Skip to content

Commit c12e569

Browse files
authored
Merge pull request #194840 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents f2ce11c + 44398d0 commit c12e569

21 files changed

+44
-40
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Here are the least privileged roles required for this deployment:
6262

6363
| Azure AD Role| Description |
6464
| - | -|
65-
| Global Administrator| To implement combined registration experience. |
65+
| User Administrator or Global Administrator| To implement combined registration experience. |
6666
| Authentication Administrator| To implement and manage authentication methods. |
6767
| User| To configure Authenticator app on device, or to enroll security key device for web or Windows 10 sign-in. |
6868

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@ You must also meet the following system requirements:
4848
- [Windows Server 2016](https://support.microsoft.com/help/4534307/windows-10-update-kb4534307)
4949
- [Windows Server 2019](https://support.microsoft.com/help/4534321/windows-10-update-kb4534321)
5050

51+
- AES256_HMAC_SHA1 must be enabled when **Network security: Configure encryption types allowed for Kerberos** policy is [configured](https://docs.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos) on domain controllers.
52+
5153
- Have the credentials required to complete the steps in the scenario:
5254
- An Active Directory user who is a member of the Domain Admins group for a domain and a member of the Enterprise Admins group for a forest. Referred to as **$domainCred**.
5355
- An Azure Active Directory user who is a member of the Global Administrators role. Referred to as **$cloudCred**.
@@ -270,7 +272,7 @@ For information about compliant security keys, see [FIDO2 security keys](concept
270272

271273
### What can I do if I lose my security key?
272274

273-
To retrieve a security key, sign in to the Azure portal, and then go to the **Security info** page.
275+
To delete an enrolled security key, sign in to the Azure portal, and then go to the **Security info** page.
274276

275277
### What can I do if I'm unable to use the FIDO security key immediately after I create a hybrid Azure AD-joined machine?
276278

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -73,8 +73,8 @@ Organizations may choose to use one or more of the following methods to enable t
7373
To enable the use of security keys using Intune, complete the following steps:
7474

7575
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
76-
1. Browse to **Microsoft Intune** > **Device enrollment** > **Windows enrollment** > **Windows Hello for Business** > **Properties**.
77-
1. Under **Settings**, set **Use security keys for sign-in** to **Enabled**.
76+
1. Browse to **Devices** > **Enroll Devices** > **Windows enrollment** > **Windows Hello for Business**.
77+
1. Set **Use security keys for sign-in** to **Enabled**.
7878

7979
Configuration of security keys for sign-in isn't dependent on configuring Windows Hello for Business.
8080

@@ -83,18 +83,19 @@ Configuration of security keys for sign-in isn't dependent on configuring Window
8383
To target specific device groups to enable the credential provider, use the following custom settings via Intune:
8484

8585
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com).
86-
1. Browse to **Device** > **Windows** > **Configuration Profiles** > **Create profile**.
86+
1. Browse to **Devices** > **Windows** > **Configuration Profiles** > **Create profile**.
8787
1. Configure the new profile with the following settings:
88-
- Name: Security Keys for Windows Sign-In
89-
- Description: Enables FIDO Security Keys to be used during Windows Sign In
9088
- Platform: Windows 10 and later
9189
- Profile type: Template > Custom
92-
- Custom OMA-URI Settings:
90+
- Name: Security Keys for Windows Sign-In
91+
- Description: Enables FIDO Security Keys to be used during Windows Sign In
92+
1. Click **Add* and in **Add Row**, add the following Custom OMA-URI Settings:
9393
- Name: Turn on FIDO Security Keys for Windows Sign-In
94+
- Description: (Optional)
9495
- OMA-URI: ./Device/Vendor/MSFT/PassportForWork/SecurityKey/UseSecurityKeyForSignin
9596
- Data Type: Integer
9697
- Value: 1
97-
1. This policy can be assigned to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign).
98+
1. The remainder of the policy settings include assigning to specific users, devices, or groups. For more information, see [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign).
9899

99100
![Intune custom device configuration policy creation](./media/howto-authentication-passwordless-security-key/intune-custom-profile.png)
100101

articles/active-directory/authentication/howto-mfa-app-passwords.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,10 +81,11 @@ In this scenario, you use the following credentials:
8181
By default, users can't create app passwords. The app passwords feature must be enabled before users can use them. To give users the ability to create app passwords, **admin needs** to complete the following steps:
8282

8383
1. Sign in to the [Azure portal](https://portal.azure.com).
84-
2. Search for and select **Azure Active Directory**, then choose **Users**.
85-
3. Select **Multi-Factor Authentication** from the navigation bar across the top of the *Users* window.
86-
4. Under Multi-Factor Authentication, select **service settings**.
87-
5. On the **Service Settings** page, select the **Allow users to create app passwords to sign in to non-browser apps** option.
84+
2. Search for and select **Azure Active Directory**, then choose **Security**.
85+
3. Select **Conditional Access** from the left navigation blade.
86+
4. Selet **Named location** from the left navigation blade.
87+
5. Click on **"Configure MFA trusted IPs"** in the bar across the top of the *Conditional Access | Named Locations* window.
88+
6. On the **multi-factor authentication** page, select the **Allow users to create app passwords to sign in to non-browser apps** option.
8889

8990
![Screenshot of the Azure portal that shows the service settings for multi-factor authentication to allow the user of app passwords](media/concept-authentication-methods/app-password-authentication-method.png)
9091

@@ -104,4 +105,4 @@ Users can also create app passwords after registration. For more information and
104105

105106
## Next steps
106107

107-
For more information on how to allow users to quickly register for Azure AD Multi-Factor Authentication, see [Combined security information registration overview](concept-registration-mfa-sspr-combined.md).
108+
For more information on how to allow users to quickly register for Azure AD Multi-Factor Authentication, see [Combined security information registration overview](concept-registration-mfa-sspr-combined.md).

