Skip to content

Commit c21fc4b

Browse files
committed
Merge remote-tracking branch 'refs/remotes/MicrosoftDocs/master'
2 parents daaf705 + 0e02f3c commit c21fc4b

File tree

179 files changed

+3185
-6788
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

179 files changed

+3185
-6788
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -992,6 +992,11 @@
992992
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment",
993993
"redirect_document_id": false
994994
},
995+
{
996+
"source_path": "articles/firewall/public-preview.md",
997+
"redirect_url": "/azure/firewall/overview",
998+
"redirect_document_id": false
999+
},
9951000
{
9961001
"source_path": "articles/frontdoor/waf-faq.md",
9971002
"redirect_url": "/azure/web-application-firewall/afds/waf-faq",

articles/active-directory/authentication/concept-password-ban-bad.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Since this password is at least five (5) points, it is accepted.
165165
| Users synchronized from on-premises Windows Server Active Directory | Azure AD Premium P1 or P2 | Azure AD Premium P1 or P2 |
166166

167167
> [!NOTE]
168-
> On-premises Windows Server Active Directory users that not synchronized to Azure Active Directory also avail the benefits of Azure AD password protection based on existing licensing for synchronized users.
168+
> On-premises Windows Server Active Directory users that are not synchronized to Azure Active Directory also benefits from Azure AD password protection based on existing licensing for synchronized users.
169169
170170
Additional licensing information, including costs, can be found on the [Azure Active Directory pricing site](https://azure.microsoft.com/pricing/details/active-directory/).
171171

articles/active-directory/devices/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ See below on how these actions can be rectified.
117117

118118
### Q: Does Windows 10 device registration in Azure AD support TPMs in FIPS mode?
119119

120-
**A:** No, currently device registration on Windows 10 for all device states - Hybrid Azure AD join, Azure AD join, and Azure AD registered - does not support TPMs in FIPS mode. To successfully join or register to Azure AD, FIPS mode needs to be turned off for the TPMs on those devices
120+
**A:** Windows 10 device registration only supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join or Hybrid Azure AD join. Note that Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.
121121

122122
---
123123

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,8 @@ If your Windows 10 domain joined devices are [Azure AD registered](overview.md#g
9090
- You can prevent your domain joined device from being Azure AD registered by adding this registry key - HKLM\SOFTWARE\Policies\Microsoft\Windows\WorkplaceJoin, "BlockAADWorkplaceJoin"=dword:00000001.
9191
- In Windows 10 1803, if you have Windows Hello for Business configured, the user needs to re-setup Windows Hello for Business after the dual state clean up.This issue has been addressed with KB4512509
9292

93-
93+
> [!NOTE]
94+
> The Azure AD registered device will not be automatically removed if it is managed by Intune.
9495
9596
## Review controlled validation of hybrid Azure AD join
9697

articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to create, list and delete a user-assigned managed identity using Azure PowerShell
2+
title: Create, list & delete user-assigned managed identity using Azure PowerShell - Azure AD
33
description: Step by step instructions on how to create, list and delete user-assigned managed identity using Azure PowerShell.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sdk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to use managed identities for Azure resources on an Azure VM with Azure SDKs
2+
title: Use managed identities on an Azure VM with Azure SDKs - Azure AD
33
description: Code samples for using Azure SDKs with an Azure VM that has managed identities for Azure resources.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/how-to-use-vm-sign-in.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to use managed identities for Azure resources on an Azure VM for sign in
2+
title: Use managed identities on an Azure VM for sign in - Azure AD
33
description: Step by step instructions and examples for using an Azure VM managed identities for Azure resources service principal for script client sign in and resource access.
44
services: active-directory
55
documentationcenter:

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to view the service principal of a managed identity in the Azure portal
2+
title: View service principal of a managed identity in the Azure portal - Azure AD
33
description: Step-by-step instructions for viewing the service principal of a managed identity in the Azure portal.
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/managed-identities-azure-resources/how-to-view-managed-identity-service-principal-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to view the service principal of a managed identity using PowerShell
2+
title: View the service principal of a managed identity using PowerShell - Azure AD
33
description: Step-by-step instructions for viewing the service principal of a managed identity using PowerShell.
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/managed-identities-azure-resources/howto-assign-access-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to assign a managed identity access to an Azure resource using Azure CLI
2+
title: Assign a managed identity access to a resource using Azure CLI - Azure AD
33
description: Step by step instructions for assigning a managed identity on one resource, access to another resource, using Azure CLI.
44
services: active-directory
55
documentationcenter:

0 commit comments

Comments
 (0)