Skip to content

Commit c0cbaf3

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-synapse-current
2 parents 09efa1f + d017abd commit c0cbaf3

File tree

474 files changed

+5703
-2563
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

474 files changed

+5703
-2563
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
2727
],
2828
"sync_notification_subscribers": [
29-
"tysonn@microsoft.com"
29+
"angrobe_extended_dir@microsoft.com"
3030
],
3131
"branches_to_filter": [],
3232
"git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/azure-docs",

.openpublishing.redirection.json

Lines changed: 67 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -17552,16 +17552,6 @@
1755217552
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-load-with-data-factory",
1755317553
"redirect_document_id": false
1755417554
},
17555-
{
17556-
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-security-threat-detection.md",
17557-
"redirect_url": "/azure/sql-database/sql-database-threat-detection-overview",
17558-
"redirect_document_id": false
17559-
},
17560-
{
17561-
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-auditing-overview.md",
17562-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17563-
"redirect_document_id": false
17564-
},
1756517555
{
1756617556
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-migrate-code.md",
1756717557
"redirect_url": "/azure/sql-data-warehouse/sql-data-warehouse-overview-develop",
@@ -17827,26 +17817,6 @@
1782717817
"redirect_url": "/azure/synapse-analytics/quickstart-create-sql-pool-portal",
1782817818
"redirect_document_id": false
1782917819
},
17830-
{
17831-
"source_path": "articles/sql-database/sql-database-auditing-get-started.md",
17832-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17833-
"redirect_document_id": false
17834-
},
17835-
{
17836-
"source_path": "articles/sql-database/sql-database-auditing-portal.md",
17837-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17838-
"redirect_document_id": false
17839-
},
17840-
{
17841-
"source_path": "articles/sql-database/sql-database-auditing-powershell.md",
17842-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17843-
"redirect_document_id": false
17844-
},
17845-
{
17846-
"source_path": "articles/sql-database/sql-database-auditing-rest.md",
17847-
"redirect_url": "/azure/sql-database/sql-database-auditing",
17848-
"redirect_document_id": false
17849-
},
1785017820
{
1785117821
"source_path": "articles/sql-database/sql-database-build-multi-tenant-apps.md",
1785217822
"redirect_url": "/azure/sql-database/saas-tenancy-app-design-patterns",
@@ -18557,16 +18527,6 @@
1855718527
"redirect_url": "/azure/sql-database/sql-database-advanced-data-security",
1855818528
"redirect_document_id": false
1855918529
},
18560-
{
18561-
"source_path": "articles/sql-database/sql-database-threat-detection-get-started.md",
18562-
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
18563-
"redirect_document_id": false
18564-
},
18565-
{
18566-
"source_path": "articles/sql-database/sql-database-threat-detection-portal.md",
18567-
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
18568-
"redirect_document_id": false
18569-
},
1857018530
{
1857118531
"source_path": "articles/sql-database/sql-database-troubleshoot-backup-and-restore.md",
1857218532
"redirect_url": "/azure/sql-database/sql-database-recovery-using-backups",
@@ -19302,11 +19262,6 @@
1930219262
"redirect_url": "/azure/load-balancer/load-balancer-get-started-internet-portal",
1930319263
"redirect_document_id": false
1930419264
},
19305-
{
19306-
"source_path": "articles/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-rp.md",
19307-
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-resource-provider",
19308-
"redirect_document_id": false
19309-
},
1931019265
{
1931119266
"source_path": "articles/load-balancer/load-balancer-configure-sqlao.md",
1931219267
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-portal-sql-alwayson-int-listener",
@@ -29647,11 +29602,6 @@
2964729602
"redirect_url": "/azure/data-factory/v1/data-factory-amazon-redshift-connector",
2964829603
"redirect_document_id": true
2964929604
},
29650-
{
29651-
"source_path": "articles/data-factory/connector-azure-sql-database-managed-insance.md",
29652-
"redirect_url": "/azure/data-factory/connector-azure-sql-database-managed-instance",