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Deploying the configuration change to enable SSPR from the login screen using In
8787
1. Under *Configuration settings*, select **Add** and provide the following OMA-URI setting to enable the reset password link:
8888
- Provide a meaningful name to explain what the setting is doing, such as *Add SSPR link*.
8989
- Optionally provide a meaningful description of the setting.
90-
- **OMA-URI** set to `./Vendor/MSFT/Policy/Config/Authentication/AllowAadPasswordReset`
90+
- **OMA-URI** set to `./Device/Vendor/MSFT/Policy/Config/Authentication/AllowAadPasswordReset`
9191
- **Data type** set to **Integer**
9292
- **Value** set to **1**
9393

articles/active-directory/devices/manage-stale-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ In your cleanup policy, select accounts that have the required roles assigned.
7575

7676
### Timeframe
7777

78-
Define a timeframe that is your indicator for a stale device. When defining your timeframe, factor the window noted for updating the activity timestamp into your value. For example, you shouldn't consider a timestamp that is younger than 21 days (includes variance) as an indicator for a stale device. There are scenarios that can make a device look like stale while it isn't. For example, the owner of the affected device can be on vacation or on a sick leave. that exceeds your timeframe for stale devices.
78+
Define a timeframe that is your indicator for a stale device. When defining your timeframe, factor the window noted for updating the activity timestamp into your value. For example, you shouldn't consider a timestamp that is younger than 21 days (includes variance) as an indicator for a stale device. There are scenarios that can make a device look like stale while it isn't. For example, the owner of the affected device can be on vacation or on a sick leave that exceeds your timeframe for stale devices.
7979

8080
### Disable devices
8181

articles/app-service/configure-common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ App settings are always encrypted when stored (encrypted-at-rest).
4444

4545
![Application Settings](./media/configure-common/open-ui.png)
4646

47-
By default, values for app settings are hidden in the portal for security. To see a hidden value of an app setting, click its **Value** field. To see the hidden values of all app settings, click the **Show value** button.
47+
By default, values for app settings are hidden in the portal for security. To see a hidden value of an app setting, click its **Value** field. To see the hidden values of all app settings, click the **Show values** button.
4848

4949
1. To add a new app setting, click **New application setting**. To edit a setting, click the **Edit** button on the right side.
5050

articles/app-service/deploy-zip.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,15 +70,15 @@ Publish-AzWebApp -ResourceGroupName Default-Web-WestUS -Name MyApp -ArchivePath
7070
The following example uses the cURL tool to deploy a ZIP package. Replace the placeholders `<username>`, `<zip-package-path>`, and `<app-name>`. When prompted by cURL, type in the [deployment password](deploy-configure-credentials.md).
7171

7272
```bash
73-
curl -X POST -u <username> --data-binary @"<zip-package-path>" https://<app-name>.scm.azurewebsites.net/api/publish?type=zip
73+
curl -X POST -u <username:password> --data-binary "@<zip-package-path>" https://<app-name>.scm.azurewebsites.net/api/publish?type=zip
7474
```
7575

7676
[!INCLUDE [deploying to network secured sites](../../includes/app-service-deploy-network-secured-sites.md)]
7777

7878
The following example uses the `packageUri` parameter to specify the URL of an Azure Storage account that the web app should pull the ZIP from.
7979

8080
```bash
81-
curl -X POST -u <username> https://<app-name>.scm.azurewebsites.net/api/publish -d '{"packageUri": "https://storagesample.blob.core.windows.net/sample-container/myapp.zip?sv=2021-10-01&sb&sig=slk22f3UrS823n4kSh8Skjpa7Naj4CG3"}'
81+
curl -X POST -u <username:password> https://<app-name>.scm.azurewebsites.net/api/publish -d '{"packageUri": "https://storagesample.blob.core.windows.net/sample-container/myapp.zip?sv=2021-10-01&sb&sig=slk22f3UrS823n4kSh8Skjpa7Naj4CG3"}'
8282
```
8383

8484
# [Kudu UI](#tab/kudu-ui)

articles/app-service/includes/tutorial-dotnetcore-sqldb-app/azure-portal-sql-db-create-07.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ ms.date: 02/03/2022
66
---
77

88
On the **Create Database** page, fill out the form as follows.
9-
1. **Resource Group** - choose the **ms-docs-core-sql-tutorial** group you created earlier.
9+
1. **Resource Group** - choose the **msdocs-core-sql** group you created earlier.
1010

1111
1. **Database name** - enter a value of *coreDb*.
1212

1313
1. **Server** - select the **coredbserverXYZ** you created earlier.
1414

1515
1. Leave the rest of the settings at their default, and then select **Review + create**.
1616

17-
1. Select the **Create** button once Azure validates your settings. Provisioning the database may take a few minutes.
17+
1. Select the **Create** button once Azure validates your settings. Provisioning the database may take a few minutes.

articles/app-service/includes/tutorial-dotnetcore-sqldb-app/visual-studio-deploy-app-service-02.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@ ms.topic: include
55
ms.date: 02/03/2022
66
---
77

8-
Select **Azure App Service (Linux)** as the host of your app and then select **Next**.
8+
Select **Azure App Service (Windows)** as the host of your app and then select **Next**.

0 commit comments

Comments
 (0)