Skip to content

Commit caac1c5

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 2023397
2 parents baa6ec1 + 8bc9ca8 commit caac1c5

File tree

1,229 files changed

+12906
-9201
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,229 files changed

+12906
-9201
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4391,6 +4391,11 @@
43914391
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43924392
"redirect_document_id": false
43934393
},
4394+
{
4395+
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendations-integrate-third-party-apps.md",
4396+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
4397+
"redirect_document_id": false
4398+
},
43944399
{
43954400
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
43964401
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
@@ -4411,6 +4416,11 @@
44114416
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
44124417
"redirect_document_id": false
44134418
},
4419+
{
4420+
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendation-integrate-third-party-apps.md",
4421+
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
4422+
"redirect_document_id": false
4423+
},
44144424
{
44154425
"source_path_from_root": "/articles/active-directory/reports-monitoring/concept-reporting-api.md",
44164426
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,11 @@
2525
"redirect_url": "/azure/azure-monitor/change/change-analysis",
2626
"redirect_document_id": false
2727
},
28+
{
29+
"source_path_from_root": "/articles/azure-monitor/app/legacy-pricing.md",
30+
"redirect_url": "/azure/azure-monitor/best-practices-cost",
31+
"redirect_document_id": false
32+
},
2833
{
2934
"source_path_from_root": "/articles/azure-monitor/app/snapshot-debugger.md",
3035
"redirect_url": "/azure/azure-monitor/snapshot-debugger/snapshot-debugger",

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14099,6 +14099,26 @@
1409914099
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1410014100
"redirect_document_id": ""
1410114101
},
14102+
{
14103+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-designer-custom-skill.md",
14104+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-designer-custom-skill",
14105+
"redirect_document_id": false
14106+
},
14107+
{
14108+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-custom-skill.md",
14109+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-custom-skill",
14110+
"redirect_document_id": false
14111+
},
14112+
{
14113+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-form.md",
14114+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-form",
14115+
"redirect_document_id": false
14116+
},
14117+
{
14118+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-python.md",
14119+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-python",
14120+
"redirect_document_id": false
14121+
},
1410214122
{
1410314123
"source_path_from_root": "/articles/search/search-get-started-vs-code.md",
1410414124
"redirect_url": "/previous-versions/azure/search/search-get-started-vs-code",

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5353
1. Select **Save Changes**.
5454
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
56-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
56+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-id/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.
5858
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5959

@@ -135,4 +135,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
135135
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136136
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137137

138-
::: zone-end
138+
::: zone-end

articles/active-directory-b2c/page-layout.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,35 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5959

6060
## Self-asserted page (selfasserted)
6161

62+
**2.1.20**
63+
- Fixed an XSS issue on input from textbox
64+
65+
**2.1.19**
66+
- Fixed accessibility bugs
67+
- Handle Undefined Error message for existing user sign up
68+
- Move Password Mismatch Error to Inline instead of Page Level
69+
- Accessibility changes related to High Contrast button display and anchor focus improvements
70+
71+
**2.1.18**
72+
- Add asterisk for required fields
73+
- TOTP Store Icons position fixes for Classic Template
74+
- Activate input items only when verification code is verified
75+
- Add Alt Text for Background Image
76+
- Added customization for server errors by TOTP verification
77+
78+
**2.1.17**
79+
- Add descriptive error message and fixed forgotPassword link
80+
- Make checkbox as group
81+
- Enforce Validation Error Update on control change and enable continue on email verified
82+
- Added additional field to error code to validation failure response
83+
84+
**2.1.16**
85+
- Fixed "Claims for verification control have not been verified" bug while verifying code.
86+
- Hide error message on validation succeeds and send code to verify
87+
88+
**2.1.15**
89+
- Fixed QR code generation bug due to QR text length
90+
6291
**2.1.14**
6392
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
6493

@@ -158,6 +187,12 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
158187
> [!TIP]
159188
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
160189
190+
**2.1.9**
191+
- Fix accessibility bugs
192+
- Accessibility changes related to High Contrast button display and anchor focus improvements
193+
194+
**2.1.8**
195+
- Add descriptive error message and fixed forgotPassword link!
161196

162197
**2.1.7**
163198

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/31/2023
7+
ms.date: 02/03/2023
88
ms.author: justinha
9-
author: mjsantani
9+
author: justinha
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
@@ -305,7 +305,7 @@ GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationM
305305

306306
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
307307

308-
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
308+
Number match will be enabled for all users of Microsoft Authenticator push notifications after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
309309

310310
### Will the changes after February 27th, 2023, override number matching settings that are configured for a group in the Authentication methods policy?
311311

@@ -362,10 +362,6 @@ If the user has a different default authentication method, there won't be any ch
362362

363363
Regardless of their default method, any user who is prompted to sign-in with Authenticator push notifications will see number match after February 27th, 2023. If the user is prompted for another method, they won't see any change.
364364

365-
### Will users who don't use number matching be able to perform MFA?
366-
367-
It depends on how the **Enable and Target** tab is configured. The scope for number match approvals will change under the **Configure** tab to include everyone, but it only applies for users and groups targeted on the **Enable and Target** tab for Push or Any. However, if Target on the **Enable and Target** tab is set to specific groups for Push or Any, and the user isn't a member of those groups, then they won't receive the number matching approvals once the change is implemented after February 27th, 2023 because they aren't a member of the groups defined on the **Enable and Target** tab for Push and/or Any.
368-
369365
### Is number matching supported with MFA Server?
370366

371367
No, number matching isn't enforced because it's not a supported feature for MFA Server, which is [deprecated](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454).

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -162,4 +162,6 @@
162162
href: faqs.md
163163
- name: Glossary
164164
href: multi-cloud-glossary.md
165+
- name: Microsoft Entra Permissions Management partners
166+
href: partner-list.md
165167

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
24+
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
2525
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-create-group-based-permissions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 02/03/2023
1212
ms.author: jfields
1313
---
1414

@@ -33,15 +33,15 @@ This article describes how you can create and manage group-based permissions in
3333
1. Select **Next**
3434

3535
1. If you selected **Admin for all Authorization System Types**
36-
- Select Identities for each Authorization System that you would like members of this group to Request on.
36+
- Select Identities to add for each Authorization System. Added Identities will have access to submit requests from the **Remediation** tab.
3737

3838
1. If you selected **Admin for selected Authorization System Types**
3939
- Select **Viewer**, **Controller**, or **Approver** for the **Authorization System Types** you want.
40-
- Select **Next** and then select Identities for each Authorization System that you would like members of this group to Request on.
40+
- Select **Next** and then select Select Identities to add for each Authorization System. Added Identities will have access to submit requests from the **Remediation** tab.
4141

4242
1. If you select **Custom**, select the **Authorization System Types** you want.
4343
- Select **Viewer**, **Controller**, or **Approver** for the **Authorization Systems** you want.
44-
- Select **Next** and then select Identities for each Authorization System that you would like members of this group to Request on.
44+
- Select **Next** and then select Select Identities to add for each Authorization System. Added Identities will have access to submit requests from the **Remediation** tab.
4545

4646
1. Select **Save**, The following message appears: **New Group Has been Created Successfully.**
4747
1. To see the group you created in the **Groups** table, refresh the page.
40.1 KB
Loading

0 commit comments

Comments
 (0)