Skip to content

Commit c53c75c

Browse files
authored
Merge branch 'main' into pim3
2 parents 1ee7182 + d2e9865 commit c53c75c

File tree

755 files changed

+7568
-3673
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

755 files changed

+7568
-3673
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1039,6 +1039,12 @@
10391039
"url": "https://github.com/Azure/Azure-Proactive-Resiliency-Library",
10401040
"branch": "main",
10411041
"branch_mapping": {}
1042+
},
1043+
{
1044+
"path_to_root": "azure-reference-other-repo",
1045+
"url": "https://github.com/MicrosoftDocs/azure-reference-other-pr",
1046+
"branch": "main",
1047+
"branch_mapping": {}
10421048
}
10431049
],
10441050
"branch_target_mapping": {
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth.md",
5+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth-cli.md",
10+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth-cli",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache.md",
15+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-cli.md",
20+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-cli",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/container-registry/tutorial-registry-cache.md",
25+
"redirect_url": "/azure/container-registry/tutorial-artifact-cache",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/container-registry/tutorial-troubleshoot-registry-cache.md",
30+
"redirect_url": "/azure/container-registry/tutorial-troubleshoot-artifact-cache",
31+
"redirect_document_id": false
32+
}
33+
34+
35+
]
36+
}

articles/active-directory-b2c/custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Every new Azure AD B2C tenant comes with an initial domain name, <domainname&
6767

6868
Follow these steps to add a custom domain to your Azure AD B2C tenant:
6969

70-
1. [Add your custom domain name to Azure AD](../active-directory/fundamentals/add-custom-domain.md#add-your-custom-domain-name-to-azure-ad).
70+
1. [Add your custom domain name to Azure AD](../active-directory/fundamentals/add-custom-domain.md#add-your-custom-domain-name).
7171

7272
> [!IMPORTANT]
7373
> For these steps, be sure to sign in to your **Azure AD B2C** tenant and select the **Azure Active Directory** service.

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/06/2023
4+
ms.date: 09/13/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/inbound-provisioning-api-issues.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,13 @@ This document covers commonly encountered errors and issues with inbound provisi
4040

4141
**Probable causes**
4242
1. Your API-driven provisioning app is paused.
43-
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
43+
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
44+
2. Your On-premises provisioning agent status is inactive (If you are running the [/API-driven inbound user provisioning to on-premises Active Directory](https://go.microsoft.com/fwlink/?linkid=2245182)).
45+
4446

4547
**Resolution:**
4648
1. Verify that your provisioning app is running. If it isn't running, select the menu option **Start provisioning** to process the data.
49+
2. Turn your On-premises provisioning agent status to active by restarting the On-premise agent.
4750
1. Expect 5 to 10-minute delay between processing the request and writing to the provisioning logs. If your API client is sending data to the provisioning /bulkUpload API endpoint, then introduce a time delay between the request invocation and provisioning logs query.
4851

4952
### Forbidden 403 response code

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,14 @@ The following table lists each setting that can be set to Microsoft managed and
5353

5454
| Setting | Configuration |
5555
|-------------------------------------------------------------------------------------------------|---------------|
56-
| [Registration campaign](how-to-mfa-registration-campaign.md) | Beginning in July, 2023, enabled for SMS and voice call users with free and trial subscriptions. |
56+
| [Registration campaign](how-to-mfa-registration-campaign.md) | Beginning in July, 2023, enabled for text message and voice call users with free and trial subscriptions. |
5757
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5858
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5959
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Enabled |
6060
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Enabled |
6161
| [Report suspicious activity](howto-mfa-mfasettings.md#report-suspicious-activity) | Disabled |
6262

63-
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
63+
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using text message and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
6464

6565
## Next steps
6666

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ To manage the legacy MFA policy, click **Security** > **Multifactor Authenticati
4949

5050
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/service-settings.png" alt-text="Screenshot of MFA service settings.":::
5151

52-
To manage authentication methods for self-service password reset (SSPR), click **Password reset** > **Authentication methods**. The **Mobile phone** option in this policy allows either voice calls or SMS to be sent to a mobile phone. The **Office phone** option allows only voice calls.
52+
To manage authentication methods for self-service password reset (SSPR), click **Password reset** > **Authentication methods**. The **Mobile phone** option in this policy allows either voice calls or text message to be sent to a mobile phone. The **Office phone** option allows only voice calls.
5353

5454
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/password-reset.png" alt-text="Screenshot of password reset settings.":::
5555

@@ -69,7 +69,7 @@ If the user can't register Microsoft Authenticator based on either of those poli
6969
- **Mobile app notification**
7070
- **Mobile app code**
7171

72-
For users who are enabled for **Mobile phone** for SSPR, the independent control between policies can impact sign-in behavior. Where the other policies have separate options for SMS and voice calls, the **Mobile phone** for SSPR enables both options. As a result, anyone who uses **Mobile phone** for SSPR can also use voice calls for password reset, even if the other policies don't allow voice calls.
72+
For users who are enabled for **Mobile phone** for SSPR, the independent control between policies can impact sign-in behavior. Where the other policies have separate options for text message and voice calls, the **Mobile phone** for SSPR enables both options. As a result, anyone who uses **Mobile phone** for SSPR can also use voice calls for password reset, even if the other policies don't allow voice calls.
7373

7474
Similarly, let's suppose you enable **Voice calls** for a group. After you enable it, you find that even users who aren't group members can sign-in with a voice call. In this case, it's likely those users are enabled for **Mobile phone** in the legacy SSPR policy or **Call to phone** in the legacy MFA policy.
7575

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Microsoft recommends passwordless authentication methods such as Windows Hello,
2323

2424
:::image type="content" border="true" source="media/concept-authentication-methods/authentication-methods.png" alt-text="Illustration of the strengths and preferred authentication methods in Azure AD." :::
2525

26-
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to an SMS or phone call.
26+
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to a text message or phone call.
2727

2828
To simplify the user on-boarding experience and register for both MFA and self-service password reset (SSPR), we recommend you [enable combined security information registration](howto-registration-mfa-sspr-combined.md). For resiliency, we recommend that you require users to register multiple authentication methods. When one method isn't available for a user during sign-in or SSPR, they can choose to authenticate with another method. For more information, see [Create a resilient access control management strategy in Azure AD](concept-resilient-controls.md).
2929

0 commit comments

Comments
 (0)