29653-
"redirect_document_id": false
29654-
},
2965529605
{
2965629606
"source_path": "articles/data-factory/how-to-read-write-partitioned-data.md",
2965729607
"redirect_url": "/azure/data-factory/tutorial-incremental-copy-overview",
@@ -32857,11 +32807,6 @@
3285732807
"redirect_url": "/azure/service-fabric/service-fabric-security-controls",
3285832808
"redirect_document_id": false
3285932809
},
32860-
{
32861-
"source_path": "articles/sql-database/sql-database-security-attributes.md",
32862-
"redirect_url": "/azure/sql-database/sql-database-security-controls",
32863-
"redirect_document_id": false
32864-
},
3286532810
{
3286632811
"source_path": "articles/storage/common/storage-security-attributes.md",
3286732812
"redirect_url": "/azure/storage/common/storage-security-controls",
@@ -52299,11 +52244,6 @@
5229952244
"redirect_url": "/azure/developer/terraform/",
5230052245
"redirect_document_id": false
5230152246
},
52302-
{
52303-
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
52304-
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
52305-
"redirect_document_id": true
52306-
},
5230752247
{
5230852248
"source_path": "articles/media-services/azure-media-player/azure-media-player-license.md",
5230952249
"redirect_url": "/legal/azure-media-player/azure-media-player-license",
@@ -52428,6 +52368,72 @@
5242852368
"source_path":"articles/azure-monitor/app/alerts.md",
5242952369
"redirect_url":"/azure/azure-monitor/platform/alerts-log",
5243052370
"redirect_document_id": false
52371+
},
52372+
{
52373+
"source_path": "articles/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-rp.md",
52374+
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-register-with-resource-provider",
52375+
"redirect_document_id": false
52376+
},
52377+
{
52378+
"source_path": "articles/sql-database/sql-database-security-attributes.md",
52379+
"redirect_url": "/azure/sql-database/sql-database-security-controls",
52380+
"redirect_document_id": false
52381+
},
52382+
{
52383+
"source_path": "articles/data-factory/connector-azure-sql-database-managed-insance.md",
52384+
"redirect_url": "/azure/data-factory/connector-azure-sql-database-managed-instance",
52385+
"redirect_document_id": false
52386+
},
52387+
{
52388+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-security-threat-detection.md",
52389+
"redirect_url": "/azure/sql-database/sql-database-threat-detection-overview",
52390+
"redirect_document_id": false
52391+
},
52392+
{
52393+
"source_path": "articles/sql-database/sql-database-threat-detection-get-started.md",
52394+
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
52395+
"redirect_document_id": false
52396+
},
52397+
{
52398+
"source_path": "articles/sql-database/sql-database-threat-detection-portal.md",
52399+
"redirect_url": "/azure/sql-database/sql-database-threat-detection",
52400+
"redirect_document_id": false
52401+
},
52402+
{
52403+
"source_path": "articles/sql-data-warehouse/sql-data-warehouse-auditing-overview.md",
52404+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52405+
"redirect_document_id": false
52406+
},
52407+
{
52408+
"source_path": "articles/sql-database/sql-database-auditing-get-started.md",
52409+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52410+
"redirect_document_id": false
52411+
},
52412+
{
52413+
"source_path": "articles/sql-database/sql-database-auditing-portal.md",
52414+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52415+
"redirect_document_id": false
52416+
},
52417+
{
52418+
"source_path": "articles/sql-database/sql-database-auditing-powershell.md",
52419+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52420+
"redirect_document_id": false
52421+
},
52422+
{
52423+
"source_path": "articles/sql-database/sql-database-auditing-rest.md",
52424+
"redirect_url": "/azure/sql-database/sql-database-auditing",
52425+
"redirect_document_id": false
52426+
},
52427+
{
52428+
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
52429+
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
52430+
"redirect_document_id": true
52431+
},
52432+
{
52433+
"source_path": "articles/cdn/endpoint-multiorigin.md",
52434+
"redirect_url": "/azure/cdn/cdn-overview",
52435+
"redirect_document_id": false
5243152436
}
52432-
]
52437+
52438+
]
5243352439
}

