_id": false
282282
},
283283
{

articles/active-directory-b2c/phone-factor-technical-profile.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 03/26/2020
12+
ms.date: 03/31/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -20,12 +20,11 @@ ms.subservice: B2C
2020

2121
Azure Active Directory B2C (Azure AD B2C) provides support for enrolling and verifying phone numbers. This technical profile:
2222

23-
- Provides a user interface to interact with the user.
24-
- Uses content definition to control the look and feel.
25-
- Supports both phone calls and text messages to validate the phone number.
23+
- Provides a user interface to interact with the user to verify, or enroll a phone number.
24+
- Supports phone calls and text messages to validate the phone number.
2625
- Supports multiple phone numbers. The user can select one of the phone numbers to verify.
27-
- If a phone number is provided, the phone factor user interface asks the user to verify the phone number. If not provided, it asks the user to enroll a new phone number.
28-
- Returns a claim indicating whether the user provided a new phone number. You can use this claim to decide whether the phone number should be persisted to the Azure AD user profile.
26+
- Returns a claim indicating whether the user provided a new phone number. You can use this claim to decide whether the phone number should be persisted to the Azure AD B2C user profile.
27+
- Uses a [content definition](contentdefinitions.md) to control the look and feel.
2928

3029
## Protocol
3130

@@ -41,19 +40,25 @@ The following example shows a phone factor technical profile for enrollment and
4140
</TechnicalProfile>
4241
```
4342

44-
## Input claims
43+
## Input claims transformations
4544

46-
The InputClaims element must contain following claims. You can also map the name of your claim to the name defined in the phone factor technical profile.
45+
The InputClaimsTransformations element may contain a collection of input claims transformations that are used to modify the input claims, or generate new ones. The following input claims transformation generates a `UserId` claim that is used later in the input claims collection.
4746

48-
```XML
49-
<InputClaims>
50-
<!--A unique identifier of the user. The partner claim type must be set to `UserId`. -->
51-
<InputClaim ClaimTypeReferenceId="userIdForMFA" PartnerClaimType="UserId" />
52-
<!--A claim that contains the phone number. If the claim is empty, Azure AD B2C asks the user to enroll a new phone number. Otherwise, it asks the user to verify the phone number. -->
53-
<InputClaim ClaimTypeReferenceId="strongAuthenticationPhoneNumber" />
54-
</InputClaims>
47+
```xml
48+
<InputClaimsTransformations>
49+
<InputClaimsTransformation ReferenceId="CreateUserIdForMFA" />
50+
</InputClaimsTransformations>
5551
```
5652

53+
## Input claims
54+
55+
The InputClaims element must contain the following claims. You can also map the name of your claim to the name defined in the phone factor technical profile.
56+
57+
| Data type| Required | Description |
58+
| --------- | -------- | ----------- |
59+
| string| Yes | A unique identifier for the user. The claim name, or PartnerClaimType must be set to `UserId`. This claim should not contain personal identifiable information.|
60+
| string| Yes | List of claim types. Each claim contains one phone number. If any of the input claims do not contain a phone number, the user will be asked to enroll and verify a new phone number. The validated phone number is returned as an output claim. If one of the input claims contain a phone number, the user is asked to verify it. If multiple input claims contain a phone number, the user is asked to choose and verify one of the phone numbers. |
61+
5762
The following example demonstrates using multiple phone numbers. For more information, see [sample policy](https://github.com/azure-ad-b2c/samples/tree/master/policies/mfa-add-secondarymfa).
5863

5964
```XML
@@ -64,22 +69,16 @@ The following example demonstrates using multiple phone numbers. For more inform
6469
</InputClaims>
6570
```
6671

67-
The InputClaimsTransformations element may contain a collection of InputClaimsTransformation elements that are used to modify the input claims or generate new ones before presenting them to the phone factor page.
68-
6972
## Output claims
7073

7174
The OutputClaims element contains a list of claims returned by the phone factor technical profile.
7275

73-
```xml
74-
<OutputClaims>
75-
<!-- The verified phone number. The partner claim type must be set to `Verified.OfficePhone`. -->
76-
<OutputClaim ClaimTypeReferenceId="Verified.strongAuthenticationPhoneNumber" PartnerClaimType="Verified.OfficePhone" />
77-
<!-- Indicates whether the new phone number has been entered by the user. The partner claim type must be set to `newPhoneNumberEntered`. -->
78-
<OutputClaim ClaimTypeReferenceId="newPhoneNumberEntered" PartnerClaimType="newPhoneNumberEntered" />
79-
</OutputClaims>
80-
```
76+
| Data type| Required | Description |
77+
| -------- | ----------- |----------- |
78+
| boolean | Yes | Indicates whether the new phone number has been entered by the user. The claim name, or PartnerClaimType must be set to `newPhoneNumberEntered`|
79+
| string| Yes | The verified phone number. The claim name, or PartnerClaimType must be set to `Verified.OfficePhone`.|
8180

