Skip to content

Commit be7d917

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into billing-ea-portal-articles-edit
2 parents b49f4d2 + 1c22e41 commit be7d917

File tree

554 files changed

+10144
-50867
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

554 files changed

+10144
-50867
lines changed

.openpublishing.redirection.json

Lines changed: 761 additions & 44653 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/connect-with-saml-service-providers.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ ms.topic: reference
1212
ms.date: 12/10/2019
1313
ms.author: marsma
1414
ms.subservice: B2C
15+
ms.custom: fasttrack-edit
1516
---
1617

1718
# Register a SAML application in Azure AD B2C
@@ -173,7 +174,7 @@ Now that your tenant can issue SAML assertions, you need to create the SAML rely
173174
PublicPolicyUri="http://tenant-name.onmicrosoft.com/B2C_1A_signup_signin_saml">
174175
```
175176

176-
1. Add following XML snippet just before the `<RelyingParty>` element. This XML overwrites orchestration step number 7 of the _SignUpOrSignIn_ user journey. If you customized your user journey by adding or removing orchestration steps, make sure the number (in the `order` element) is aligned with the one specified in the user journey for the token issuer step.
177+
1. Add following XML snippet just before the `<RelyingParty>` element. This XML overwrites orchestration step number 7 of the _SignUpOrSignIn_ user journey. If you started from a different folder in the starter pack, or customized your user journey by adding or removing orchestration steps, make sure the number (in the `order` element) is aligned with the one specified in the user journey for the token issuer step (for example, in the other starter pack folders it's step number 4 for `LocalAccounts`, 6 for `SocialAccounts` and 9 for `SocialAndLocalAccountsWithMfa`).
177178

178179
```XML
179180
<UserJourneys>

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following example shows the content definition identifier and the definition
3333
<Metadata>
3434
<Item Key="DisplayName">Local account sign up page</Item>
3535
</Metadata>
36-
<LoalizedResourcesReferences MergeBehavior="Prepend">
36+
<LocalizedResourcesReferences MergeBehavior="Prepend">
3737
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.localaccountsignup.en" />
3838
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.localaccountsignup.es" />
3939
...

articles/active-directory-domain-services/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@
2929
items:
3030
- name: Create a managed domain using Azure PowerShell
3131
href: powershell-create-instance.md
32+
- name: Create a managed domain using a template
33+
href: template-create-instance.md
3234
- name: Concepts
3335
items:
3436
- name: Administration basics

articles/active-directory-domain-services/template-create-instance.md

Lines changed: 359 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 12/10/2019
9+
ms.date: 01/14/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -30,15 +30,17 @@ More information about emergency access accounts and why they are important can
3030

3131
## Typical policies deployed by organizations
3232

33-
* [Require MFA for administrators](howto-conditional-access-policy-admin-mfa.md)
34-
* [Require MFA for Azure management](howto-conditional-access-policy-azure-management.md)
35-
* [Require MFA for all users](howto-conditional-access-policy-all-users-mfa.md)
36-
* [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)
33+
* [Require MFA for administrators](howto-conditional-access-policy-admin-mfa.md)\*
34+
* [Require MFA for Azure management](howto-conditional-access-policy-azure-management.md)\*
35+
* [Require MFA for all users](howto-conditional-access-policy-all-users-mfa.md)\*
36+
* [Block legacy authentication](howto-conditional-access-policy-block-legacy.md)\*
3737
* [Risk-based Conditional Access (Requires Azure AD Premium P2)](howto-conditional-access-policy-risk.md)
3838
* [Require trusted location for MFA registration](howto-conditional-access-policy-registration.md)
3939
* [Block access by location](howto-conditional-access-policy-location.md)
4040
* [Require compliant device](howto-conditional-access-policy-compliant-device.md)
4141

42+
\* These four policies when configured together, would mimic functionality enabled by [security defaults](../fundamentals/concept-fundamentals-security-defaults.md).
43+
4244
## Next steps
4345

4446
- [Simulate sign in behavior using the Conditional Access What If tool.](troubleshoot-conditional-access-what-if.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
3939

4040
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
4141
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../users-groups-roles/directory-emergency-access.md).
42-
* **Service accounts** and **service principles**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services and allow programmatic access to applications. Service accounts should be excluded since MFA can’t be completed programmatically.
42+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that are not tied to any particular user. They are normally used by back-end services and allow programmatic access to applications. Service accounts should be excluded since MFA can’t be completed programmatically.
4343
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
4444

4545
## Create a Conditional Access policy

articles/active-directory/develop/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@
8282
href: tutorial-v2-windows-uwp.md
8383
- name: Windows Desktop .NET
8484
href: tutorial-v2-windows-desktop.md
85+
- name: Use shared-device mode in your Android app
86+
href: tutorial-v2-shared-device-mode.md
8587
- name: Daemon apps
8688
items:
8789
- name: ASP.NET daemon web app
@@ -208,6 +210,8 @@
208210
href: scenario-mobile-app-configuration.md
209211
- name: Mobile platforms specific config
210212
items:
213+
- name: Shared device mode for Android devices
214+
href: shared-device-mode.md
211215
- name: Xamarin Android
212216
href: msal-net-xamarin-android-considerations.md
213217
- name: System browser on Android
9.87 KB
Loading
18.1 KB
Loading

0 commit comments

Comments
 (0)