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ Next, specify that the application should be treated as a public client:
134134

135135
1. Under **Manage**, select **Authentication**.
136136
1. Select **Try out the new experience** (if shown).
137-
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**).
137+
1. Under **Advanced settings**, enable **Treat application as a public client** (select **Yes**). Ensure that **"allowPublicClient": true** is set in the application manifest.
138138
1. Select **Save**.
139139

140140
Now, grant permissions to the API scope you exposed earlier in the *IdentityExperienceFramework* registration:

articles/active-directory-b2c/tokens-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/12/2020
11+
ms.date: 05/21/2020
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
---
@@ -33,8 +33,8 @@ The following tokens are used in communication with Azure AD B2C:
3333

3434
A [registered application](tutorial-register-applications.md) receives tokens and communicates with Azure AD B2C by sending requests to these endpoints:
3535

36-
- `https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/oauth2/v2.0/authorize`
37-
- `https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/oauth2/v2.0/token`
36+
- `https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy-name>/oauth2/v2.0/authorize`
37+
- `https://<tenant-name>.b2clogin.com/<tenant-name>.onmicrosoft.com/<policy-name>/oauth2/v2.0/token`
3838

3939
Security tokens that your application receives from Azure AD B2C can come from the `/authorize` or `/token` endpoints. When ID tokens are acquired from the `/authorize` endpoint, it's done using the [implicit flow](implicit-flow-single-page-application.md), which is often used for users signing in to JavaScript-based web applications. When ID tokens are acquired from the `/token` endpoint, it's done using the [authorization code flow](openid-connect.md#get-a-token), which keeps the token hidden from the browser.
4040

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 25 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,15 @@ A user in Azure AD can choose to authenticate using one of the following authent
3030

3131
Many accounts in Azure AD are enabled for self-service password reset (SSPR) or Azure Multi-Factor Authentication. These features include additional verification methods, such as a phone call or security questions. It's recommended that you require users to register multiple verification methods. When one method isn't available for a user, they can choose to authenticate with another method.
3232

33-
The following table outlines what authentication or verification methods are available for the different scenarios:
33+
The following table outlines what methods are available for primary or secondary authentication:
3434

35-
| Method | Use at sign-in | Use during verification |
35+
| Method | Primary authentication | Secondary authentication |
3636
| --- | --- | --- |
37-
| [Password](#password) | Yes | MFA and SSPR |
37+
| [Password](#password) | Yes | |
3838
| [Microsoft Authenticator app](#microsoft-authenticator-app) | Yes (preview) | MFA and SSPR |
3939
| [FIDO2 security keys (preview)](#fido2-security-keys) | Yes | MFA-only |
40-
| [OATH hardware tokens (preview)](#oath-hardware-tokens) | Yes | SSPR and MFA |
40+
| [OATH software tokens](#oath-software-tokens) | No | MFA |
41+
| [OATH hardware tokens (preview)](#oath-hardware-tokens-preview) | Yes | MFA |
4142
| [SMS](#phone-options) | Yes (preview) | MFA and SSPR |
4243
| [Voice call](#phone-options) | No | MFA and SSPR |
4344
| [Security questions](#security-questions) | No | SSPR-only |
@@ -95,15 +96,29 @@ Users can register and then select a FIDO2 security key at the sign-in interface
9596

9697
FIDO2 security keys in Azure AD are currently in preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
9798

98-
## OATH hardware tokens
99+
## OATH tokens
99100

100-
OATH is an open standard that specifies how one-time password (OTP) codes are generated. Azure AD supports the use of OATH-TOTP SHA-1 tokens of the 30-second or 60-second variety. Customers can purchase these tokens from the vendor of their choice.
101+
OATH TOTP (Time-based One Time Password) is an open standard that specifies how one-time password (OTP) codes are generated. OATH TOTP can be implemented using either software or hardware to generate the codes. Azure AD doesn't support OATH HOTP, a different code generation standard.
101102

102-
Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret key can only contain the characters *a-z* or *A-Z* and digits *1-7*, and must be encoded in *Base32*.
103+
### OATH software tokens
103104

104-
OATH hardware tokens in Azure AD are currently in preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
105+
Software OATH tokens are typically applications such as the Microsoft Authenticator app and other authenticator apps. Azure AD generates the secret key, or seed, that's input into the app and used to generate each OTP.
105106

106-
![Uploading OATH tokens to the MFA OATH tokens window](media/concept-authentication-methods/mfa-server-oath-tokens-azure-ad.png)
107+
The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup even if their device doesn't have connectivity. Third-party applications that use OATH TOTP to generate codes can also be used.
108+
109+
Some OATH TOTP hardware tokens are programmable, meaning they don't come with a secret key or seed pre-programmed. These programmable hardware tokens can be set up using the secret key or seed obtained from the software token setup flow. Customers can purchase these tokens from the vendor of their choice and use the secret key or seed in their vendor's setup process.
110+
111+
### OATH hardware tokens (preview)
112+
113+
Azure AD supports the use of OATH-TOTP SHA-1 tokens that refresh codes every 30 or 60 seconds. Customers can purchase these tokens from the vendor of their choice.
114+
115+
OATH TOTP hardware tokens typically come with a secret key, or seed, pre-programmed in the token. These keys must be input into Azure AD as described in the following steps. Secret keys are limited to 128 characters, which may not be compatible with all tokens. The secret key can only contain the characters *a-z* or *A-Z* and digits *1-7*, and must be encoded in *Base32*.
116+
117+
Programmable OATH TOTP hardware tokens that can be reseeded can also be set up with Azure AD in the software token setup flow.
118+
119+
OATH hardware tokens are supported as part of a public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)
120+
121+
![Uploading OATH tokens to the MFA OATH tokens blade](media/concept-authentication-methods/mfa-server-oath-tokens-azure-ad.png)
107122