82-
The OutputClaimsTransformations element may contain a collection of OutputClaimsTransformation elements that are used to modify the output claims or generate new ones.
81+
The OutputClaimsTransformations element may contain a collection of OutputClaimsTransformation elements that are used to modify the output claims, or generate new ones.
8382

8483
## Cryptographic keys
8584

@@ -91,7 +90,9 @@ The **CryptographicKeys** element is not used.
9190
| Attribute | Required | Description |
9291
| --------- | -------- | ----------- |
9392
| ContentDefinitionReferenceId | Yes | The identifier of the [content definition](contentdefinitions.md) associated with this technical profile. |
94-
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true` or `false` (default).|
93+
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true`, or `false` (default).|
94+
| setting.authenticationMode | No | The method to validate the phone number. Possible values: `sms`, `phone`, or `mixed` (default).|
95+
| setting.autodial| No| Specify whether the technical profile should auto dial or auto send an SMS. Possible values: `true`, or `false` (default). Auto dial requires the `setting.authenticationMode` metadata be set to `sms`, or `phone`. The input claims collection must have a single phone number. |
9596

9697
### UI elements
9798

@@ -100,4 +101,3 @@ The phone factor authentication page user interface elements can be [localized](
100101
## Next steps
101102

102103
- Check the [social and local accounts with MFA](https://github.com/Azure-Samples/active-directory-b2c-custom-policy-starterpack/tree/master/SocialAndLocalAccountsWithMfa) starter pack.
103-

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: overview
12-
ms.date: 01/22/2020
12+
ms.date: 03/30/2020
1313
ms.author: iainfou
1414

1515
#Customer intent: As an IT administrator or decision maker, I want to understand the differences between Active Directory Domain Services (AD DS), Azure AD, and Azure AD DS so I can choose the most appropriate identity solution for my organization.

articles/active-directory-domain-services/concepts-forest-trust.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 11/19/2019
12+
ms.date: 03/30/2020
1313
ms.author: iainfou
1414
---
1515

@@ -106,11 +106,11 @@ The outbound forest trust for Azure AD Domain Services is created in the Azure p
106106

107107
Many inter-domain and inter-forest transactions depend on domain or forest trusts in order to complete various tasks. This section describes the processes and interactions that occur as resources are accessed across trusts and authentication referrals are evaluated.
108108

109-
### Overview of Authentication Referral Processing
109+
### Overview of authentication referral processing
110110

111111
When a request for authentication is referred to a domain, the domain controller in that domain must determine whether a trust relationship exists with the domain from which the request comes. The direction of the trust and whether the trust is transitive or nontransitive must also be determined before it authenticates the user to access resources in the domain. The authentication process that occurs between trusted domains varies according to the authentication protocol in use. The Kerberos V5 and NTLM protocols process referrals for authentication to a domain differently
112112

113-
### Kerberos V5 Referral Processing
113+
### Kerberos V5 referral processing
114114

115115
The Kerberos V5 authentication protocol is dependent on the Net Logon service on domain controllers for client authentication and authorization information. The Kerberos protocol connects to an online Key Distribution Center (KDC) and the Active Directory account store for session tickets.
116116

@@ -126,7 +126,7 @@ If the client uses Kerberos V5 for authentication, it requests a ticket to the s
126126
* If yes, send the client a referral to the next domain on the trust path.
127127
* If no, send the client a logon-denied message.
128128

129-
### NTLM Referral Processing
129+
### NTLM referral processing
130130

131131
The NTLM authentication protocol is dependent on the Net Logon service on domain controllers for client authentication and authorization information. This protocol authenticates clients that do not use Kerberos authentication. NTLM uses trusts to pass authentication requests between domains.
132132

@@ -142,7 +142,7 @@ If the account does not exist in the database, the domain controller determines
142142
* If yes, pass the authentication request on to the next domain in the trust path. This domain controller repeats the process by checking the user's credentials against its own security accounts database.
143143
* If no, send the client a logon-denied message.
144144

145-
### Kerberos-Based Processing of Authentication Requests Over Forest Trusts
145+
### Kerberos-based processing of authentication requests over forest trusts
146146

147147
When two forests are connected by a forest trust, authentication requests made using the Kerberos V5 or NTLM protocols can be routed between forests to provide access to resources in both forests.
148148

articles/active-directory-domain-services/concepts-resource-forest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 11/19/2019
12+
ms.date: 03/30/2020
1313
ms.author: iainfou
1414
---
1515

articles/active-directory-domain-services/create-gmsa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 11/26/2019
13+
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

1616
---
@@ -27,7 +27,7 @@ This article shows you how to create a gMSA in an Azure AD DS managed domain usi
2727
To complete this article, you need the following resources and privileges:
2828

2929
* An active Azure subscription.
30-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3131
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3232
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3333
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.

articles/active-directory-domain-services/delete-aadds.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 11/26/2019
13+
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

