Skip to content

Commit bf60385

Browse files
authored
Merge pull request #235442 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 2723b1a + 4cdbf9a commit bf60385

24 files changed

+91
-60
lines changed

articles/active-directory-b2c/enable-authentication-web-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ Azure AD B2C identity provider settings are stored in the *appsettings.json* fil
260260
"Instance": "https://<your-tenant-name>.b2clogin.com",
261261
"ClientId": "<web-app-application-id>",
262262
"Domain": "<your-b2c-domain>",
263-
"SignedOutCallbackPath": "/signout/<your-sign-up-in-policy>",
263+
"SignedOutCallbackPath": "/signout-oidc
264264
"SignUpSignInPolicyId": "<your-sign-up-in-policy>"
265265
}
266266
```

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ For user flows, these extension properties are [managed by using the Azure porta
167167
Use the [Get organization details](/graph/api/organization-get) API to get your directory size quota. You need to add the `$select` query parameter as shown in the following HTTP request:
168168

169169
```http
170-
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
170+
GET https://graph.microsoft.com/v1.0/organization/organization-id?$select=directorySizeQuota
171171
```
172172
Replace `organization-id` with your organization or tenant ID.
173173

articles/active-directory-b2c/user-profile-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ Extension attributes in the Graph API are named by using the convention `extensi
189189
Note that the **Application (client) ID** as it's represented in the extension attribute name includes no hyphens. For example:
190190

191191
```json
192-
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyNumber": "212342"
192+
"extension_831374b3bd5041bfaa54263ec9e050fc_loyaltyNumber": "212342"
193193
```
194194

195195
The following data types are supported when defining an attribute in a schema extension:

articles/active-directory/develop/configure-token-lifetimes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To get started, download the latest [Microsoft Graph PowerShell SDK](/powershell
2929
In the following steps, you'll create a policy that requires users to authenticate less frequently in your web app. This policy sets the lifetime of the access/ID tokens for your web app.
3030

3131
```powershell
32-
Connect-MgGraph -Scopes "Policy.ReadWrite.ApplicationConfiguration"
32+
Connect-MgGraph -Scopes "Policy.ReadWrite.ApplicationConfiguration","Policy.Read.All","Application.ReadWrite.All"
3333
3434
# Create a token lifetime policy
3535
$params = @{
@@ -76,4 +76,4 @@ GET https://graph.microsoft.com/v1.0/policies/tokenLifetimePolicies/4d2f137b-e8a
7676
```
7777

7878
## Next steps
79-
Learn about [authentication session management capabilities](../conditional-access/howto-conditional-access-session-lifetime.md) in Azure AD Conditional Access.
79+
Learn about [authentication session management capabilities](../conditional-access/howto-conditional-access-session-lifetime.md) in Azure AD Conditional Access.

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -90,13 +90,13 @@ If a device is managed by another management authority, like Microsoft Intune, b
9090

9191
You can use a device ID to verify the device ID details on the device or to troubleshoot via PowerShell. To access the copy option, select the device.
9292

93-
![Screenshot that shows a device ID and the copy button.](./media/device-management-azure-portal/35.png)
93+
![Screenshot that shows a device ID and the copy button.](./media/device-management-azure-portal/device-details.png)
9494

9595
## View or copy BitLocker keys
9696

9797
You can view and copy BitLocker keys to allow users to recover encrypted drives. These keys are available only for Windows devices that are encrypted and store their keys in Azure AD. You can find these keys when you view a device's details by selecting **Show Recovery Key**. Selecting **Show Recovery Key** will generate an audit log, which you can find in the `KeyManagement` category.
9898

99-
![Screenshot that shows how to view BitLocker keys.](./media/device-management-azure-portal/device-details-show-bitlocker-key.png)
99+
![Screenshot that shows how to view BitLocker keys.](./media/device-management-azure-portal/show-bitlocker-key.png)
100100

101101
To view or copy BitLocker keys, you need to be the owner of the device or have one of these roles:
102102

@@ -115,7 +115,7 @@ In this preview, you have the ability to infinitely scroll, reorder columns, and
115115
- Compliant state
116116
- Join type (Azure AD joined, Hybrid Azure AD joined, Azure AD registered)
117117
- Activity timestamp
118-
- OS
118+
- OS Type and Version
119119
- Device type (printer, secure VM, shared device, registered device)
120120
- MDM
121121
- Autopilot
Binary file not shown.
194 KB
Loading
186 KB
Loading

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,9 @@ All users in your tenant must register for multifactor authentication (MFA) in t
6565
Administrators have increased access to your environment. Because of the power these highly privileged accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification for sign-in. In Azure AD, you can get a stronger account verification by requiring multifactor authentication.
6666

6767
> [!TIP]
68-
> We recommend having separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
68+
> Recommendations for your admins:
69+
> - Ensure all your admins sign in after enabling security defaults so that they can register for authentication methods.
70+
> - Have separate accounts for administration and standard productivity tasks to significantly reduce the number of times your admins are prompted for MFA.
6971
7072
After registration with Azure AD Multifactor Authentication is finished, the following Azure AD administrator roles will be required to do extra authentication every time they sign in:
7173

0 commit comments

Comments
 (0)