108123
Once tokens are acquired they must be uploaded in a comma-separated values (CSV) file format including the UPN, serial number, secret key, time interval, manufacturer, and model as shown in the following example:
109124

@@ -115,7 +130,7 @@ [email protected],1234567,1234567abcdef1234567abcdef,60,Contoso,HardwareKey
115130
> [!NOTE]
116131
> Make sure you include the header row in your CSV file.
117132
118-
Once properly formatted as a CSV file, an administrator can then sign in to the Azure portal, navigate to **Azure Active Directory** > **Security** > **MFA** > **OATH tokens**, and upload the resulting CSV file.
133+
Once properly formatted as a CSV file, an administrator can then sign in to the Azure portal, navigate to **Azure Active Directory > Security > MFA > OATH tokens**, and upload the resulting CSV file.
119134

120135
Depending on the size of the CSV file, it may take a few minutes to process. Select the **Refresh** button to get the current status. If there are any errors in the file, you can download a CSV file that lists any errors for you to resolve. The field names in the downloaded CSV file are different than the uploaded version.
121136

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/20/2020
9+
ms.date: 05/20/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -28,9 +28,9 @@ Azure Multi-Factor Authentication can be used, and licensed, in a few different
2828
| If you're a user of | Capabilities and use cases |
2929
| --- | --- |
3030
| EMS or Microsoft 365 E3 and E5 | EMS E3 or Microsoft 365 E3 (that includes EMS and Office 365), includes Azure AD Premium P1. EMS E5 or Microsoft 365 E5 includes Azure AD Premium P2. You can use the same Conditional Access features noted in the following sections to provide multi-factor authentication to users. |
31-
| Azure AD Premium P1 | You can use [Azure AD Conditional Access](../conditional-access/overview.md) to prompt users for multi-factor authentication during certain scenarios or events to fit your business requirements. |
31+
| Azure AD Premium P1 | You can use [Azure AD Conditional Access](../conditional-access/howto-conditional-access-policy-all-users-mfa.md) to prompt users for multi-factor authentication during certain scenarios or events to fit your business requirements. |
3232
| Azure AD Premium P2 | Provides the strongest security position and improved user experience. Adds [risk-based Conditional Access](../conditional-access/howto-conditional-access-policy-risk.md) to the Azure AD Premium P1 features that adapts to user's patterns and minimizes multi-factor authentication prompts. |
33-
| Office 365 Business Premium, E3, or E5 | Azure Multi-Factor Authentication is either enabled or disabled for all users, for all sign-in events. There is no ability to only enable multi-factor authentication for a subset of users, or only under certain scenarios. Management is through the Office 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Office 365 resources with multi-factor authentication](https://support.office.com/article/Set-up-multi-factor-authentication-for-Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6). |
33+
| Office 365 Business Premium, E3, or E5 | Azure Multi-Factor Authentication can be [enabled on a per-user basis](howto-mfa-userstates.md), or enabled or disabled for all users, for all sign-in events, using security defaults. Management of Azure Multi-Factor Authentication is through the Office 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Office 365 resources with multi-factor authentication](https://support.office.com/article/Set-up-multi-factor-authentication-for-Office-365-users-8f0454b2-f51a-4d9c-bcde-2c48e41621c6). |
3434
| Azure AD free | You can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication for all users, every time an authentication request is made. You don't have granular control of enabled users or scenarios, but it does provide that additional security step.<br /> Even when security defaults aren't used to enable multi-factor authentication for everyone, users assigned the *Azure AD Global Administrator* role can be configured to use multi-factor authentication. This feature of the free tier makes sure the critical administrator accounts are protected by multi-factor authentication. |
3535

3636
## Feature comparison of versions
@@ -82,4 +82,6 @@ If you don't want to enable Azure Multi-Factor Authentication for all users and
8282

8383
## Next steps
8484

85-
For more information on costs, see [Azure Multi-Factor Authentication pricing](https://azure.microsoft.com/pricing/details/multi-factor-authentication/).
85+
* For more information on costs, see [Azure Multi-Factor Authentication pricing](https://azure.microsoft.com/pricing/details/multi-factor-authentication/).
86+
* [What is Conditional Access](../conditional-access/overview.md)
87+

0 commit comments

Comments
 (0)