1616
---

articles/active-directory-domain-services/deploy-kcd.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 11/26/2019
13+
ms.date: 03/30/2020
1414
ms.author: iainfou
1515

1616
---
@@ -25,7 +25,7 @@ This article shows you how to configure resource-based Kerberos constrained dele
2525
To complete this article, you need the following resources:
2626

2727
* An active Azure subscription.
28-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2929
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3030
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3131
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.

articles/active-directory-domain-services/join-windows-vm.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 02/19/2020
11+
ms.date: 03/30/2020
1212
ms.author: iainfou
1313

1414
#Customer intent: As an server administrator, I want to learn how to join a Windows Server VM to an Azure Active Directory Domain Services managed domain to provide centralized identity and policy.
@@ -24,14 +24,14 @@ In this tutorial, you learn how to:
2424
> * Connect the Windows Server VM to an Azure virtual network
2525
> * Join the VM to the Azure AD DS managed domain
2626
27-
If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
27+
If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2828

2929
## Prerequisites
3030

3131
To complete this tutorial, you need the following resources:
3232

3333
* An active Azure subscription.
34-
* If you dont have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34+
* If you don't have an Azure subscription, [create an account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
3535
* An Azure Active Directory tenant associated with your subscription, either synchronized with an on-premises directory or a cloud-only directory.
3636
* If needed, [create an Azure Active Directory tenant][create-azure-ad-tenant] or [associate an Azure subscription with your account][associate-azure-ad-tenant].
3737
* An Azure Active Directory Domain Services managed domain enabled and configured in your Azure AD tenant.
@@ -73,8 +73,6 @@ If you already have a VM that you want to domain-join, skip to the section to [j
7373

7474
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over TLS. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
7575

76-
For now, disable direct RDP connections to the VM.
77-
7876
Under **Public inbound ports**, select *None*.
7977

8078
1. When done, select **Next: Disks**.
@@ -93,22 +91,23 @@ If you already have a VM that you want to domain-join, skip to the section to [j
9391

9492
![Choose to manage the subnet configuration in the Azure portal](./media/join-windows-vm/manage-subnet.png)
9593

96-
1. In the left-hand menu of the virtual network window, select **Address space**. The virtual network is created with a single address space of *10.0.1.0/24*, which is used by the default subnet.
94+
1. In the left-hand menu of the virtual network window, select **Address space**. The virtual network is created with a single address space of *10.0.2.0/24*, which is used by the default subnet. Other subnets, such as for *workloads* or Azure Bastion may also already exist.
9795

9896
Add an additional IP address range to the virtual network. The size of this address range and the actual IP address range to use depends on other network resources already deployed. The IP address range shouldn't overlap with any existing address ranges in your Azure or on-premises environment. Make sure that you size the IP address range large enough for the number of VMs you expect to deploy into the subnet.
9997

100-
In the following example, an additional IP address range of *10.0.2.0/24* is added. When ready, select **Save**.
98+
In the following example, an additional IP address range of *10.0.5.0/24* is added. When ready, select **Save**.
10199

102-
![Add an additional virtual network IP address range in the Azure portal](./media/tutorial-configure-networking/add-vnet-address-range.png)
100+
![Add an additional virtual network IP address range in the Azure portal](./media/join-windows-vm/add-vnet-address-range.png)
103101

104102
1. Next, in the left-hand menu of the virtual network window, select **Subnets**, then choose **+ Subnet** to add a subnet.
105103

106-
1. Select **+ Subnet**, then enter a name for the subnet, such as *management*. Provide an **Address range (CIDR block)**, such as *10.0.2.0/24*. Make sure that this IP address range doesn't overlap with any other existing Azure or on-premises address ranges. Leave the other options as their default values, then select **OK**.
104+
1. Select **+ Subnet**, then enter a name for the subnet, such as *management*. Provide an **Address range (CIDR block)**, such as *10.0.5.0/24*. Make sure that this IP address range doesn't overlap with any other existing Azure or on-premises address ranges. Leave the other options as their default values, then select **OK**.
107105

108106
![Create a subnet configuration in the Azure portal](./media/join-windows-vm/create-subnet.png)
109107

110108
1. It takes a few seconds to create the subnet. Once it's created, select the *X* to close the subnet window.
111109
1. Back in the **Networking** pane to create a VM, choose the subnet you created from the drop-down menu, such as *management*. Again, make sure you choose the correct subnet and don't deploy your VM in the same subnet as your Azure AD DS managed domain.
110+
1. For **Public IP**, select *None* from the drop-down menu, as you use Azure Bastion to connect to the management and don't need a public IP address assigned.
112111
1. Leave the other options as their default values, then select **Management**.
113112
1. Set **Boot diagnostics** to *Off*. Leave the other options as their default values, then select **Review + create**.
114113
1. Review the VM settings, then select **Create**.
Binary file not shown.

0 commit comments

Comments
 (0)